Inventory Advanced Options:
Run Options
Tab

On an inventory policy or task page, at
Advanced > Run Options
, you can configure the run options of an inventory scan.
Options on the
Run Options
tab
Option
Description
Send inventory changes (deltas) only
(This option is not available for stand-alone inventory packages.)
You check this box to send only the information about the changes since the previous inventory. This way, less inventory data is sent across the network to the CMDB.
You might want to resend a complete inventory in the following cases:
  • You reset or cleaned-up your CMDB data.
  • You purged the inventory data.
  • For troubleshooting purposes, you might want a full inventory of a computer or application folder.
Enable verbose client logging
(This option is not available for stand-alone inventory packages.)
You check this box to include additional trace information in the client log.
You can use this option to troubleshoot a problem. For example, the inventory task runs on the computer, but the data is not reported in the database.
For Windows computers, the location of the log file is stored in the registry on the Notification Server computer.
HKEY_LOCAL_MACHINE\SOFTWARE\Altiris\eXpress\Event Logging\Log File
Key Name: Filepath
For UNIX, Linux, and Mac computers, when you check this box, a separate log file with detailed logging is created for every task. The files are created in <agent install dir>/inventory/var/log/ directory (by default,
/opt/altiris/notification/inventory/var/log/
).
Access network file systems (UNIX/Linux/Mac)
(This option is not available for stand-alone inventory packages.)
You check this box to scan the network file systems.
Check this box to allow Inventory Plug-in to scan remote volumes for software and report hardware information of the remote volumes. Scanning remote volumes is disabled by default to prevent numerous computers from reporting redundant inventory data.
This option takes precedence over UNIX and Linux file system types and Mac drive settings.
If you uncheck this box, remote volumes are not scanned, regardless of whether their file system types are included in the scan.
System resource usage
(This option is not available for stand-alone inventory packages.)
You can define the inventory process priority and thus modify the usage of the managed computer's processor and disk during an inventory scan.
The actual resource utilization during an inventory scan depends on the managed computer's processor type and hard disk speed. During a file scan for software inventory, the number of files on the hard drive also affects resource utilization.
On the Windows platform, if you decrease the priority, the process of gathering inventory requires less system resources on the managed computer, but the inventory scan takes longer. If you increase the priority, the inventory scan finishes faster, but also consumes more resources and can affect the performance of the managed computer.
On UNIX, Linux, and Mac platforms, computers dedicate more CPU cycles for high priority processes and less CPU cycles for low priority processes. If the computer is in an idle state and runs only the inventory scan, then low priority process may take the available resources. CPU usage reduces as soon as another process with a higher priority begins to run.
You may want to create multiple separate inventory policies and target similar types of managed computers. For example, you can create a policy with servers as targets. You can set the priority to lower than normal to decrease the resource utilization and not affect the performance of the server. You may also want to lower the resource utilization for the other types of computers that generally have slower hard disks and processors. For example, you can lower the resource usage for notebook computers.
Throttle inventory scan evenly over a period of
(Windows only)
(This option is not available for stand-alone inventory packages.)
You check this box if the inventory process significantly affects the network bandwidth and Notification Server resources.
For example, you can set the scan throttle period to 24 hours. At the scheduled time, the scan process starts, but then it immediately goes to sleep, and wakes up at some random time within the specified time period (in this example, 24 hours) to complete the scan
Run Inventory as
(This option is not available for stand-alone inventory packages.)
You can specify the user account that the task runs in, based on the platform that the managed computer is running.
Note that to gather full inventory for Microsoft SQL Server 2012, you need to select
Logged in user
. If you run an inventory policy or task using the
System account
option, the data is not gathered for all server inventory data classes and not all the database users are reported.
MySQL
You can specify, edit, or delete MySQL credentials such as user name, password, and connection parameters.
Oracle
You can specify, edit, or delete Oracle credentials such as user name, password, and Oracle System ID (SID).