Skip to main content

1E 8.1 (on-premises)

Management Groups page

Management Groups are containers used to group devices and the software installed on those devices. Management Groups are defined using configurable rules that look at various properties of the devices and their installed software, these are then evaluated to determine the group membership. This means that Management Group membership adapts to changes to the devices and software in your environment.

232786023.png
Management Groups overview

Management Groups are used by 1E to determine:

  • The targets for questions, actions, and reporting

  • User permissions for targeting to particular devices based on Management Group membership.

In terms of permissions for determining how 1E users interact with the devices in your network, Management Groups work alongside Instruction sets.

In 1E, Management Groups are created in two different ways:

  • Rule based - the page lets you add, edit, delete and evaluate Management Groups that are based on rules

  • Direct based - these use scripts to create Management Groups by importing lists of devices using FQDN names only, this type of Management Group has no associated rules and cannot be edited and evaluated from the Management Groups page. 1E recommends using the 1E PowerShell Toolkit.

Both types of Management Group have the following properties:

  • Each device known to 1E can be assigned to any number of Management Groups.

  • Roles can be associated with specific Management Groups, so that users with those roles will only be able to target the devices in their Management Groups

  • Management Groups can only contain devices, and they are completely independent of any other Management Group, even if they contain the same devices

  • Each Management Group must have a unique name which is not case-sensitive.

Note

Please note the following considerations:

  • Devices not assigned to any child Management Group will still be accessible, as all devices are members of the default All Devices Management Group

  • Child Management Groups can only be created under the default All Devices Management Group

  • The maximum number of child Management Groups are four (Five, including All Devices)

  • However, there is no current limit on the number of child or "sibling" Management Groups which can be created.

Permissions

The following roles can add Users and Groups, Roles, Management Groups, Assignments, and Delegation:

  • Full Administrator

  • Group Administrator - cannot create roles unless they are delegated.

You can find out more about the system and custom roles available in 1E on the Roles page.

Connectors

Management Groups use device data stored in an Inventory repository, which is populated using one or more inventory connectors, as described in Connectors page. This is sufficient for inventory-based applications like AppClarity, Application Migration, and Patch Success.

If you want client-based applications like Explorer, Experience and Guaranteed State to use the Management Groups, then you must add a Tachyon Connector, which synchronizes its own data with inventory data. The username and password you provide for the Connector must be a valid user and belong to the Management Group Administrator role. Please refer to the Tachyon connector page for more details. You only require to configure the connector, you do not need to schedule or run the Tachyon connector unless you also want to collect data from clients.

Note

To take advantage of your Configuration Manager database and pull in its inventory and usage data, you'll need to configure a System Center Configuration Manager connector in your Tachyon system.

Creating direct-based Management Groups

Direct-based Management Groups are created using scripts. Two sample PowerShell scripts are provided.

  • Each script creates a new log file in the same folder, with file name format as <scriptname>_<ddMMyyyyhhmmss>.log which must be deleted manually.

  • If a Management Group already exists with the same name, the script will delete and recreate it, only with the new devices provided

  • If the file or collection includes a device that is not present in the Tachyon Inventory repository, then it is ignored, and logged

  • After a successful run, the script triggers a Management Group sync.

Once imported into Tachyon, your direct-based Management Groups will be added as child groups of the default All Devices Management Group.

Prerequisites
  • User must have read/write permission in the folder where the PowerShell script is present

  • User must use UseCustomCredentials parameter if the current logged-in user does not have permission in Tachyon to create Management Groups

  • If Windows Task Scheduler is used to run a script, then the scheduled task should provide the current logged-in user.

Create Direct-based Management Groups from a file

Note

This script has changed to support an API change in Platform 8.1

Create-DirectManagementGroupUsingFile.ps1, to view and copy the script, click Read more...

