Primitive functions for use in remote computer management

ABSTRACT

The invention facilitates remote management of a computer via a network. Remote computer management capability can be expanded beyond that previously available through the addition of one or more new primitive functions that can be performed on a managed computer.

CROSS-REFERENCE TO RELATED APPLICATION

The instant application is a continuation of patent application Ser. No.14/948,337, filed Nov. 22, 2015, entitled PRIMITIVE FUNCTIONS FOR USE INREMOTE COMPUTER MANAGEMENT, issued U.S. Pat. No. 9,923,878, issued Mar.20, 2018, which is a continuation of and claims priority from patentapplication Ser. No. 14/474,494, filed Sep. 2, 2014, entitled PRIMITIVEFUNCTIONS FOR USE IN REMOTE COMPUTER MANAGEMENT, issued U.S. Pat. No.9,197,491, issued Nov. 24, 2015, which is a continuation of patentapplication Ser. No. 13/493,450, filed Jun. 11, 2012, entitled PRIMITIVEFUNCTIONS FOR USE IN REMOTE COMPUTER MANAGEMENT, issued U.S. Pat. No.8,825,826, issued Sep. 2, 2014, which is a continuation of patentapplication Ser. No. 10/883,643, filed Jun. 30, 2004, entitled PRIMITIVEFUNCTIONS FOR USE IN REMOTE COMPUTER MANAGEMENT, issued U.S. Pat. No.8,200,794, issued Jun. 12, 2012, the entire contents of each areincorporated by reference herein.

BACKGROUND OF THE INVENTION 1. Field of the Invention

This invention relates to remote management of a computer via a network.

2. Related Art

The use of a computer typically entails some management of the operationof, and activities engaged in by, the computer. For organizations thatmake use of many computers, management of those computers can be anespecially burdensome task; such organizations often have one or morepeople who are specifically responsible for the management of theorganization=s computers. Management of a computer can entail any of alarge variety of activities, as well known to those skilled in that art.Computer management can include, for example, one or more of thefollowing: taking inventory of the hardware comprising a computer and/orthe software installed on a computer; installation, configuration and/orupdating of software on a computer; establishing and updating securityparameters (e.g., passwords, access permissions) on a computer;deploying and installing system patches on a computer; monitoring usageof computer resources and/or computer operation; identifying andtracking problems with computer operation; producing an alert when aproblem with computer operation occurs; controlling one or more aspectsof the operation of a computer; and providing assistance to a user ineffecting desired operation of a computer.

A computer to be managed may not be at the same location as the personwho must do the management. This may be often be true, for example, fororganizations with computers operating at different locations: there maynot be a person at each such location with the skills and/or knowledgerequired to manage the computer(s) at that location. Thus, in the past,when it has been necessary or desirable to engage in management ofcomputer(s) at a particular location, it has sometimes been necessaryfor a person with the requisite skills and/or knowledge to travel tothat location. As can readily be appreciated, this may be undesirablefor a variety of reasons, e.g., it may be inconvenient and/or too costlyto travel to the location, it may be discovered after arriving at thelocation that tools and/or information necessary to manage a computerare not present at that location, etc. With the advent and increasingpresence of computer networks, tools have been developed to enableremote management of a computer via a computer network, i.e., managementof a computer located at one site of a computer network using a computerlocated at another site of the computer network.

Computers that can be connected to a network may have software installedthereon that controls access to the network by the computer and from thenetwork to the computer. For example, a firewall can be useful ininhibiting unwanted access to or from the computer via the network. Agateway can also be useful in inhibiting unwanted access to or from thecomputer via the network and can additionally perform network addresstranslation (NAT) that is used to direct network communication to anappropriate computer when multiple computers share a single networkaddress. However, the presence of a firewall and/or gateway can alsoprevent remote management of a computer by stopping incominginstructions and/or data used to effect the remote management. As aresult of greater concern regarding the security of computers that canbe connected to a network (in particular, public networks such as theInternet), the use of firewalls and/or gateways has become common and isincreasing, thus significantly inhibiting the usefulness of existingsystems for remote computer management.

A proxy server can be present at a computer network site to mediate andcontrol access to the network by computer(s) at that site. (Typically, aproxy server is used at a computer network site at which multiplecomputers—often, a very large number, such as 50 or 100 or more—accessthe network via the site, such as is the case with a large organizationthat has many computers accessing a computer network via a much smallernumber of network sites, though this need not necessarily be the case.)All network communication from computer(s) at a network site at which aproxy server is present must be directed to the proxy server, which thendecides whether the communication can pass through to the network. Aproxy server can be used, for example, when it is desired to imposemore—or simply different—control over access to a computer network thanis provided by a firewall and/or gateway. When a proxy server is presentat a computer network site, a (prospective) remotely managed computer atthat site cannot directly communicate with a computer at another site ofthe network (i.e., attempt to communicate via the communication portassigned for communication with the computer at the other site) that isseeking to effect particular management action(s) with respect to theremotely managed computer, since all communication from the remotelymanaged computer must be routed to the communication port assigned forcommunication with the proxy server. Thus, the presence of a proxyserver at a computer network site can prevent or inhibit management ofcomputer(s) at that site by a system for remote computer management.

A computer at a computer network site may also be connected to one ormore other devices present at that site, such as a switch, router,peripheral device (such as, for example, a printer, scanner, keyboard ordisplay monitor) or another computer. It may be desirable to manage adevice connected to a remote computer in addition to, or instead of,managing the computer. However, unless such device is accessibledirectly via the network (which is often not the case), existing systemsfor remote computer management do not enable this capability.

