4 Steps to IT Asset Discovery, tier 1 of IT Asset Management
Collecting IT Asset information is the first tier of an IT Asset Management strategy. This is where you build your database with IT assets that will be tracked. It is important to have a strategy for collecting, storing, and monitoring IT Assets. To begin your IT asset management project, start with these 4 steps to successfully collect your IT asset information.
First, you must define IT assets that need to be collected. Second, you need to identify IT assets that need to be monitored. Third, choose scanning tools that meet the requirements defined in step 1 and 2. Fourth, choose an IT Asset Database that allows you to add and map custom fields
1. Define IT Assets that Need to be Collected
Define IT Assets that will be managed and added to the IT asset management database. Start by identifying assets controlled by the end-user. PCs, laptops, mobile devices, and associated software applications are often lost or misplaced overtime when not accounted for in an IT asset management solution. Next, consider tracking printers, network devices such as routers, switches, servers, and storage with their associated applications.
- Identify IT Assets that need to be monitored
The level IT of tracking applied to an IT Asset will vary. A good way to differentiate the level of tacking is to have “monitored” devices and “un-monitored” devices.
Monitored devices will generally be the devices controlled by the end user like a laptop or PC. These assets are usually at most risk for security attacks. Monitored devices generally need a service or client that runs on the device. The monitored device needs to be able to report changes quickly since it has to react to change. Servers and their associated applications should also be considered for monitoring.
Unmonitored devices would be devices that are generally controlled by IT such as network printers, routers, and switches. These devices are usually changed pro-actively. Network devices under the control of the IT Management system should still follow ITIL principles relating to Configuration Change Management. Remember, “Un-monitored” refers to the level of tracking, not to be confused with monitoring/managing software that may be used to configure and alert on the health of the IT Asset.
Mobile Devices will usually fall somewhere between “monitored” and “un-monitored” but whatever is decided, they need to be tracked. At a minimum, IT needs to know what mobile devices are connecting to and accessing the organization’s data.
Integration between your ITSM solution and your asset management solution should be part of your strategy. If an IT asset is serviced, the incident management tool should be able to view details about the asset from the asset management system. For example warranty, contract information, and installed software may be helpful to an analyst working the incident.
- Choose the right Asset Discovery Tools
Agent-based Asset Discovery tools have the ability to discover everything that is connecting to your network. They also have the ability to collect detailed hardware information including manufacturer and part numbers from various components of an asset.
For example, in addition to being aware of a laptop, information about the memory, hard drive, and monitor can be available to you if and when you need it. Furthermore, asset tools can provide you with the Operating System (OS) information running on the laptop and any software application installed.
Choose a tool that can do network discovery by accessing network directories such as Active Directory, that can do ping sweeps and even listen to network management protocols such as SNMP. You want to know an asset exists and the type of asset discovered, If you would like to learn more about Simple Network Management Protocol aka snmp, you can visit ThousandEyes or a similar company.
The tool you choose should also allow you to manually input IT assets into the management system, often using forms. For example, a smaller company may want to track the lifecycle of assets but are not concerned with detailed information beyond the fact that it exists. A form can be created for end-users or an admin to enter the required information into the database.
Be sure to choose a tool that can import the IT Asset data from an external data source. Make sure the software can talk to external databases. Because spreadsheets are the most common tool used for IT asset management in organizations today, it is important to have the ability to access data from XML files, Excel files, or delimited-ascii files.
- Identify the Best IT Asset Management Database
When you consider gathering the IT Assets with all associated components and software, the amount of data collected can be extensive. As you prepare for tier 2 of IT Asset Management, you will want to carefully choose your asset management database and database tools.
Make sure the tools you choose allow you to extend the database with custom fields. For example, you may want to know the name of the person who scanned in a device with a barcode scanner.
If you cannot customize your asset management database to accommodate your requirements, then you are restricted by the limitations of the database. IT Asset Management Database tools must have the ability to add custom fields, to map IT assets to custom fields or link IT asset information to external sources. For example, you may want to link a mobile device to its associated account and service provider.
Processes defined at tier 1 are designed to get your IT Assets into your IT asset management solution. Processes defined at tier 2 normalize the database tables for consistency and accuracy. Tier 2 processes also map IT assets to other IT assets or to custom data that you define. Processes defined at tier 3 are aligned with ITAM principles for tracking the lifecycle of the asset.
The more information you collect and properly manage at tier 1, the better prepared you will be when implementing tier 2 and tier 3 of your IT Asset Management solution.
Follow me on Twitter @marcelshaw