.\Create-DirectManagementGroupUsingFile.ps1 -TachyonApiBaseUrl https://tachyon.testlab.com -FolderPath C:\Temp\DeviceFolder -UseCustomCredentials

Parameter name

Mandatory

Description

TachyonApiBaseUrl

Yes

Platform base URL, for example: https://tachyon.lab.local

FolderPath

Yes

Folder path which contains files containing Device FQDN list

UseCustomCredentials

No

Use custom credentials (the script will prompt) otherwise current windows credentials will be used to call APIs.

  1. Create a folder which will contain text files to create Management Groups. This is the FolderPath passed as a parameter in the PowerShell script.

  2. Create text files in the above folder with the name same as Management Group(e.g. ManagementGroupName.txt)

    • Enter Management Group Description in first line

    • Enter one or more Device FQDN from second line onwards, one device per line.

  3. Optionally add more files if you want to create multiple Management Groups.

  4. Execute the PowerShell script.

Note

To ensure all devices are present in the Tachyon Inventory repository, ensure you have configured a Connectors page for the inventory source you are using to create your device lists.

Create Direct-based Management Groups from a Configuration Manager collection

Note

This script has changed to support an API change in Platform 8.1

Create-DirectManagementGroupUsingCmCollection.ps1, to view and copy the script, click Read more...

.\Create-DirectManagementGroupUsingCmCollection.ps1 -TachyonApiBaseUrl https://tachyon.testlab.com -FilePath C:\Temp\Collection.txt -UseCustomCredentials

Parameter name

Mandatory

Description

TachyonApiBaseUrl

Yes

Platform base URL, for example: https://tachyon.lab.local">https://tachyon.lab.local

FilePath

Yes

File path, which contains details of CM Collections.

UseCustomCredentials

No

Use custom credentials (the script will prompt) otherwise current windows credentials will be used to call APIs.

  1. Create a text file which will be passed as a parameter in PowerShell script.

  2. In the file enter the following as a comma separated single line: Collection name, Management Group Name, Management Group Description

  3. Optionally, enter more lines in the same format if you want to create multiple Management Groups.

  4. Execute the PowerShell script.

Note

This script is designed to be run on the Configuration Manager Site server.

To ensure all CM devices are present in the Tachyon Inventory repository, ensure you have a System Center Configuration Manager connector and run its Data Sync action to populate the repository.

Working with direct-based Management Groups

Given the information provided in Creating direct-based Management Groups we can now give an example of how direct-based Management Groups can be added.

Before adding the direct-based Management Groups

In our example, we do not have any Management Groups except the default All Devices group with a total of all seven devices in our network, as shown in the picture opposite.

Once imported into Tachyon, your direct-based Management Groups will be added as child groups of the default All Devices Management Group.

232786022.png
The device files

We've created a C:\Sources\DeviceFolder folder and added two files, All Managed Windows 10 Devices.txt and All Managed Windows 7 Devices.txt that contain a list of device FQDN on separate lines.

We have also added the Create-DirectManagementGroupUsingCmCollection.ps1 script to this folder, in our example we'll run the script from the same folder as the text files.

Tip

Unlike Rule based Management Groups, once a direct based Management Group is added to Tachyon, you cannot later change the name.

To distinguish your direct-based Management Groups from your rule based groups, you should give them a meaningful naming convention, for the purposes of our example we have just used All Managed Windows as a prefix to indicate them.

232786009.png
All Managed Windows 7 Devices FQDN
All Managed Windows 10 Devices FQDN
Running the script to populate the direct-based Management Groups

With the device files in place, in our example, we run the Create-DirectManagementGroupUsingFile.ps1 file with the following command-line:

.\Create-DirectManagementGroupUsingFile.ps1 -TachyonApiBaseUrl https://tachyon.testlab.com -FolderPath C:\Temp\DeviceFolder -UseCustomCredentials

Where the TachyonApiBaseUrl is set to our example instance of https://tachyon.1etrn.local and the -FolderPath is set to the C:\Sources\DeviceFolder we set up earlier.

We don't bother with the UseCustomCredentials setting as the account we are running the script with has administrator permissions in Tachyon.