It can be desirable to update software used to implement (in whole or inpart) a system for remote computer management after the software isinstalled and operating, e.g., to add new functionality to the remotecomputer management system. This can be done, for example, byuninstalling an existing version of the software and installing a newversion of the software, or by installing an update to the existingversion of the software. However, these approaches will disruptoperation of the remote computer management system, other operation ofcomputer(s) on which the remote computer management system isimplemented, and/or activities of users of the computer(s) on which theremote computer management system is implemented. These approaches mayalso experience error during the installation process, producing evenmore disruption or, in the worst case, precluding update of thesoftware. Further, since these approaches are necessarily disruptive tosome degree, they are typically only used to provide updates that makesubstantial changes (e.g., add substantial new functionality) to anexisting version of the software, thus reducing the flexibility (e.g.,the granularity) with which the software can be updated. Finally, theseapproaches can cause the instructions and/or data comprising thesoftware to require an undesirably large amount of storage capacity.Another approach to updating software used to implement a remotecomputer management system is to provide one or more new stand-aloneexecutable files that can be accessed by the remote computer managementsoftware to make use of the functionality produced by those executablefile(s). However, when the new executable file(s) first attempt tooperate, security software (which is frequently operating on computer(s)used to implement the remote file management system) may identify thisas an attempt to begin operation of a new process that has notpreviously been authorized, and either stop the operation or present auser interface (e.g., dialog box) that requires instruction (often froma user who may not have the requisite knowledge to respondappropriately) as to whether the operation should be allowed tocontinue, in either case disrupting operation of the remote computermanagement system.

SUMMARY OF THE INVENTION

The invention facilitates remote management of a computer via a network.A computer at one site of a computer network is used by a remoteadministrator to request performance of management action(s) regarding aspecified computer (the Amanaged computer@) and/or other device locatedat another site of the network. The request is transmitted to a remotecomputer management server that is typically located at still anothersite of the computer network that is different from the other twonetwork sites. The remote computer management server communicates withthe managed computer to effect the requested management action(s) and,as appropriate, reports the result(s) to the computer being used by theremote administrator. The invention encompasses several aspects ofimplementing such a remote computer management system that facilitatethe remote management of a computer.

In one embodiment of the invention, remote management of a managedcomputer is facilitated by i) initiating, from the managed computer,communication between the managed computer and a remote computermanagement server via a network, the communication including querying(if the communication between the managed computer and the remotecomputer management server is successfully initiated) the remotecomputer management server regarding whether a management action is tobe performed on the managed computer, wherein the communication isformatted in accordance with a network communications protocol that canbe used to format communication that is allowed to pass through afirewall and/or gateway that mediates communication with the managedcomputer; ii) receiving a response from the remote computer managementserver indicating whether a management action is to be performed on themanaged computer and, if so, what operation or operations are to beperformed by the managed computer to effect performance of themanagement action; iii) effecting performance by the managed computer ofthe operation or operations that effect performance of a managementaction; and iv) communicating to the remote computer management server aresult or results of the performance by the managed computer of anoperation or operations that effect performance of a management action.

In another embodiment of the invention, remote management of a managedcomputer at a first site of a computer network is facilitated by i)detecting the presence of a proxy server at the first site of thecomputer network; and ii) initiating, from the managed computer,communication via the computer network between the managed computer anda remote computer management server at a second site of the computernetwork, the communication including querying (if the communicationbetween the managed computer and the remote computer management serveris initiated) the remote computer management server regarding whether amanagement action is to be performed on the managed computer, whereincommunication from the managed computer to the remote computermanagement server is routed to a communication port assigned forcommunication with the proxy server, with instructions to then send thecommunication to the remote computer management server.

In yet another embodiment of the invention, remote computer managementis performed by i) receiving at a managed computer a request from aremote computer management server to perform a management actionregarding a device connected to the managed computer; ii) communicatingbetween the managed computer and the device connected to the managedcomputer to effect performance of an operation or operations that effectperformance of the management action regarding the device connected tothe managed computer; and iii) communicating from the managed computerto the remote computer management server a result of the performance ofthe management action regarding the device connected to the managedcomputer.

In still another embodiment of the invention, remote management of amanaged computer is facilitated by i) instructions and/or data foreffecting performance by the managed computer of an operation oroperations that effect performance of a management action, wherein theinstructions and/or data for effecting performance of an operation oroperations can make use of a set of instructions and/or data included ina dynamically loaded library (or other set of instructions and/or datathat will not be identified as a new executing process on the managedcomputer) to effect performance of an operation or operations; ii)receiving at the managed computer from a remote computer managementserver via a network a dynamically loaded library that includes one ormore sets of instructions and/or data that can be used to effectperformance of an operation or operations to produce an operation oroperations not previously enabled; and iii) receiving at the managedcomputer a request via the network from the remote computer managementserver to effect performance of an operation or operations that effectperformance of a management action, wherein the management actionrequires an operation that is produced by using a set of instructionsand/or data from the received dynamically loaded library.

