Baseline inventory lets you track and compare the changes in files and registry keys for different computers. You generate a baseline that identifies the files or registry settings of a standard configuration computer. You can later run the compliance scans on your client computers to compare their current files or registry keys with those in the baseline. The differences between the baseline scan and compliance scan are reported to the Configuration Management Database (CMDB).
You can use the baseline inventory for the following purposes:
The baseline inventory is the same for file and registry baselines. However, the configuration files, snapshot files, and tasks differ. The baseline configuration file contains the options that determine the files or registry settings to scan. You can use the default configuration file, edit it, or create one or more custom configuration files.
See About baseline files.
The compliance scan compares the current files or registry keys on one or more computers with the baseline snapshot (.
BLS) files. The differences between the baseline and the compliance scans are written to an output file on the scanned computer and reported to the CMDB.
The baseline scan and the compliance scan report information about the computers that were scanned and the scan results. You can use notification tasks to automatically notify the system administrator or the help desk when certain events occur. This feature helps you prevent the system failures that might occur when a computer becomes non-compliant.
Rate this Article