232786027.png
232786006.png
Checking the log file for Create-DirectManagementGroupUsingFile.ps1

After running the script you will find a log file is created in the same directory where the Create-DirectManagementGroupUsingFile.ps1 is located. In our example we can see that the script completed without errors.

232786007.png
The reports for creating and enabling the direct-based Management Groups

When the direct-based Management Groups are added to Tachyon some reports will run to enable the Management Groups to be used.

If more than one direct-based Management Groups are being added you will see two Management Group Evaluation reports run on the default Inventory repository. You will also see an additional Management Group Evaluation report run on each additional non-default inventory repositories you have in your system.

If you have Application Migration installed you will also see two Application Migration Consolidation reports run on the default ApplicationMigration repository.

In our example we have Application Migration installed, so we see four reports run when the DB Management Groups are added. Two Management Group Evaluation reports and two Application Migration Consolidation reports, as can be seen in the picture opposite.

232786025.png
The direct-based Management Groups added

After running the script, two new direct-based Management Groups get added:

  • All Managed Windows 10 Devices.txt

  • All Managed Windows 7 Devices.txt

You can drill down to see the details of a Management Group by clicking the Name link.

Direct based management groups added

Clicking on the All Managed Windows 10 Devices.txt Management Group name link displays the details for that Management Group. Here, you can view group members, export the membership as a .TSV file or add Child Management Groups as required.

232786024.png

You can use the Inventory→Hardware Inventory page with the Management Group selector set to the name of the Management Group, to view every device contained in the new Management Group.

232786005.png
Working with rule-based Management Groups

Rule-based Management Groups are defined and maintained in the Settings→Permissions→Management Groups page. They use device inventory data gathered from data sources by connectors and use Management Groups to control how instructions are applied in Tachyon applications. All child Management Groups must be created under the default All Devices Management Group.

You can easily create complex Management Group definitions by building rules for them, you'll find this in the Rules section of each Management Group. In the Rules section, you can define parameters that determine what devices are members of your Management Groups. The rules you create can be as simple as defining membership according to the OU path in your AD, or as complex as adding groups of rules that narrow membership down to details like Processor Matched Threads per Core. You can also use device or software tags that you have created to define Management Group membership, or a combination of all these parameters.

By default, in a new installation of Tachyon, all devices are members of the All Devices group. If you have upgraded from a previous version of Tachyon, your previously created Management Group will be preserved and will become a child Management Group of All Devices Management Group.

You can create Child Management Groups and nest them into a Hierarchy Structure where child Management Groups inherit rules from their parent groups.

Using child Management Groups you could create by hand a Management Group structure which mirrors your Configuration Manager collections, or divide your Management Groups by device type, for example into servers and workstations. You can use the delegation feature to create Management Groups that mirror your organizational structure with associated delegated roles.

To find out how to use scripts to import a Management Group structure from a file or from Configuration Manager collection, refer to Creating direct-based Management Groups.

Note

Refer to Management Groups - tutorial for a conceptual example of how you might create a Hierarchy Structure, and for details about how you can use the delegation feature.

The following sections walk through the basic steps required to:

All Devices management group
Creating a rule-based Management Group

In this example we will create a Management Group for devices that are based in a different office location, this location contains Windows 7 devices and is named Sales. The new Management Group is going to be a child group of the All Devices group.

To create the rule-based Management Group:

  1. Navigate to the Settings→Permissions→Management Groups page.

  2. Click the Add Child button to display the new Management Group template.

  3. Enter a suitable Name for the Management Group. For example Sales.

  4. Add a Description, it's a good idea to use a description that provides an outline of the rules that are used to populate the Management Group. For example OU Path Contains Sales.

  5. To add each rule:

    1. Click on the Add rule button. The first one is already added, all you need to do is fill out the parts of the rule.

    2. First, you select the rule name and description, for example, OU Path.

    3. You then select the condition. For example Contains.

    4. To complete the rule you then set the value. For example Sales.

    5. Click Save.

  6. Repeat step 5 for each rule you want to define.

  7. When you have more than one rule added, you can:

    1. Use the gripper icon at the right-hand end of the rule to change the order the rules are applied by dragging the rule to a new place in the list.

