Before deploying agents , identify the machines you are going to deploy to. Depending where the machines are in your network, you will use different methods to install and manage the agents.
Leaky Faucet has to deploy agents into three different environments: the local LAN, across slow WAN links and firewalls but still in the same domain, and into a workgroup in their DMZ. The Leaky Faucet network is depicted in Figure 3-2.
Figure 3-2. Leaky Faucet’s network
Although the method of agent deployment and management will vary based on the target computer and the environment it is in, you will go through the same deployment process and management steps.
Identify the machines that you want to monitor, including network location and security context.
Prepare the machines that will be monitored, ensuring that they have sufficient disk space for the agent to use and that the Windows event logs and application logs are of sufficient size.
Set the desired configurations at the management-group level. For example, you can configure the management group to automatically install agents on every computer it becomes aware of, or require administrative approval before installing an agent.
Configure MOM 2005 to include or exclude computers in its management scope through computer discovery rules . Computer discovery is the process in which MOM actively scans the network for computers ...