Dell Command Monitor User Guide
Dell Command Monitor User Guide
4
User's Guide
December 2020
Rev. A00
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
Contents
Contents 3
Chapter 6: Managing Dell client systems locally using Dell Command | Monitor 10.4.................... 21
Managing Windows systems locally using PowerShell..............................................................................................21
Managing Linux systems locally using OMICLI...........................................................................................................22
Chapter 7: Managing Dell client systems remotely using Dell Command | Monitor 10.4................ 23
Managing Windows system through Windows system remotely using PowerShell......................................... 23
Managing Linux system remotely through Windows system using WinRM........................................................23
Managing Linux system remotely through a Linux system using WSMan...........................................................24
4 Contents
1
Introduction to Dell Command | Monitor 10.4
The Dell Command | Monitor software application enables IT administrators to easily manage fleet inventory, monitor system
health, modify BIOS settings, and remotely collect information for deployed Dell client systems.
Active system health state monitoring can help reduce the total cost of system ownership and is part of a holistic approach to
managing all networked devices.
Dell Command | Monitor is designed for Dell Enterprise client systems, Dell IoT Gateway systems, and for Dell Embedded PCs.
This document provides an overview of Dell Command | Monitor and its features. For more information about supported Dell
systems see Release notes available on dell.com/dellclientcommandsuitemanuals.
Topics:
• What's new in this release for Dell Command | Monitor 10.4
• Dell Command | Monitor overview
Dell Command | Monitor manages client systems using the management protocols Common Information Model (CIM) standard
and Simple Network Management Protocol (SNMP). This helps to reduce the total cost of system ownership, improves security,
and provides a holistic approach to manage all the devices within a network device.
Using CIM you can access Dell Command | Monitor through Web Services for Management Standards (WSMAN).
Dell Command | Monitor contains the underlying driver set that collects client system information from different sources
including the BIOS, CMOS, System Management BIOS (SMBIOS), System Management Interface (SMI), operating system, and
Application Programming Interface (APIs). Dell Command | Monitor for Windows also collects client system information from
NOTE: Default installation does not enable SNMP support. For more information about enabling SNMP support for Dell
Command | Monitor for Windows, see Dell Command | Monitor Installation Guide.
SCCM integration
You can integrate SCCM with Dell Command | Monitor for Windows by:
● Using the MOF file within Dell Command | Monitor install package, which contains all the Dell Command | Monitor classes
and importing to ConfigMgr
The MOF is located at:
C:\Program Files\Dell\Command_Monitor\ssa\omacim\OMCI_SMS_DEF.mof
Scenario 4: Profiles
NOTE: DMTF profiles are implemented for Dell Command | Monitor for Windows only.
IT administrators are required to manage client systems in multi-vendor and distributed enterprise environments. They face
challenges as they must master a diverse set of tools and applications while managing several desktop and mobile client systems
in various networks. To reduce the cost of these requirements and represent the provided management data, the industry-
standard Distributed Management Task Force (DMTF) and Data Center Infrastructure Management (DCIM-OEM) profiles are
implemented in Dell Command | Monitor. Some of the DMTF profiles are explained in this guide.
For more information on Dell Command | Monitor, see Dell Command | Monitor Reference Guide at dell.com/
dellclientcommandsuitemanuals.
For more information on Dell Command | Monitor, see Client Command | Monitor Reference Guide.
Battery profile
● Determine the status of the battery by enumerating or getting the instance of the class DCIM_Battery.
● Determine the estimate run time and see the estimated remaining charge.
● Check if the health information of the battery can be determined using the properties Operational Status andHealthState of
the class DCIM_Battery.
● Get additional information about the health of a battery using DCIM_Sensor.CurrentState property or the
CIM_NumericSensor.CurrentState property.
Boot control
● Change the sequence of the boot items in the Legacy and UEFI boot list.
● Enable or disable the boot items in the Legacy and UEFI boot list.
● Find the current boot configuration by enumerating the instances of the class DCIM_ElementSettingData whose
IsCurrent property is set to 1. The DCIM_BootConfigSetting represents the current boot configuration.
Log record
● Identify the log name by selecting the DCIM_RecordLog instance in which the ElementName property corresponds to the
log name.
● Find the individual log entries. Get all the instances of DCIM_LogEntry that are associated with the given instance of
DCIM_RecordLog through the DCIM_LogManagesRecord association. Sort the instances based on the RecordID.
● Check whether record logs are enabled or not by enumerating the instance of the class DCIM_RecordLog whose property
Enabledstate is set to 2 (represents enabled) and EnabledState is set to 3 (represents disabled).
