Download presentation
Presentation is loading. Please wait.
Published byMelanie Stokes Modified over 9 years ago
1
DAY ONE Kaseya Advanced Workshop Kaseya University IT Scholars
Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.2 Last updated on June 25, 2012
2
Kaseya Advanced Workshop
INTRODUCTION
3
Kaseya Advanced Workshop
Pre-requisite Kaseya Fundamentals Workshop What is covered? Kaseya Advanced Topics Duration 2 day, 3 hours of lecture and lab per day 5 weeks or 35 days of access to portal and lab
4
What is included? 1 Certification Test
2 x 3 hours of instructor-led online sessions Delivered in two consequent days, 3 hours per day. 5 weeks (or 35 days) of unlimited access Training materials includes training videos, interactive videos, self-assessment quizzes, and reading material available 24x7. 80 hours of virtual lab Virtual labs include five dedicated virtual machines and one VSA account, accompanied with hands-on exercises and step-by-step instructions. 40 hours will expire after the first week 10 hours per week for the next 4 weeks 1 Certification Test
5
Certification Test Available 24x7 during the 35 days
The passing grade is 90 out of 100 Includes two parts: Theory 30 points 30 minutes for 30 multiple-choice or T/F questions Unlimited number of attempts; highest-grade Hands-on 70 points 2 hours to perform some randomly selected tasks Only one attempt is included for free
6
Why do I need the certificate?
With certificates in Fundamentals, Advanced, and SysAdmin your company will receive Premium Service Status. Contact your sales person for details of the advantages of Premium Service Status. Adding KCA to your resume will make you more competitive in the IT market.
7
Roadmap! Day One Day Two Advanced Agent Procedures Advanced Monitoring
Advanced Reporting
8
How can you ask your question?
Type your question in the GoToMeeting Chat From time to time, I will stop to answer them If you have a burning question, you can also raise your hand to indicate that you need an answer quickly! For offline questions, send them to
9
Kaseya Advanced Workshop
Virtual Labs Overview
10
Creating Your Account It would have been best if you had created your account prior to the workshop. If you have not done so, please do NOT try to create your account now, as you may fall behind of the lecture topics. You can create your account during the break or after today’s session. In the following slides, we will give you a quick overview of the process, so that you can create your account properly.
11
Note If you have created an account on for another workshop (e.g., Kaseya Fundamentals Workshop), you do not need to create another account. You can simply use your previously created account. You just need to enroll into the new course. If you forgot your password, as long as you remember either your username or the address that you used before, you can reset your password.
12
Let’s Start! Go to Create a new account
13
Create a New Account The required fields are marked by *
Username should be in the format of firstname.lastname and should NOT include: " / \ [ ] : ; | = , + * ? < Do not use your bank account password A good password is 6 to 10 characters long Use your work
14
Create a New Account Your Kaseya Customer ID is the first 6 letters of your Kaseya License Code (see System > License Manager). If you do not have a Skype/Google account, enter: “Do not have one!” If you do not know what is your Kaseya Sales Rep’s , just enter: For the course, select “Kaseya Advanced” For the delivery, select “Instructor Led” or “Self-Paced” as applicable.
15
Note After clicking on Create my new account button, you may receive a “Session Key Error” message This is related to the Cookie security settings in your browser. You can add to list of your trusted sites to address this issue. Alternatively, you can use Chrome as its default security settings are more relaxed than other mainstream browsers.
16
Create New Account Once successfully submitted, you will receive an confirmation with a link to confirm your account. After visiting the confirmation link, you can login to the portal Chrome is a preferred browser
17
Enroll In This Week’s Kaseya Advanced Course
Once successfully logged in, click on the Kaseya Advanced course for this week Note: If you do not see the list of courses, and you cannot find the All Courses button on the page, simply click on the ITA Portal link located at the top right of the page, and then click on the All Courses button.
18
Enroll In this week’s Kaseya Advanced Course
The enrollment key is 2012 Or the instructor would provide the key
19
Course Home Page You can safely ignore this part!
