Home Print Show Topic URL Previous Next
IT Management Suite
Client Management Suite
Server Management Suite
Deployment Solution
Asset Management Suite

What you can do with CMDB Solution

CMDB Solution

See About CMDB Solution

CMDB Solution has many features and uses, including the following:

Define organizational groups and hierarchy.

Organizational configuration items such as departments and cost centers mirror the structure and hierarchy of your organization. CMDB Solution hierarchy features and child to parent relationships specify standard settings throughout an organizational hierarchy. For example, a task that is applied to a parent department can be automatically pushed down to child departments. Setting up organizational configuration items should be the first thing you do with CMDB Solution.

When you set up associations between configuration items during the CMDB Solution installation, organizational views are automatically created with the same hierarchy and membership.

See Setting up your organizational structure

Define configuration items.

Configuration items such as assets and contracts are entered into the database using predefined templates called configuration item types. The base configuration item types should be used when possible. The base configuration item types leverage other configuration item types. They provide summary data on the created configuration items and include associated reports and functionality that is not available in custom configuration item types. If none of the base configuration item types meet your needs, you can create a custom configuration item type.

You can specify default configuration item type values so that all configuration items based on a configuration item type are created with predefined values. When you enter data for assets, certain fields have the same value for many assets of a particular asset type. For example, users in a particular location have the same phone number prefix. You can save time by having the prefix already entered into the appropriate field.

See Creating a configuration item

Add data to the CMDB.

Importing is the easiest and the most efficient method of entering data into the system. You can also enter data manually. As you set up a configuration item management system, there is certain data that makes sense to enter before other data. For example, most configuration items rely on the availability of organizational data.

See Creating a configuration item

Clean up and configure data management with ready-made configuration items.

CMDB Solution lets you clean up and manage your data with predefined tasks. For example, you can perform an inventory-to-asset data synchronization, set the default computer ownership, merge duplicate computers, and identify the computers that are no longer in use.

See Running configuration item maintenance tasks

Track the associations and relationships of configuration items.

CMDB Solution adds a Resource Association Diagram tool that lets you view the relationships of configuration items in a graphical format. You can track where an asset is located, who owns an asset, and which assets are associated with each owner.

In the Resource Association Diagram, you can specify the format, the filter, and the number of levels and nodes to display. To customize and easily recreate the display for your environment, you can save the display options and filters.

See Tracking the associations of a configuration item

Create customized item actions and CMDB rules to manage data.

CMDB rules target a group of assets based on their type and properties, and then make changes to these assets. Out of the box configuration items address the most commonly required configuration item management policies. CMDB rules provide the flexibility to create custom policies for individual configuration item management needs.

Configure security.

If multiple users work with configuration items, for example entering and editing data, then you should configure security. CMDB Solution includes predefined security roles. You can modify predefined security roles or you can create your own roles. You can also restrict or allow access to configuration item types and data classes. Hierarchy features are used to set and enforce security settings throughout a hierarchy.

With the role-specific views, you can choose to show or hide menu items depending on a user's security role. For example, you can give a user access to the Reports menu but not to the Manage menu. You can also add menus and customize the sub-menus.

See Managing security on an organizational group