In another embodiment of the invention, remote management of a managedcomputer is facilitated by i) effecting performance by the managedcomputer of an operation or operations that effect performance of amanagement action, wherein effecting performance of an operation oroperations can effect performance of one or more primitive functionsfrom a set of primitive functions including one or more of the followingprimitive functions: Get value for script variable, Added printers toaudit, Get File in multiple blocks, Enumerate registry subkeys,Enumerate registry values, Enumerate directory listing, Incrementalaudit, Execute application and return output; and Extend audit toinclude file types in addition to .exe; and iii) communicating from themanaged computer to a remote computer management server via a network aresult of the performance of the management action.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of an embodiment of a network in which remotecomputer management according to the invention can be used, illustratingvarious capabilities of the invention.

FIG. 2 is a diagram of another embodiment of a network in which remotecomputer management according to the invention can be used, illustratinganother capability of the invention.

FIG. 3 is a diagram of another embodiment of a network in which remotecomputer management according to the invention can be used, illustratinganother capability of the invention.

FIG. 4 is a flow chart of a method in accordance with the invention forproviding secure and authenticated communication between agent softwareoperating on a managed computer and a remote computer management server.

FIG. 5 is a diagram of another embodiment of a network in which remotecomputer management according to the invention can be used, illustratinganother embodiment of remote computer management in accordance with theinvention.

DETAILED DESCRIPTION OF THE INVENTION

The invention facilitates remote management of a computer via a network.A computer at one site of a computer network is used by a remoteadministrator to request performance of management action(s) regarding aspecified computer (the Amanaged computer@) and/or other device locatedat another site of the network. The request is transmitted to a remotecomputer management server that is typically located at still anothersite of the computer network that is different from the other twonetwork sites. The remote computer management server communicates withthe managed computer to effect the requested management action(s) and,as appropriate, reports the result(s) to the computer being used by theremote administrator. As described in detail below, the inventionencompasses several aspects of implementing such a remote computermanagement system that facilitate the remote management of a computer.

According to one aspect of the invention, remote computer management inwhich communication between a managed computer (i.e., a computer that isto be remotely managed) and a remote computer management server (i.e., acomputer that communicates with the managed computer to effect requestedmanagement action(s)) is initiated by the managed computer isimplemented so that the communication is formatted in accordance with anetwork communications protocol that can be used to format communicationthat is allowed to pass through a firewall and/or gateway that mediatescommunication with the managed computer. According to another aspect ofthe invention, remote computer management in which communication betweena managed computer and a remote computer management server is initiatedby the managed computer is implemented so that the presence of a proxyserver at the site at which the managed computer is located can bedetected, and communication from the managed computer to the remotecomputer management server is routed to a communication port assignedfor communication with the proxy server, with instructions to then sendthe communication to the remote computer management server. According toyet another aspect of the invention, remote management of a deviceconnected to a managed computer can be effected by using the managedcomputer as a proxy for conducting a management action regarding theconnected device on behalf of a remote computer management server.According to still another aspect of the invention, remote computermanagement capability can be updated by providing to a managed computer,for use by software operating on the managed computer to effectmanagement actions, a dynamically loaded library (or other set ofinstructions and/or data that will not be identified as a new executingprocess on the managed computer) that includes functionality notpreviously enabled by the software operating on the managed computer.According to another aspect of the invention, remote computer managementcapability can be expanded beyond that previously available through theaddition of one or more new primitive functions that can be performed ona managed computer. An embodiment of the invention can be implemented toinclude one or any combination (including all) of the aspects of theinvention described above. Further, an embodiment of the invention canbe implemented as a method in accordance with the description of theinvention herein, a system or apparatus for performing such a method, ora computer program including instructions and/or data for performingsuch a method.

Herein, “computer” can refer to any device having computationalcapability sufficient to accomplish relevant functions of the inventionand the capacity for communication with other such devices via a networkof which the devices are part. As used herein, a “computer” can beembodied by, for example, a desktop computer, server computer, portablecomputer (e.g., notebook computer, personal digital assistant), cellularphone, a router or a network-ready Asmart@ appliance. The invention canbe implemented with computers operating in accordance with any operatingsystem, e.g., a Windows operating system, a Unix operating system, aMacIntosh operating system.

Management of a computer can include any of a variety of tasks (oftenreferred to herein as Amanagement actions@). For example, as discussedabove, management of a computer can include one or more of thefollowing: taking inventory of the hardware comprising a computer and/orthe software installed on a computer; installation, configuration and/orupdating of software on a computer; establishing and updating securityparameters (e.g., passwords, access permissions) on a computer;deploying and installing system patches on a computer; monitoring usageof computer resources and/or computer operation; identifying andtracking problems with computer operation; producing an alert when aproblem with computer operation occurs; controlling one or more aspectsof the operation of a computer; and providing assistance to a user ineffecting desired operation of a computer. Each of these managementactions can be accomplished by performing one or more operations on themanaged computer, such as, for example, manipulating the file system onthe managed computer, starting/stopping/monitoring any process (e.g.,system services, application programs) operating on the managedcomputer, reading/writing/editing the registry of the managed computer,and/or remotely controlling devices such as a screen and/or keyboard ofthe managed computer.

The invention can be implemented to enable remote computer managementvia any of a variety of computer networks. In particular, the inventioncan be implemented to enable remote computer management via any computernetwork that makes use of a TCP/IP protocol (including protocols basedon TCP/IP protocol, such HTTP, HTTPS and FTP) to effect communicationvia the network. For example, the invention can advantageously beimplemented to enable remote computer management via the Internet. Theinvention can also be implemented to enable remote computer managementvia any other public computer network, as well as via a private computernetwork, such as an intranet for a corporation or other organization.