● Sort the log records based on the time stamp of the log entry. Get all the instances of DCIM_LogEntry that are associated
with the given instance of DCIM_RecordLog through the DCIM_LogManagesRecord association. Sort the instances of
DCIM_LogEntry based on the CreationTimeStamp property value in Last In First Out (LIFO) order.
● Clear logs by running the ClearLog() method for the given instance of the DCIM_RecordLog.
Physical asset
● Obtain the physical inventory for all the devices in a system.
● Obtain the physical inventory for a system chassis.
● Determine the part number of a failing component.
● Determine whether the slot is empty or not.
Configuration file
You can update the configuration file log.property available at /opt/dell/dcm/conf to apply the desired settings and
DEBUG:
NOTE: Restart the OMI server after making any change in the configuration file to apply the changes.
● Log_Level — There are three log levels to segregate the system messages: ERROR, INFO, DEBUG
The user can change the log level from the configuration file. If the log level is set to DEBUG, the Dell Command | Monitor
application log will send all the information in to the specified log file.
Boot configurations
NOTE: Dell Command | Monitor for Linux does not offer the boot configuration capabilities. So this section is not applicable
for Dell Command | Monitor for Linux.
A client system can have one of two types of boot configuration:
● Legacy (BIOS)
● UEFI
In Dell Command | Monitor, the boot configuration (Legacy or UEFI) is modeled using the following classes:
● DCIM_ElementSettingData
● DCIM_BootConfigSetting
● DCIM_OrderedComponent
● DCIM_BootSourceSetting
● DCIM_SmartAttributeInfo
NOTE: The terms Boot Configuration and Boot List Type are used interchangeably and convey the same meaning
representing Legacy or UEFI.
● To list the warranty entitlements in chronological order of WarrantyEndDate, run the following command:
● To disable the warranty feature and subsequent refresh calls, run the following command:
DCIM_ApplicationProxySetting class is used to modify the proxy settings for Dell Command | Monitor as per the
proxy environment.
DCIM_BootConfigSetting
An instance of DCIM_BootConfigSetting represents a boot configuration that is used during the boot process. For example,
on client systems, there are two types of boot configurations—Legacy and UEFI. So, DCIM_BootConfigSetting has a
maximum of two instances to represent, one each for Legacy and UEFI.
You can determine if the DCIM_BootConfigSetting represents Legacy, using the following properties:
● InstanceID = "DCIM:BootConfigSetting:Next:1"
● ElementName = "Next Boot Configuration Setting : Boot List Type 1"
You can determine if the DCIM_BootConfigSetting represents UEFI, using the following properties:
● InstanceID = "DCIM:BootConfigSetting:Next:2"
● ElementName = "Next Boot Configuration Setting : Boot List Type 2"
DCIM_BootSourceSetting
This class represents the boot devices or sources. The ElementName, BIOSBootString, and StructuredBootString
properties contain a string that identifies the boot devices. For example, floppy, hard disk, CD/DVD, network, Personal
Computer Memory Card International Association (PCMCIA), Battery Electric Vehicle (BEV), or USB. Based on the boot list type
of the device, an instance of DCIM_BootSourceSetting is associated with one of the instances of
DCIM_BootConfigSetting.
DCIM_OrderedComponent
The DCIM_OrderedComponent association class is used to associate instances of DCIM_BootConfigSetting with instances
of DCIM_BootSourceSetting representing one of the boot list types (Legacy or UEFI) to which the boot devices belongs. The
GroupComponent property of DCIM_OrderedComponent refers to the DCIM_BootConfigSetting instance and the
PartComponent property refers to the DCIM_BootSourceSetting instance.
DCIM_ThermalInformation
DCIM_ThermalInformation manages thermal configuration settings such as Thermal Mode, AAC Mode, and Fan Failure Mode.
● To query the thermal information about device, run the following command:
NOTE: Make sure the TPM option is cleared in the BIOS before following the procedure to enable the TPM.
To enable TPM,
1. Set the BIOS password on the system if not set already using the following PowerShell command:
Get-CimInstance -Namespace root\dcim\sysman -ClassName DCIM_BIOSService | Invoke-
CimMethod -MethodName SetBIOSAttributes -Arguments
@{AttributeName=@("AdminPwd");AttributeValue=@("<Admin password>")}
NOTE: Make sure the TPM option is cleared in the BIOS before following the procedure to enable the TPM.