    2. Change the conjunction operator at the left-hand end of the rule to select between AND and OR.

  8. When you have finished adding the rules, you need to decide whether you want the Management Group membership to be evaluated immediately on adding the Management Group. If you are just adding one Management Group, it makes sense to click the Evaluate button. If you are adding a number of Management Groups, it may be a good idea to leave Click the Evaluate All button at the top of the page.

  9. If you click Evaluate All and there is more than one inventory repository an additional control will be displayed prompting you to select which repository you want to evaluate the Management Group rules against.

The Management Group will be added to the Hierarchy Structure.

Tip

You can create nested groups of rules using the Add group button. For example, we want to narrow the devices in the Sales group to those devices with an Intel processer and an OS of Windows 7 as we want to upgrade this legacy OS.

232786016.png
Editing a management group
Rule builder extended

If you selected to evaluate rules immediately, the rules you set for the Management Group will be evaluated against the selected inventory repository.

To check how many devices are in the Management Group, switch to the Inventory app, select the Management Group name from the drop-down.

The picture shows the details for the OU Path contains Sales Management Group, showing that it contains 2 devices.

Explorer Devices table

Once the Management Group rules have been evaluated, you should then be able to check the devices in Explorer contained in the group using the Explorer→Devices→Table page. The picture shows the Devices table with the Management Group filter set to Sales.

Explorer Devices table
Editing a rule-based Management Group

To edit an existing rule-based Management Group:

  1. Navigate to the Settings→Permissions→Management Groups page.

  2. In the Management Groups table, locate the Management Group you want to edit and click the title at the left-hand end of its row in Hierarchy Structure.

  3. Here you can edit the Name, Description and Rules that define the Management Group.

  4. When you've finished editing, before you click the Save button you can click Evaluate, enables any modifications you've made to the rules to take effect right away. If you don't check the box, the rules won't be run, but you'll be able to evaluate the Management Groups later.

Editing a management group
Deleting a Management Group

The following applies to rule-based and direct-based Management Groups.

To delete an existing Management Group:

  1. Navigate to the Settings→Permissions→Management Groups page.

  2. In the Management Groups table, locate the Management Group you want to delete and click the title at the left-hand end of its row in Hierarchy Structure.

  3. Click the Delete button. This displays the Delete Management Group popup.

  4. Here you are asked if you want to proceed with the delete process. Click the Yes, delete Management Group button to confirm the deletion, or No to cancel.

232786013.png
Evaluating Management Group membership

You can select to evaluate the Management Groups at any time.

Note

When a parent Management Group gets evaluated, all child Management Groups also get evaluated.

  1. Navigate to the Settings→Permissions→Management Groups page.

  2. Click the Evaluate button.

  3. If there is only one inventory repository, the evaluation will be queued immediately. If there is more than one inventory repository, the Evaluate Management Groups popup will be displayed, and you will need to select a Repository then click the Evaluate button before the evaluation is queued.

  4. When an evaluation is queued you will see a Management Group Evaluation action appear on the Settings→Monitoring→Process log page. From there you can view the progress of the evaluation.

  5. When this action has run, Explorer will reflect any changes that have been made to the Management Group memberships.

232786014.png
Delegation in Tachyon

Delegation in Tachyon is, a concept where an administrator can delegate some of their own responsibility to other users and limit the area where they can use that responsibility. In Tachyon, a Full administrator can create and modify Roles. They can also assign any Role to a Tachyon user or group using Management Groups, there are exceptions, like the Group Administrator Role which cannot be assigned to All Devices.

For example, a local security administrator with the Group Administrator role cannot create or modify Roles, but they can assign any Role that is marked as delegatable to a Management Group they have the security permission on, or any of its child Management Groups.

The exception is that a local security administrator cannot assign a Role that has the same security permission using the same Management Group they have permissions on. Instead, they have to use a child Management Group of the one they have security permissions on.

Essentially, a local security administrator cannot create an assignment that would result in another Tachyon user or group having the same security permissions as they do.