The invention facilitates remote computer management. In particular, acomputer (for convenience, sometimes referred to herein as a Aremoteadministrator computer@) that is used by a remote administrator torequest performance of management action(s) regarding a managed computeris remote from the managed computer. Herein, two computers are Aremote@from each other if the two computers are located at different sites of acomputer network of which the two computers are part. A Acomputernetwork site@ is a group of one or more computers that share a singlenetwork address. (There may also be other devices present at a computernetwork site.) Two computer sites can be located at the same ordifferent geographic locations. It is anticipated that the inventionwill typically be implemented for use in situations in which the remoteadministrator computer and the managed computer are at network sitesthat not readily accessible to each other, such as locations separatedby a large distance (e.g., several or many miles). The remote computermanagement server may or may not be remote from the remote administratorcomputer or the managed computer (though it must be remote from at leastone).

FIG. 1 is a diagram of an embodiment of a network in which remotecomputer management according to the invention can be used, illustratingvarious capabilities of the invention. In FIG. 1, computers at varioussites are connected to the Internet. A remote computer management serveroperates at site 101. A remote administrator uses a computer at site 102to effect management of one or more remote computers by communicatingrequest(s) for management action(s) to the remote computer managementserver. (In general, the invention can be used to enable management ofany number of computers.) A computer at site 103 is connected to theInternet through a firewall which controls access to the Internet by thecomputer. Multiple computers at site 104 are connected to the Internetthrough a gateway and a firewall. In response to request(s) from theremote administrator, the remote computer management server cancommunicate one or more commands to the computers at sites 103 and/or104 to cause those computers to perform one or more operations thateffect management action(s) requested by the remote administrator. Inparticular, as explained in more detail below, the invention can enablethe remote administrator to manage the computers at site 103 and 104,notwithstanding the presence of a firewall at both sites and a gatewayat site 104.

Each managed computer has installed thereon one or more computerprograms (for convenience, referred to herein as Aagent software@)including instructions and/or data that can be used in effectingrequested management of the managed computer. In particular, the agentsoftware can receive commands from a remote computer management server,perform operations on the managed computer (or, in some embodiments ofthe invention, on device(s) connected to the managed computer) inaccordance with the received commands, and, as appropriate, report theresults of the operations to the remote computer management server. Theagent software can advantageously be implemented so that operation ofthe agent software doesn't affect other operation of the managedcomputer to a significant degree. The agent software can be implementedto perform only basic operations (e.g., the primitive functionsdiscussed below) that require little processing or data storage capacityof the managed computer. For example, the agent software can beimplemented by computer program(s) that require only several hundredkilobytes of data storage. Additionally, the agent software canadvantageously be installed on a managed computer as a system service,thus affording the agent software the same rights and privileges as theoperating system of the managed computer. This status can be useful infacilitating execution of the primitive functions discussed belowbecause it enables the primitive functions to be executed by the managedcomputer without need for user logon or other user intervention. Thisstatus can also be useful in facilitating update of the agent softwarein accordance with an aspect of the invention described below (i.e., byusing a dynamically loaded library). The invention can be implemented sothat an administrator credential is securely bound to software (whichcan be encrypted) used to install the agent software, in order to ensurethat the agent software has adequate usage rights on a managed computer(which may not otherwise be the case, e.g., if the person doing theinstallation does not have administrator rights on the managed computer)to enable installation of the agent software as a Asystem service@ onthe managed computer.

The remote computer management server has installed thereon one or morecomputer programs (for convenience, sometimes referred to herein asAserver software@) including instructions and/or data that can be usedto effect management of a computer (or, in some embodiments of theinvention, device(s) connected to the computer) in response to a requestfrom a remote administrator. In particular, the server software canreceive a request from a remote administrator to perform a managementaction on a managed computer (or connected device), receive a query fromagent software regarding whether a management action is to be performedon the managed computer (or connected device) on which the agentsoftware is operating, communicate a command to agent software toperform a specified operation on the managed computer (or connecteddevice), and receive a response, as appropriate, from the agent softwarethat indicates a result produced by performance of an operation on themanaged computer (or connected device). The remote computer managementserver can also store data regarding the status and/or configuration ofa managed computer (or connected device).

The invention can be implemented so that, in general, a remoteadministrator can use any computer that can be connected to the networkto effect remote management of one or more other computers connected tothe network. In that vein of generality, the invention can beimplemented so that no software particular to the invention need beinstalled on a remote administrator computer to enable remote computermanagement in accordance with the invention. For example, when theinvention is implemented to enable remote management of computers viathe Internet, the invention can be implemented to enable the remoteadministrator to effect such management by using a conventional Webbrowser to contact the remote computer management server (e.g., accessan appropriate Web site) and communicate requested management actions.