NOTE: The selector set values (SystemName=<system name from DCIM_BIOSService class>winrm i SetBIOSAttributes
wsman/DCIM_BIOSService?SystemName=dt: +SystemCreationClassName=DCIM_ComputerSystem
+Name=DCIM:BiosService+CreationClassName=DCIM_BIOSService+) are used for set operation in this example.
2. Set the BIOS password on the system if not set already using the following command:
winrm i SetBIOSAttributes http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/
DCIM_BIOSService?__cimnamespace=root/dcim/sysman+Name=DCIM:BiosService
+SystemCreationClassName=DCIM_ComputerSystem+SystemName=<system name from
DCIM_BIOSService class>+CreationClassName=DCIM_BIOSService -r:https://<system IP or
system name>:5986 -u:<user name> -password:<password> -auth:basic -skipCAcheck -
skipCNcheck -encoding:utf-8 @{AttributeName="AdminPwd";AttributeValue="<Password>"}
3. Enable TPM security by running the following command:
winrm i SetBIOSAttributes "http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/
DCIM_BIOSService?__cimnamespace=root/dcim/sysman+Name=DCIM:BiosService
+SystemCreationClassName=DCIM_ComputerSystem+SystemName=<system name from
DCIM_BIOSService class>+CreationClassName=DCIM_BIOSService -r:https://<system IP or
system name>:5986 -u:<user name> -password:<password> -auth:basic -skipCAcheck -
skipCNcheck -encoding:utf-8 @{AttributeName="Trusted Platform
Module";AttributeValue="1";AuthorizationToken="<Admin password>"}
4. Restart the system.
5. Activate the TPM using the following command:
winrm i SetBIOSAttributes "http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/
DCIM_BIOSService?__cimnamespace=root/dcim/sysman+Name=DCIM:BiosService
+SystemCreationClassName=DCIM_ComputerSystem+SystemName=<system name from
DCIM_BIOSService class>+CreationClassName=DCIM_BIOSService -r:https://<system IP or
system name>:5986 -u:<user name> -password:<password> -auth:basic -skipCAcheck -
skipCNcheck -encoding:utf-8 @{AttributeName=("Trusted Platform Module
Activation");AttributeValue=("2");AuthorizationToken="<Admin password>"}
You can set BIOS attributes on the systems running Linux using the WSMan. The procedure is explained below using a task of
enabling the Trusted Platform Module (TPM) as an example.
NOTE: Ensure that the TPM option is cleared in the BIOS before following the procedure to enable the TPM.
$a = 0
$timespan = New-Object System.TimeSpan(0, 0, 1)
$scope = New-Object System.Management.ManagementScope("\\.\root\dcim\sysman")
$query = New-Object System.Management.WQLEventQuery("Select * from
DCIM_AlertIndication")
$watcher = New-Object System.Management.ManagementEventWatcher($scope,$query)
[array]$alerts=@()
do{ $watcher.WaitForNextEvent() }
while ($a -ne 1)
Managing Dell client systems locally using Dell Command | Monitor 10.4 21
NOTE: Improvement Program is available for DCM 10.4 x64-bit version only.
● Commands to get Proxy from WMI:
22 Managing Dell client systems locally using Dell Command | Monitor 10.4
7
Managing Dell client systems remotely using
Dell Command | Monitor 10.4
You can manage Dell client systems remotely using any of the following methods:
● For systems running Windows, Managing Windows system through Windows system remotely using PowerShell on page 23
● For systems running Linux, Managing Linux system remotely through Windows system using WinRM on page 23
Topics:
• Managing Windows system through Windows system remotely using PowerShell
• Managing Linux system remotely through Windows system using WinRM
• Managing Linux system remotely through a Linux system using WSMan
To use Windows PowerShell remotely, the remote computer must be configured for remote management. For more
information, including instructions, run the PowerShell command – Get-Help about_remote_requirements.
Managing Dell client systems remotely using Dell Command | Monitor 10.4 23
In the command-line interface, run
24 Managing Dell client systems remotely using Dell Command | Monitor 10.4
8
Frequently asked questions for Dell
Command | Monitor 10.4
How do I find the boot order (sequence) of the boot configuration using DCIM_OrderedComponent.AssignedSequence
property?
When a DCIM_BootConfigSetting instance (Legacy or UEFI) has multiple DCIM_BootSourceSetting instances (boot
devices) associated with it through instances of the DCIM_OrderedComponent association, the value of the
DCIM_OrderedComponent.AssignedSequence property is used to determine the sequence in which the associated
DCIM_BootSourceSetting instances (boot devices) are used during the boot process. A DCIM_BootSourceSetting, whose
associated CIM_OrderedComponent.AssignedSequence property is equal to 0 is ignored and not considered part of the
boot order.