Group Administrator permissions
Delegation example

In our example we have a new Tachyon installation with only a few assignments, the one shown in the picture is of the Full Administrator role which is assigned to the group All_Devices_Full_Administrator and is assigned to All Devices. We have used a group to control the assignment instead of an individual user account.

All_Devices_Full_Administrator

In our example, we want to use the delegation feature of Tachyon and use the Group Administrator role to delegate some tasks to a child Management Group of All Devices called Servers to another administrator.

We'll assign the Group Administrator role to a Universal AD group called Server_Group_Administrator which we have added to Tachyon using the Users and Groups page.

To add the new assignment:

  1. On the Settings→Permissions→Assignments page, we click on the title of the role to configure, in this case Group Administrator this displays the Assignments page focused on that role.

  2. Clicking the plus sign button allows us to add our group, Server_Group_Administrator and the associated Management Group, Servers.

  3. Once we've selected the group and Management Group, we click the Save button.

Group Administrator permissions

When a user in the Server_Group_Administrator group signs in to Tachyon, they will be able to create a child Management Group. For example a subset of the Servers Management Group for application servers called App servers, other Management Groups at the same level are locked because the Server_Group_Administrator has not been applied to those Management Groups.

If, for example, our Server_Group_Administrator now wants to add a user with the All Instructions Questioner role to the new App servers Management Group, they can now do so.

Note

For a complete reference table of Tachyon roles, please refer to the Roles and Securables page.

This page contains a full list of roles, their associated permissions, whether each role is delegatable and notes indicating if the role is new or renamed for the release.

Role

Description

System roles

System roles are built-in and are not configurable, however they can be assigned to users the same as any other role.

Custom roles

Custom roles can be used to define who is able to use specific Instruction Sets to ask questions, run actions or approve actions.

Securables and operations

A Permission is one or more Operations for a Securable. The remit for a Securable is either Localized or Global. A Role that has only Localized permissions can be delegated.

Group Administrator permissions applied
App servers management group
Management Group rules and conditions

In computing, a Boolean result means an expression is either true (1) or false (0). That is, expressions such as A AND B or A OR B give you a true or false result. Boolean expressions can be much more complex, and you can use brackets (groupings) to keep the same operators together, for example A AND B AND C. You would not write an expression such as A AND B OR C because it is ambiguous. It can be interpreted as either A AND (B OR C) or (A AND B) OR C.

When you are building rules, and you get different results to the ones you expect, write down each of your rules as A, B, C etc, and put them into a simple Boolean expression, like A OR (A AND B) = A.

This is perhaps the most important point to remember when building Management Group rules, and why it helps to write down what you are trying to achieve as a Boolean expression, then simplify it. The Rule examples section has some simple examples of how Boolean expressions translates to the rules you can apply to your own Management Groups.

Rule layout

The rows in the Rules section are laid out as follows:

Conjunction

Rule Name

Operators

Value

Delete

Gripper

When there is more than one rule, this field determines how it is evaluated with the other rules. This may be one of:

Conjunction

Description

AND

This rule must be satisfied as well as any other rules.

OR

Either this rule must be satisfied or any other rules.

Determines the type of information checked when evaluating the rule.

For example, selecting Device Computer Name will specify checking the set value against the information held internally for each device's computer name using the selected operand.

Please refer to List of available rules below.

How the value compares against the type of information.

This may be one of the following:

Operator

Attribute type

Comparison

Equal to

String, Date, Number, Yes/No

Your value is exactly equal to the device’s value.

Not Equal to

String, Date, Number

Your value is not equal to (different to) the device’s value.

Before

Date

Your date is before the device’s date.

After

Date

Your date is after the device’s date.

Begins with

String

The device’s value begins with your value.

Ends with

String

The device’s value ends with your value.

Less than

Number

Your value is less than the device’s value.

Less than or equal to

Number

Your value is less than or equal to the device’s value.

Greater than

Number

Your value is greater than the device’s value.

Greater than or equal to

Number

Your value is greater than or equal to the device’s value.