On a recurring basis, the agent software operating on a managed computerattempts to initiate communication with the remote computer managementserver to query whether the remote computer management server has anymanagement actions for the agent software to perform. For example, theinvention can be implemented so that the agent software attempts toinitiate communication with the remote computer management server atregular intervals. It is desirable that the agent software queryrelatively frequently whether the remote computer management server hasany management actions for the agent software to perform so that aremote administrator won=t possibly have to wait a long time for theresult of a requested management action. The invention can beimplemented, for example, so that the agent software attempts toinitiate communication with the remote computer management server everyn seconds (e.g., every 30 seconds or some other period of time less thanabout a minute). The invention can be implemented so that if the agentsoftware is not successful on a first attempt in initiatingcommunication with the remote computer management server, the agentsoftware tries again one or more times to initiate such communication.For example, the invention can be implemented so that the agent softwareattempts to initiate communication with the remote computer managementserver at regular intervals for a specified period of time or for aspecified number of attempts, e.g., attempt to initiate communicationevery n seconds until m attempts have been made. If the agent softwareis successful in initiating communication with the remote computermanagement server, the agent software waits for a response from theremote computer management server. If the remote computer managementserver has a management action or actions for the agent software toperform, then the remote computer management server will communicate oneor more commands to the agent software that effect performance of themanagement action(s). If there are no management actions for the agentsoftware to perform, or if the agent software was unsuccessful ininitiating communication with the remote computer management server(even after making a specified number of attempts), then the agentsoftware waits until the next specified time to attempt again toinitiate communication with the remote computer management server. Inthis way, the agent software continually polls the remote computermanagement server to identify management actions to be undertaken by theagent software on the managed computer. The invention can be implementedso that the particular parameters regarding attempts to initiatecommunication with the remote computer management server (e.g., thetimes at which the agent software attempts to initiate communicationwith the remote computer management server; the interval between, andnumber of, attempts to initiate communication with the remote computermanagement server after an unsuccessful first attempt) can beestablished by a user of an embodiment of the invention (e.g., areseller of software embodying the invention or an entity that uses theinvention to remotely manage its computers).

It is desirable to make operation of the agent software on the managedcomputer as unobtrusive as possible. For example, as indicated above,the agent software can be implemented as one or more computer programsthat require relatively little space to store and relatively littleprocessing resources to execute. In this vein, the agent software can beimplemented so that, before attempting to initiate communication withthe remote computer management server, the agent software checks todetermine whether a connection to the network has already beenestablished. If so, then the agent attempts to initiate communicationwith the remote computer management server. If not, the agent softwaredoes not attempt to initiate such communication. Implementing the agentsoftware in this way can be desirable because it can prevent disruptionof a user of the managed computer who is working on the managed computerat a time when the managed computer is not connected to the network bythe display of a dialog box (as is commonly produced on a computer whenattempting to connect to a network) announcing that the managed computeris attempting to establish a network connection. Such disruption can beparticularly bothersome since the agent software will typically beimplemented to attempt to initiate communication with the remotecomputer management server on a frequent basis (e.g., every 30 secondsor a minute).

As indicated above, the invention enables a remote administrator toremotely manage a computer via a network, notwithstanding the presenceof a firewall and/or a gateway that mediates connection by the managedcomputer to the network. A firewall or gateway is often configured toprevent communication that is not in response to an outgoingcommunication initiated by the computer being protected by the firewallor gateway. (For convenience, such communication is sometimes referredto herein as Ainbound communication.@) However, many firewalls andgateways allow any communication that is in response to an outgoingcommunication initiated by the computer being protected by the firewallor gateway. (For convenience, such communication is sometimes referredto herein as Aoutbound communication.@) Thus, a system for remotecomputer management in which communication with a managed computer isinitiated by another computer on the network will often be preventedfrom managing a computer that is protected by a firewall and/or gateway(and, as discussed above, the number of such computers is significantand is increasing). A firewall and/or gateway can be configured to allowsuch inbound communication, but doing so reduces the efficacy of thefirewall and/or gateway and is therefore generally undesirable. Toaddress this problem, the invention can be implemented so that allcommunication between the remote computer management server and theagent software is initiated by the agent software, as described above,i.e., all communication required to remotely manage a computer isoutbound communication from that computer. Implementing the invention inthis way also enables such communication to traverse a gateway thatperforms NAT, since the gateway can store an identification of themanaged computer that initiated communication while the a communicationsession is ongoing. The agent software can be implemented so that theagent software does not accept inbound communication, thus eliminatingthe need to configure a firewall or gateway to allow such communication.This is advantageous since, in many implementations of the invention,there will be a large number of managed computers that would otherwiserequire firewall and/or gateway configuration. Additionally, managedcomputers are often not operated by users having the requisite knowledgeor inclination to appropriately configure a firewall and/or gateway;implementing the invention in this way avoids problems associated withthe need for such users to configure a firewall and/or gateway. Theremote computer management server does accept inbound communication.However, configuring the firewall and/or gateway of a remote computermanagement server to allow inbound communication imposes little burden,since there is only one (or, perhaps, a few) for which the firewalland/or gateway must be configured, and the remote computer managementserver is often a computer that is operated by, or readily accessibleto, user(s) (e.g., information technology specialists) that arecomfortable with appropriately configuring a firewall and/or gateway.

Some firewalls or gateways are more restrictive than described above:not only do they not allow inbound communication, they allow outboundcommunication only if the communication is formatted in accordance witha particular communication protocol that is identified as allowable bythe firewall or gateway. In a further embodiment of the invention, theagent software communicates using a specified communication protocolthat formats communication in a way that is expected to be identified asallowable by an adequate number of firewalls and gateways. Inparticular, the invention can be implemented so that the agent softwarecommunicates using a communication protocol that is used for other typesof communication that firewalls and gateways typically allow. The HTTPand HTTPS protocols are examples of such communication protocols (sincethese protocols are often used for communication via the Internet,firewalls and/or gateways are often configured to allow outboundcommunication formatted in accordance with one of these protocols); theinvention can be implemented so that the agent software communicatesusing either of those communication protocols. The invention can also beimplemented so that the agent software communicates using FTP or and anyother protocol based on TCP/IP protocol. Further, the invention can beimplemented so that when the agent software attempts to initiatecommunication with the remote computer management server, a successionof attempts are made, in each of which the communication is formatted inaccordance with a unique one of a set of different communicationprotocols, until one version of the communication is allowed by thefirewall and/or gateway; subsequent communication is then formatted inaccordance with the communication protocol used for that version of thecommunication. As the implementations of firewalls and gateways evolvein the future, the communication protocols that are typically allowed bythose future firewalls and gateways may be different from those that arecurrently commonly allowed; the invention contemplates the use of suchcommunication protocols in enabling communication from the agentsoftware.