This Workshop You can safely ignore this part! You can safely ignore this part! Orientation Video Announcements Quick Links Show Only This Section Lecture Notes and Recorded Videos Four-Step Reinforcement Learning Course Topic
20
Workshop Course Home Page
News forum No need to visit this link as you receive an for any announcements posted. Quick Links: Access Your Virtual Lab You can access an already scheduled virtual lab or schedule one on-demand. Pre-Schedule Your Virtual Lab (Optional) You can pre-schedule, edit, and cancel your virtual labs and certification tests. Check for Your Remaining Quota (Optional) You can check how much of your quota is still available. Request for More Quota (Optional) You can request for more quota, if need be.
21
Access You Virtual Lab If you have not scheduled your virtual lab yet, you will see this window, allowing you to schedule your virtual lab on demand. Schedule for 3 hours.
22
Pre-Schedule Your Virtual Labs (Optional)
23
Check Your Remaining Quota (Optional)
600 minutes or 10 hours of virtual lab per week
24
Request for More Quota (Optional)
25
Workshop Course Home Page (cont.)
Lecture Slides and Recorded Videos The most updated lecture slides and recorded videos can be downloaded from the links listed here. Course Topics Each course topic has its own separate section. It follows the Four-Step Reinforcement Learning Process. You can click on the hollow square on the right side of each separate section to focus on the training materials listed under only that section.
26
4-Step Reinforcement Learning
Step 1: Being Exposed! A new concept is introduced by the instructor. If you missed it, you can watch the streaming videos before the next lecture. Step 2: Getting Involved! (Optional) If after listening to the lecture (or watching the videos in Step 1), you have not yet comfortable with all the concepts, you can practice using the interactive videos after the lecture is over. Step 3: Practice Makes Perfect! You can practice using your dedicated virtual lab during the lecture sessions, following the steps introduced by the instructor. If you fall behind, just listen to the lecture and take notes. You can perform your lab assignments after the lecture is over. Step 4: Mastering the Concepts! (Optional) You can read about all the detailed functions available in each Kaseya module by reading the corresponding book chapters. You can then assess your knowledge by taking a quiz.
27
Background Story Imagine that you were hired by Florida International University (FIU) as the lead IT Administrator to manage 500 computers. Obviously, we cannot provide each one of you with 500 computers to play with! Instead, we provide each one of you with a virtual environment that has One shared SaaS Kaseya Server 5 dedicated virtual machines One NAT router
28
Background Story The virtual machines are distributed in four buildings School of Computing & Info. Sciences (SCIS) Machine Room (MR) Green Library (GL) College of Engineering & Computing (CEC) More information about your environment 1 x KServer (a SaaS Account with System Role) 1 x Windows 2003 Server (Domain Controller) 4 x Windows XP (only 2 in the domain) 1 x Linux (playing as a NAT router)
29
FIU’s Network Diagram Internet SCIS MR GL CEC … … … …
Your Laptop/Desktop Kaseya Server Internet /24 /24 NAT ROUTER /24 /24 Instruction Lab Machine Room Guest Desktops PCs & Laptops ws1 guest1 pc1 dc … … … … SCIS MR GL CEC
30
Technical Information
KServer: saas12.kaseya.net NAT Router has 4 network cards: , 1.1, 2.1 and 3.1 SCIS hosts workstation 1 (ws1) with one card: ws1.scis.fiu.edu MR hosts domain controller (dc) with 3 cards: dc.mr.fiu.edu , 1.10, and 3.10 GL hosts guest 1 (guest1) with one card: guest1.gl.fiu.edu CEC hosts personal computer 1 (pc1) and laptop 1 (laptop1), each with one card: pc1.cec.fiu.edu laptop1.ced.fiu.edu –
31
Let’s Start Our Virtual Labs
Find the link to Virtual Lab and clink it. Simply enter hours/minutes and Confirm. Three hours may be sufficient for today.
32
Virtual Labs Portal Network Diagram
The network diagram should be explained quickly one last time to make sure that everyone is familiar with the background scenario. Explain Layout with some reasoning of school layout.