Is one of

Tag

The specified Device tag exists on the device, and its value is one of the array of alternative values that you specified.

Is not one of

Tag

The specified Device tag exists on the device, and its value is not one of the array of alternative values that you specified.

Is Null

String, Date, Number, Tag

The device does not provide this information. If you have specified a Device tag, it does not exist on the device.

Is not Null

String, Date, Number, Tag

The device provides this information, but it can be any value. If you have specified a Device tag, it exists on the device, set to any value.

Contains

String

The device’s value contains your text string.

Not Contains

String

The device’s value does not contain your text string.

The value field is either a string, date, or numeric value, depending on the chosen rule name.

It may also be a Device tag. For more information about Deice tags, please refer to Device Tags page.

This field contains an icon that lets you delete the rule.

This field lets you grab the rule and change its order where there is more than one rule.

Rule examples

The following examples may help to illustrate the logic underpinning the rules you can build and apply to the Management Groups in your environment.

Rule example 1

"Device Netbios Name begins with 1ETRNW" OR ("Device Netbios Name begins with 1ETRNW" AND "Device Netbios Name begins with 1ETRN")

Is the same as saying:

"Device Netbios Name begins with 1ETRNW"

You could reduce this to the statement:

A OR (A AND B) = A

In our environment, this returns all five workstation devices with the NetBIOS name beginning 1ETRNW.

Rule example 1
Rule example 2

"Device Netbios Name contains 101" OR ("Device Netbios Name Contains 101" AND "Device Netbios Name Contains 71")

Is the same as:

"Device Netbios Name Contains 101"

Rule example 2

You could reverse the logic in the statement and say:

"Device Netbios name Contains 101" AND ("Device Netbios name Contains 101" OR "Device Netbios name Contains 71")

Which is the same as:

"Device Netbios Name Contains 101"

You could reduce this to the statement:

A AND (A OR B) = A

In our environment, this returns one workstation device with the NetBIOS name contains 101, which matches one device, 1ETRNW101.

Rule example 2b
Rule example 3

Management Group rules do not let you place a Boolean NOT operator around a grouping, but you can convert an expression into NOT rules, for example:

NOT ("Device Netbios Name Contains AP" OR "Device Netbios Name Contains CM")

Using rules, you can express this as:

"Device Netbios Name Not contains AP" AND "Device Netbios Name Not contains CM"

You could reduce this to the statement:

NOT (A OR B) = (NOT A) AND (NOT B)

In our environment this returns the six devices where the NetBIOS name does not contain AP or CM, which are 1ETRNAP, our application server, and 1ETRNCM, our Configuration Manager server.

Rule example 3
List of available rules

Rules used to create Management Groups, and connectors that provide the data to support the rules.

For details of how to create and use Management Groups, please refer to Management Groups page.

Warning

The number of rules that a single Management Group can contain is variable because of many factors including SQL Server version, server configuration and rule type used. 1E recommends not exceeding 10,000 rules per rule-based Management Group.

Rule name

Description

SCCM

ServiceNow

Tachyon

OracleLMS

BigFix

BigFixInv

Intune

vCenter

WSUS

Device ADSite Name

AD Site the device is connected to.

(tick)
(tick)

Device Assigned Cores

Maximum number of assigned cores for the device.

Derived from

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Classification

Classification of the device. For example, Test, Production or Development.

Note

Production is the default.

(tick)
(tick)
(tick)

Device Computer Name

Hostname of the computer.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Criticality

By default, Device Criticality is set as one of the following, as described in Using Device Criticality.

  • Undefined

  • Non-critical

  • Low

  • Medium

  • High

  • Critical.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Domain Name

Domain the device is installed on.

(tick)
(tick)
(tick)
(tick)

Device Inventory date

Date that the device was last updated.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Matched Device Type

Normalized device type based on chassis type. For example Desktop.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Matched Family

Normalized family of the device. For example, Aspire.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Matched Model

Normalized model of the device. For example, A30.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Matched Socket count

Normalized socket count of the device. For example, 1.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Matched Vendor

Normalized vendor name of the device. For example, Acer Inc..