The invention can be implemented so that all communication between theagent software and the remote computer management server is routedthrough a single network communications port. In particular, theinvention can be implemented so that all communication between the agentsoftware and the remote computer management server is routed through asingle network communications port that is known or likely to already beallowed by many or all firewalls and gateways for networkcommunications. For example, particular network communication protocolstypically make use of a particular port for communications in accordancewith that protocol, e.g., SSL communications typically are routedthrough port 443, HTTP communications typically are routed through port80. When the invention is implemented to format communications betweenthe agent software and remote computer management server in accordancewith a particular communications protocol, as discussed above, routingcommunication through a single port happens naturally as a consequenceof that formatting. In the same vein, when the invention is implementedso that the agent software successively tries initiating communicationwith the remote computer management server in accordance with differentcommunication protocols until one works, communication between the agentsoftware and remote computer management server is routed through theport that is already otherwise used for communications in accordancewith that protocol. Implementing the invention so that all communicationbetween the agent software and the remote computer management server isrouted through a single network communications port reduces oreliminates the likelihood that communications between the agent softwareand the remote computer management server will be blocked by a firewallor gateway. Further, implementing the invention so that allcommunication between the agent software and the remote computermanagement server is routed through a single network communications portthat is known or likely to already be allowed by many or all firewallsand gateways for network communications reduces or eliminates the needto specially configure a firewall and/or gateway (with attendantreduction in effectiveness) to allow such communication through one ormore ports that would otherwise be used for communication of that type.

The server software operating on the remote computer management serveris implemented so that the server software can break down eachmanagement action that can be requested by a remote administrator intoone or more simpler component operations (e.g., primitive functions,discussed below) that, when performed on the managed computer, producethe requested management action. As discussed above, the agent softwarechecks with the remote computer management server on an ongoing basis tosee whether the remote computer management server has any managementaction(s) for the agent software to perform. If the remote computermanagement server has management action(s) for the agent software toperform, then the remote computer management server communicates one ormore commands to the agent software that effect performance of themanagement action(s). In particular, the remote computer managementserver communicates command(s) to perform the operation(s) that comprisethe management action(s) to be performed on the managed computer. Theinvention can be implemented so that a command communicated to agentsoftware can instruct the agent software to perform a primitivefunction. A primitive function is a simple operation constituting alow-level interaction with a computer that accomplishes a single task.As indicated above, a management action can be effected by performanceof one or more primitive functions. Table 1 gives examples of primitivefunctions that can be performed by agent software in accordance withinvention (in general, the name of each primitive function makes theoperation of the primitive function self-explanatory):

TABLE 1 Primitive function Operation Get Registry Value Read a valuefrom the registry Set Registry Value Write a value to the registryDelete Registry Value Delete a value from the registry Get File Transmita file to the remote computer management server Write File Obtain a filefrom the remote computer management server Delete File Delete a fileExecute File Cause a file to begin executing on the managed computer GetFile properties Read properties of a file Check-in again immediatelyImmediately check with the remote computer management server forinstruction(s) Flash icon in system tray to Produce appropriate displaydialog display message Rename Locked File Change the name of a lockedfile Display Yes/no dialog box Produce appropriate display messageReboot Restart the computer Audit software and/or hardware Ascertainentire software and configuration hardware configuration of the computerDisplay dialog box message Immediately produce appropriate immediately(w/o flashing icon) display Execute Shell Command Perform an operationspecified by a shell command Determine if application is Ascertain if aprogram is executing running Get Even Log entries Read entries from EvenLog Close application Cause an application program to stop operating Getvalue for script variable Read value of a script variable (file content,directory path, etc. retrieved from agent software) Added printers toaudit Include printers in an audit of the software and hardwareconfiguration of the computer Execute DLL function Make use of afunction included in a DLL Get File in multiple blocks Transmit a fileto the remote computer management server in multiple blocks Enumerateregistry subkeys List the subkeys of the registry Enumerate registryvalues List the values of the registry Enumerate directory listing Listthe contents of a directory Incremental audit (since last Ascertainchanges in entire software audit) and hardware configuration of thecomputer since last audit Execute application and return Performoperations specified by a output (non-windows program and obtain resultof application, command line operations output) Extend audit to includeany Include all file types in an audit of the file types, not just .exesoftware and hardware configuration of the computer

The invention can be implemented so that after each operation isperformed on the managed computer, the agent software communicates withthe remote computer management server to report the performance of theoperation and the result, if any, of performing the operation, thenwaits for a next command, if any, from the remote computer managementserver. The server software is implemented to synthesize the result(s)of the operation(s) performed on the managed computer (as communicatedto the remote computer management server by the agent software) toproduce a result of a management action represented by the operation(s)performed. Implementing the invention, as described above, so that theagent software effects requested management of a managed computer bysuccessively executing relatively simple operations (e.g., primitivefunctions) and reporting the results to the remote computer managementserver enables the agent software to be implemented in a manner thatrequires few computational resources (e.g., data storage capacity,processing resources) of the managed computer, so that operation of theagent software on the managed computer is unobtrusive.