33
Virtual Labs Portal Data Sheet
34
Virtual Labs Portal Connection Info
Link to the KServer RDP connection information to your five dedicated virtual machines HostName:PortName
35
Alternative Ways to RDP to Your Virtual Machines
You can use any RDP client of your choice Windows Microsoft Terminal Server Console (mstsc.exe) MAC Remote Desktop Connection CoRD Linux Rdesktop Web Browser webRDP, an applet embedded in the Virtual Lab Portal …
36
Connecting to Your Virtual Machines Using mstsc.exe
On your local Windows Machine Go to Start > Run Type mstsc.exe
37
Use mstsc.exe to connect to dc
Enter Host:Port for Computer; see Data Sheet Enter your own username and password Domain is FIU
38
Use webRDP to connect to dc
39
Note on RDP Connections
Sometimes when using webRDP, you may experience that the keyboard and/or mouse do not work. Simply reconnect to resolve the issue (click on the tab). To improve the performance of your RDP sessions, you should get rid of the background wallpaper in the XP machines. For slow connections, you may choose to use 5 instances of mstsc.exe rather than webRDP.
40
Control Buttons and Timer
You do not need these buttons for any of the exercises, but just in case you want full control over your dedicated machines, they are provided to you. Note: Refresh provides you with a fresh copy of the virtual machine! Using + or – you can adjust the remaining time of your virtual lab. Use the eject button to cancel your lab.
41
Your Account on KServer
After scheduling your virtual lab for the first time, a tenant account on our SaaS KServer will be automatically created for you and your username and password will be synced with your account at IT Scholars. Note: Your account on VSA is only active during a scheduled virtual lab. If it complains that your account is disabled, it simply means that your virtual lab ran out of time or you forgot to schedule one.
42
Final Notes on Virtual Labs
Before working on the labs, make sure that you are completely familiar with the background story the network diagram the building names the name of the virtual machines Sometimes we refer to your virtual machines as servers and workstations Servers: dc Workstations: ws1, guest1, pc1, and laptop1
43
Final Notes on Virtual Labs (cont.)
Please Follow the Presentation Don’t worry if you can’t complete the LABs. You can finish the labs as homework. Review Steps Watch the streaming videos (Step 1) Work with the Interactive Videos (Step 2) Practice in Your Virtual Lab (Step 3) Check the correctness of your work by looking at the screenshots included lab review slides at the beginning of the next slide set. Scan the Book Chapter & Take the Quiz (Step 4)
44
Progress Check Were you able to create your account on and enroll in the course? Are you familiar with the IT Scholars’ LMS Web site? Are you familiar with the Kaseya Advanced Course Home Page? Were you able to download the lecture slides for Day One? Were you able to start your virtual lab? Were you able to logon to the Kaseya VSA?
45
Questions? Please type your questions in the chat section of your GoToMeeting window. Remember that you can always send your questions to too. If you are falling behind the steps in the lab, please just watch the presentation, take some notes, and perform your labs after the lecture.
46
Kaseya Advanced Workshop
Agent Procedures
47
Roadmap! Day One Day Two Day One Day Two Advanced Agent Procedures
Advanced Monitoring Advanced Reporting Day One Advanced Agent Procedures Day Two Advanced Monitoring Advanced Reporting
48
Good Practices Usage of Best Practices Using Best Practices
Best practices are practices that the industry has come up with as generally the best way of operating an activity. Using Best Practices Using Best Practices in your organisation, combined with your own values, opinions and experience turns them into Good Practices. Since long we have all been propagating to each other we should use the best practices, for they are the preferred and recommended way of operating. Although we did apply our own thoughts in some cases to these best practices, nowadays it is important to take that even further. Best Practices doesn’t ensure you are operating in accordance with your customers needs, on contrary, best practices are creations of our suppliers side of business. Nowadays it is important to listen to your customers needs, know what the needs of your customers are and mold your services around that need. We like to take that thought and bring that in to your Kaseya configuration, encourging you to adopt the best and change the rest to fit your needs, not the needs of what is generally thought of being the best. To help you along we have already come up with a few good practices, sitting in your seat with regard to agent procedures, what should you at least have in place to have a consistent methodoly of creation procedures that is independent on personal ideas, conflicting with
49
Good Practices Good Practices consist of: Naming conventions