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Netbios Domain name

NetBIOS version of the device's domain name.

(tick)
(tick)
(tick)

Device Netbios Name

NetBIOS version of the device name.

(tick)
(tick)
(tick)
(tick)

Device OS

The normalized product title of the OS that is running on the device.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Device Purchase date

Date that the device was purchased.

(tick)
(tick)

Device Serial

Serial number of the computer.

(tick)
(tick)
(tick)
(tick)

Device User Primary Username

The primary user of the device.

(tick)
(tick)

OU Name (Deprecated)

Name of the OU that the device is in. For example Sales.

Note

All OUs with the same name will be used, therefore the OU Path rule should be used instead. The OU Name rule is deprecated and should be re-defined using OU Path.

This rule is deprecated, which means it will continue to work until it is removed in a future version of Tachyon.

(tick)
(tick)

OU Path

The name or path of the OU location in the AD hierarchy, using pipe | as the delimiter.

For example, to get all the computers in OU=Sales, OU=Workstations, DC=acme, DC=local you can either specify Sales or - if there is more than one OU called Sales in the AD structure - specify the whole path acme.local|Workstations|Sales. Note that the DC and OU parts of a distinguished name are treated differently.

(tick)
(tick)

Processor Matched Chip Module Count

Normalized chip module count of the processor. For example, 1.

(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Core Count

Normalized core count of the processor. For example, 2.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Family

Normalized family name of the processor. For example, Athlon 64 X2.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Model

Normalized model name of the processor. For example, 3250e.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Processor Type

Normalized type of the processor. For example, Desktop.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Release Date

Normalized release date of the processor. For example, 31-03-2008.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Speed M Hz

Normalized speed of the processor. For example, 2.100.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Threads per Core

Normalized threads per core of the processor. For example, 1.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Processor Matched Vendor

Normalized vendor name of the processor. For example, Advanced Micro Devices, Inc.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Colloquial Version

Software colloquial version contained in the inventory source. For example, 2012.

Note

This will usually be blank.

(tick)
(tick)
(tick)
(tick)

Product Catalog Edition

Software edition contained in the inventory source. For example, Standard.

Note

This will usually be blank in SCCM unless the relevant MOF extensions have been installed.

(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Is Partial Version Matched

Flag that indicates whether the software title was partial matched or not (TRUE/1) or not (FALSE/0).

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Colloquial Version

Normalized software colloquial version. For example, 2016.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Edition

Normalized software edition. For example, Standard.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched End of Support

Normalized software end of support date that of that version. For example, 31-10-2008.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched is Bundle

Flag indicating whether the normalized software is a bundle (TRUE/1) or not (FALSE/0).

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Is License Required

Flag indicating whether that normalized software title requires a license (TRUE/1) or not (FALSE/0).

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Release Date

Normalized software release date of that version. For example, 31-10-2008.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Title

Normalized software title. For example, Office.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Vendor

Normalized software vendor name. For example, Microsoft Corporation.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Matched Version

Normalized software version. For example, 10.2.233.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Title

Software title contained in the inventory source. For example, Office Standard en_pack.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog UN Standard Product Service Code

UNSPC code of the normalized software title.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Vendor

Software vendor name contained in the inventory source. For example, Microsoft.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Catalog Version

Software version number contained in the inventory source. For example, 10.2.233.

(tick)
(tick)
(tick)
(tick)
(tick)
(tick)
(tick)

Product Install Date

Date that software installation was installed according to the inventory source.

(tick)
(tick)

Product Instance Name

Instance name if used by a product, for example MSSQLSERVER for SQL Server.

(tick)
(tick)
(tick)
(tick)
(tick)

Product Last Used date

Date that software installation was last run according to the inventory source.

(tick)
(tick)

Product Usage Category

Usage category assigned to a specific installation of a normalized software title. Potential categories are:

- Used

- Unused

- Rarely used

- Unreported

(tick)
(tick)
(tick)
(tick)