As discussed above, updating software used to implement (in whole or inpart) a system for remote computer management after the software isinstalled and operating may disrupt operation of the remote computermanagement system, other operation of computer(s) on which the remotecomputer management system is implemented, and/or activities of users ofthe computer(s) on which the remote computer management system isimplemented. The invention can advantageously be implemented so that theagent software can be updated in a manner that minimizes or eliminatesdisruption of operation of the invention on the managed computer, otheroperation of the managed computer, or user interaction with the managedcomputer. This can be achieved by transmitting from the remote computermanagement server to the managed computer (after installation of theagent software on the managed computer) a dynamically loaded library(DLL) including one or more sets of instructions and/or data that, whenmade use of by the agent software, produce functionality not enabled bythe agent software at the time the DLL is transmitted to the managedcomputer; implementing the agent software to include the capability ofperforming one of the above-described primitive functions, AExecute DLLfunction,@ to make use when needed of functionality provided by a DLL;and transmitting from the remote computer management server to themanaged computer instruction(s) to make use of particular functionalityincluded in the newly provided DLL. The agent software can beimplemented to provide an interface (function call definition) that canpass arbitrary commands and data to a DLL for execution. For example,the function call definition can include the number of parameters to bepassed (one of which identifies the DLL to be executed), as well as alist of values of the parameters. More generally, the invention can beimplemented so that new functionality is provided by any set ofinstructions and/or data that will not be identified as a new executingprocess on the managed computer. This approach to updating the agentsoftware can be used, for example, when it is desired to add new remotecomputer management capabilities, such as, for instance, patchmanagement or the ability to scan a LAN for devices connected to amanaged computer, to those already enabled by the agent software.

The use of a DLL to update the functionality of the agent software asdescribed above is advantageous for several reasons. First, the use of aDLL avoids the need to uninstall a version of the agent software alreadyinstalled on the managed computer and install a new version of the agentsoftware including the updated functionality, or install an updateincluding the updated functionality to an existing version of the agentsoftware. The agent software already installed on the managed computercan be used (with the DLL) to effect the updated functionality withoutmodification, thus avoiding a disruptive installation or update process.Second, the use of a DLL avoids the need to engage (and modify) thesecurity policy of the managed computer. Unlike, for example, the firstattempt to begin operation of a new stand-alone executable file, makinga first (or any) use of functionality included in a DLL is notconsidered a new process by security software, but, rather, part of aprocess that has already been authorized (i.e., in this case, operationof the agent software), and therefore avoids the disruption that wouldresult if security software identified a new process, as discussedabove. Further, since the agent software can be installed as a systemservice, any type of functionality (i.e., that requires any level ofrights on the managed computer, such as operations that interact withthe filesystem or the registry) can be added through inclusion in a DLLwithout triggering a security warning on the managed computer. Third,the use of a DLL enables great flexibility in updating of agentsoftware. Since the disruption associated with other ways of updatingagent software is not present, there is no motivation to avoid makingsmall changes to the agent software, i.e., updates to agent software canbe made with as fine a granularity as desired. Fourth, the use of a DLLcan enable the amount of storage capacity required for the instructionsand/or data comprising the agent software to be kept relatively small,since the invention can be implemented so that each managed computerreceives only DLLs that are to be used on that managed computer.

Agent software can also be updated by installing a new version of agentsoftware or providing an update to an existing version of agent softwarethat includes the capability of performing one or more new primitivefunctions that could not be performed by the previous version of agentsoftware installed on the managed computer. This approach can be used,for example, when a change to the operating system of the managedcomputer enables more or different primitive functions to be performedby the managed computer. This approach can also be used, for example, ifa different operating system is used on a managed computer, e.g., theimplementation of primitive functions for use on a managed computeroperating in accordance with a Windows operating system can be differentfrom that for primitive functions for use on a managed computeroperating in accordance with a Unix operating system. In someembodiments of the invention, agent software can be updated by providingone or more new stand-alone executable files that implement primitivefunction(s).

FIG. 2 is a diagram of another embodiment of a network in which remotecomputer management according to the invention can be used, illustratinganother capability of the invention. In FIG. 2, as in FIG. 1, computersat various sites are connected to the Internet. A remote computermanagement server operates at site 201. A remote administrator uses acomputer at site 202 to effect management of a remote computer bycommunicating request(s) for management action(s) to the remote computermanagement server. Computers at site 203 are connected to the Internetthrough a proxy server which mediates access to the Internet by thosecomputers. As explained in more detail below, the invention can beimplemented to enable the remote administrator to effect remotemanagement of one or more of the computers at site 203, notwithstandingthe presence of the proxy server.

When a proxy server is present at a computer network site, agentsoftware operating on a managed computer at that site cannot directlycommunicate with a remote computer management server (i.e., attempt tocommunicate via the communication port assigned for communication withthe remote computer management server), since all communication from themanaged computer must be routed to the communication port assigned forcommunication with the proxy server. The invention can be implemented sothat agent software can detect the presence of a proxy server and modifycommunication to the remote computer management server accordingly(i.e., route such communication to the communication port assigned forcommunication with the proxy server, with instructions to then send thecommunication to the remote computer management server). The presence ofa proxy server can be detected by agent software using conventionalmethods for detecting the presence of a proxy server as known to thoseskilled in the art.