Never use spaces in names 1st step = Agent Working Directory 2nd step = Unique storage location 3rd & Last step = Work Nice & Clean Use the Agent Procedure log Enable Reporting Use notes & description fields Naming conventions are important for quick creation of procedures and understanding previous made procedures. Spaces in any names your use on computer systems cause havoc once you start writing procedures (or scripts & programs for that matter). You would have to use quotes in DOS commands and the more complex these get, the more difficult it is to figure our how to deal with quotes. I have found myself that in one case I had to use up to 6 double quotes to get a DOS command to work. Always, or almost always, start of with creatign a variable that contains the Agent Working Directory, 9 out of 10 times you will need that directory to store temporary files for checking, execution or results. The only circumstance I have found it necessary to have another command prevail as the first step is when you need to enter a constant value in a variable, it is just easier to have that up as the first step rather then having to browse through the procedure match the line you need. Just the working directory alone for the storage of temporary files isn’t enough I feel. Creating a sub-directory in that working directory gives you a nice and confined space to use without the risk of overwriting fils that accidently have the same name. the 3rd and also always the last step in your procedure is to delete any temporary files existent in your sub-directory we just spoke about. The 3rd step cleaning action is used to clear any left behind files from the previous procedure execution, maybe caused by file locks. The last step in your procedure you will also clear out that sub-directory, because you’re done with the work and want to make sure that the at next execution time of the procedure it isn’t possible for it to use old data creating false reports and alarms. Use the Agent Procedure Log to log progress of your procedure, that way you will be able to look back in the log and see if execution was indeed successful, it did what is was supposed to do, but most imporantly to enable good reporting. Reporting on your activities is most important to you and for your customers. They show what you have done to earn the money your customers pay you and are the foundation of your Network Health Score. You need to use consitent and unique log entries that uniquely identify a specific sitation for each possbible outcome of the procedure. Typically, OK and NOT OK. In the next slides we will go over these once more with examples and more explanation.
50
File Management Copy Files TO Agent Copy Files FROM Agent
Write File Get URL Shell commands (copy, xcopy, robocopy) Copy Files FROM Agent GetFile copy to server Shell Commands Transfer File Delete Files and Directories Rename Files Execute File Compression or Extraction of Files
51
Variables Managed Variables Procedure Variables
Operating System Environment Variables Global Variables
52
Variables Results of Agent Procedures
NOTE: which step it ran and which variables has values.
53
Credentials To run tasks you must have appropriate credentials
Agent Procedures runs with either User Logged in credentials or Kaseya provided credentials Logged In user is gathered by the KaUsrTsk.exe Kaseya Provided credentials Agent – Credentials Give Current User Admin Rights Impersonate User
54
CCleaner Check to see if CCleaner exists
Run the CCleaner to cleanup files with the /Auto parameter IF NOT then download the installer and install CCleaner application
55
Editing The HOSTS Text File
Redirecting Website request to block access to unwanted websites
56
Monitoring Creating Alerts Collect information with Agent Procedures
Eventcreate Send s Create Ticket (use reader) Collect information with Agent Procedures CPU Utilization sample File Size and Directory Structure Inventory Remediate alerts with Agent Procedures Refer to CCleaner
57
Monitoring Event Create – creates an event into the Windows Event Log. Test for a specific state when met execute a shell command to create an event. EVENTCREATE [/S system [/U username [/P [password]]]] /ID eventid [/L logname] [/SO srcname] /T type /D description Description: This command line tool enables an administrator to create a custom event ID and message in a specified event log. Parameter List: /S system Specifies the remote system to connect to. /U [domain\]user Specifies the user context under which the command should execute. /P [password] Specifies the password for the given user context. Prompts for input if omitted. /L logname Specifies the event log to create an event in. /T type Specifies the type of event to create. Valid types: SUCCESS, ERROR, WARNING, INFORMATION. /SO source Specifies the source to use for the event (if not specified, source will default to 'eventcreate'). A valid source can be any string and should represent the application or component that is generating the event. /ID id Specifies the event ID for the event. A valid custom message ID is in the range of /D description Specifies the description text for the new event. /? Displays this help message. Examples: EVENTCREATE /T ERROR /ID /L APPLICATION /D "My custom error event for the application log" EVENTCREATE /T ERROR /ID 999 /L APPLICATION /SO WinWord /D "Winword event 999 happened due to low diskspace" EVENTCREATE /S system /T ERROR /ID 100 /L APPLICATION /D "Custom job failed to install" EVENTCREATE /S system /U user /P password /ID 1 /T ERROR /L APPLICATION /D "User access failed due to invalid user credentials"
58
Searching for Unwanted Files
Creating an Alert for Unwanted Files Create a custom field within Kaseya to flag for unwanted files Create an Alert within Kaseya Monitoring Module when an unwanted file is found Example – Searching for all MP3 and MP4 files. If found create an Event Log Entry that Kaseya will create the appropriate alert to.