How do I change the boot order?
The boot order can be changed using the DCIM_BootConfigSetting.ChangeBootOrder() method. The
ChangeBootOrder() method sets the order in which the instances of DCIM_BootSourceSetting are associated with a
DCIM_BootConfigSetting instance. The method has one input parameter; Source. The Source parameter, is an ordered
array of PartComponent property from DCIM_OrderedComponent class that represents the association between
DCIM_BootSourceSetting instances (boot devices) and DCIM_BootConfigSetting instance (boot list type-Legacy or UEFI).
How do I disable boot devices?
On changing the boot order, the value of the AssignedSequence property on each instance of DCIM_OrderedComponent,
that associates the target DCIM_BootConfigSetting instance with a DCIM_BootSourceSetting instance that is not present
in the input array of Source parameter, is set to 0, which indicates that the device is disabled.
Failed login message is displayed when <what is tying to connect> tries to connect to namespace with wbemtest.
Launch wbemtest with Administrator privilege level to overcome any login message. Go to the Internet Explorer from the All
Programs list, right-click, and Run as administrator to start the wbemtest and avoid a namespace error.
How do I run Knowledge Library scripts without any issues?
The following are the steps to run the VBS scripts provided in Dell Command | Monitor Knowledge Library link:
1. Configure winrm on the system using the command winrm quickconfig.
2. Check if the token support exists on the system by seeing:
● The F2 Screen in BIOS Setup.
● Using tool like wbemtest to check that the key values define in the script to be existing on the system.
NOTE: Dell recommends using the latest BIOS available at dell.com/support. For more information, see Dell Command
| Monitor Reference guide at dell.com/dellclientcommandsuitemanuals.
In sensor monitoring, Dell Command | Monitor supports monitoring and alerting of voltage, temperature, amperage, cooling
devices (fan) and chassis sensors.
For more information about class and alerting, see Dell Command | Monitor Reference guide at dell.com/
dellclientcommandsuitemanuals.
Can Dell Command | Monitor be integrated with other applications/consoles?
Yes, Dell Command | Monitor interfaces with leading enterprise management console that support industry standards. It can be
integrated with the following existing enterprise management tools:
● Dell Client Integration Suite for System Center 2012
● Dell OpenManage Essentials
● Dell Client Management Pack for System Center Operation Manager
Can I import classes into SCCM for inventory?
Yes, individual MOFs or OMCI_SMS_DEF.mof files can be imported in SCCM console for inventory.
Where is the SCCM OMCI_SMS_DEF.mof file located?
The OMCI_SMS_DEF.mof file is at C:\Program Files\Dell\Command_Monitor\ssa\omacim\OMCI_SMS_DEF.mof.
How to configure proxy for DCM 10.2.1?
DCM 10.2.1 is unable to fetch warranty information.
Check if the Application proxy settings are correctly configured using DCIM_ApplicationProxySetting Class.
How can I configure a Proxy credential for Dell Command | Monitor.
If you have logged in through Dell Command | Monitor, you can use the same credentials for proxy authentication.
3. Edit the registry change on the client system. Click Start > Run, then type regedit, and then click OK. In the Registry
Editor window, browse to My Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa.
4. Set the forceguest value to 0 (default value is 1). Unless you modify this value, the user remotely connecting to the system
has guest privileges, even if the supplied credentials provide Administrator privileges.
a. Create an account on the client system with the same username and password, as an administrator account on the
system running the WMI management application.
b. If you are using IT Assistant, run the IT Assistant ConfigServices utility (configservices.exe in the/bin directory
under the IT Assistant installation directory). Configure IT Assistant to run under a local administrator account, which is
also now an administrator on the remote client. Also, verify that DCOM and CIM are enabled.
c. If you are using IT Assistant, use the administrator account to configure subnet discovery for the client system. Enter the
username as <client machine name>\<account name>. If the system has already been discovered, remove the system
from the list of discovered systems, configure subnet discovery for it, and then rediscover it.
NOTE: Dell recommends using Dell OpenManage Essentials as replacement for IT Assistant. For more information on
Dell OpenManage Essentials, see, dell.com/dellclientcommandsuitemanuals.
5. Perform the following steps to modify user privilege levels for connecting remotely to a system’s WMI:
a. Click Start > Run, type compmgmt.msc, and then click OK.
Contacting Dell 31