59
Searching Unwanted Files
Collect information with Agent Procedures Example of looking for all .mp3 and .mp4 files
60
Searching Unwanted Files
Collect information with Agent Procedures Example of looking for all .mp3 files <?xml version="1.0" encoding="utf-8"?> <ScriptExport xmlns:xsi=" xmlns:xsd=" xmlns=" <Procedure name="Search for unwanted files" treePres="3" id=" " folderId=" "> <Body description=""> <Statement description="Create a named procedure variable and assign a value retrieved from the managed machine by the agent." name="GetVariable" continueOnFail="false"> <Parameter xsi:type="EnumParameter" name="VariableType" value="AgentTempDirectory" /> <Parameter xsi:type="StringParameter" name="SourceContent" value="" /> <Parameter xsi:type="StringParameter" name="VariableName" value="agtworkdir" /> </Statement> <Parameter xsi:type="EnumParameter" name="VariableType" value="Prompt" /> <Parameter xsi:type="StringParameter" name="SourceContent" value="Enter extension of files to search for (i.e. mp3): " /> <Parameter xsi:type="StringParameter" name="VariableName" value="fileext" /> <Statement description="Display a message dialog to the user." name="SendMessage" continueOnFail="false"> <Parameter xsi:type="StringParameter" name="Message" value="running command
dir c:\*.#fileext# /S /O >> #agtworkdir#\unwantedfiles\#fileext#list.txt" /> <Parameter xsi:type="BooleanParameter" name="Immediate" value="True" /> <Statement description="Execute the given command as if it were typed in at a command prompt." name="ExecuteShellCommand" continueOnFail="false"> <Parameter xsi:type="StringParameter" name="Command" value="dir c:\*.#fileext# /S /O >> #agtworkdir#\unwantedfiles\#fileext#list.txt" /> <Parameter xsi:type="EnumParameter" name="ExecuteAccount" value="User" /> <Parameter xsi:type="BooleanParameter" name="Is64Bit" value="False" /> </Body> </Procedure> </ScriptExport>
61
Monitoring Collect information with Agent Procedures
CPU Utilization sample Create a Monitor Set to check for CPU Utilization Assign Monitor set and select Agent Procedure as one of the notification type Call on Agent Procedure “Process Utilization List (KPerfMon)” Grabs the Process List and Utilization of machines processes and outputs to Agent Procedure Logs, GetFiles Location for the Agent, and archives to Kaseya Server also.
62
CPU Processes List
63
Searching Unwanted Files
Procedure creates a file with the unwanted file extension #fileext#list.txt file in the Agent Working directory\UnWantedFiles folder. Options on what to do with the results file???? Copy to Kaseya Server? Store on the local machine? Create an alert if unwanted files are found on the machine. Use a conditional statement and Event Create Create a report to list all machines with Unwanted Files Found Create a view to filter machines with Unwanted Files Add a Custom Field to be updated by the procedure
64
Installing and Updating Adobe Reader
Create a view to filter machines with missing Adobe Reader X (10.1) Agent Procedures GET URL – ftp://ftp.adobe.com/pub/adobe/reader/win/10.x/10.1.3/en_US/AdbeRdr1013_en_US.exe Execute File with the following command line switches /sAll /rs /msi EULA_ACCEPT=YES REMOVE_PREVIOUS=YES /qn
65
Questions? Please type your questions in the chat section of your GoToMeeting window. Remember that you can always send your questions to too. If you are falling behind the steps in the lab, please just watch the presentation, take some notes, and perform your labs after the lecture.
66
Roadmap! Day One Day Two Day One Day Two Advanced Agent Procedures
Advanced Monitoring Advanced Reporting Day One Advanced Agent Procedures Day Two Advanced Monitoring Advanced Reporting
67
The End!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.