FIG. 3 is a diagram of another embodiment of a network in which remotecomputer management according to the invention can be used, illustratinganother capability of the invention. In FIG. 3, as in FIG. 1, computersat various sites are connected to the Internet. A remote computermanagement server operates at site 301. A remote administrator uses acomputer at site 302 to effect management of a remote computer bycommunicating request(s) for management action(s) to the remote computermanagement server. A computer at site 303 is connected to the Internetthrough a firewall and a gateway which mediate access to the Internet bythe computer. The computer at site 303 is also connected to a switch, arouter, a peripheral device and another computer. As explained in moredetail below, the invention can be implemented to enable the remoteadministrator to enlist the computer at site 303 to effect remotemanagement of devices connected to the computer: in particular, theagent software is used as a proxy to effect requested managementaction(s) regarding the connected devices.

In general, the invention can be implemented to enable use of a managedcomputer to effect management of any device with which the managedcomputer can directly communicate (i.e., without mediation by anotherentity, such as a firewall, gateway and/or proxy server). Such deviceneed not (and typically will not) have agent software associatedtherewith or be susceptible to direct communication from the remotecomputer management server. For example, the invention canadvantageously be implemented to enable use of a managed computer toeffect management of any device that is part of a local area network(LAN) of which the managed computer is also part. The invention can alsoadvantageously be implemented to enable use of a managed computer toeffect management of any device with which the managed computer cancommunicate, but with which the remote computer management server cannotcommunicate directly. For example, the invention can be implemented tomake use of the agent software as a proxy for effecting management ofthe devices illustrated in FIG. 3 that are connected to the managedcomputer at site 303, i.e., switch, router, peripheral device (such as,for example, a printer, scanner, keyboard or display monitor) andanother computer. It can readily be appreciated that there are manyother particular types of devices that can be managed in accordance withthis aspect of the invention.

According to one embodiment of this aspect of the invention (i.e., useof agent software as a proxy to effect requested management of device(s)connected to a managed computer), the remote computer management servercommunicates a command to the agent software instructing the agentsoftware to identify one or more devices connected to the managedcomputer, e.g., the agent software is instructed to scan a LAN of whichthe managed computer is part to identify each other device that isconnected to the LAN. This can be done, for example, by the agentsoftware issuing a TCP/IP ARP command (commonly known as a Aping@) toeach IP address of a LAN of which the managed computer is part,responses to the Apings@ identifying the IP address, MAC address, andcomputer name (if available) of connected devices at those IP addresses.The agent software communicates with the remote computer managementserver to indicate whether there are any such connected devices and, ifso, identify the device(s). If it is desired to effect management of oneof the connected devices, the remote computer management servercommunicates one or more commands to the agent software that produce therequested management action(s). In addition to specifying operation(s)(e.g., primitive function(s), execution of function(s) included in aDLL) to be performed to produce the requested management action(s), thecommand(s) may also identify a communication protocol that is to be usedby the agent software in communicating with the connected device that isto be managed (the ability to communicate with a connected device inaccordance with a particular protocol can be accomplished, for example,by providing a DLL to the agent software that includes function(s) thatenable such capability). For example, communication between devicesconnected via a LAN can occur in accordance with one of a variety ofcommunication protocols, e.g., SNMP, DMI/WMI, ARP; each of thesecommunication protocols can be used by agent software in communicatingwith a device connected to a managed computer to effect managementaction(s) regarding the connected device. The protocol to be used incommunicating with a connected device can be ascertained by the remotecomputer management server from identification of the connected device(e.g., computer name). The protocol to be used in communicating with aconnected device can also be ascertained by successively attemptingcommunication formatted in accordance with a series of possibleprotocols until communication in accordance with one of the protocols issuccessful. The invention contemplates use of any communication protocolrequired or allowed by a connected device, including protocols not yetdeveloped (e.g., new communication protocols that may be necessary toenable communication with devices that will be developed in the future).

Implementing the invention to enable use of a managed computer to effectmanagement of any device connected to the managed computer can beadvantageous for several reasons. The use of agent software as a proxycan eliminate the need for the remote computer management server tonegotiate access to such other devices through one or more firewalls,gateways and/or proxy servers at that network site (since that hasalready been done in establishing communication between the agentsoftware and the remote computer management server), which makes iteasier to effect management of those devices. Additionally, the use ofagent software as a proxy may enable management of devices with whichthe remote computer management server cannot otherwise communicate(e.g., a peripheral device connected to the managed computer, such as aprinter, scanner, keyboard or display monitor).

The invention can be implemented so that communications between theagent software and the remote computer management server are secure. Theinvention can be implemented so that the agent software mustauthenticate itself to the remote computer management server to enablecommunication between the agent software and the remote computermanagement server to occur. Additionally or alternatively, the inventioncan be implemented so that communication between the agent software andthe remote computer management server is encrypted. The invention can beimplemented so that all security features (e.g., authenticationalgorithm(s) and parameters, encryption algorithm(s) and parameters) areembodied in software (i.e., one or more computer programs and/or datastructures, and/or part of one or more computer programs and/or datastructures). For example, the invention can be implemented so that allsecurity features are part of the agent software and cannot be accessedby a process other than the agent software. This can be desirable toprotect communication between the agent software and the remote computermanagement server from external attacks, e.g., to prevent anotherprocess from hijacking the communication to produce unauthorizedcommunications. The invention can be implemented so that the length ofan encryption key is established at the time of linking and compilingthe agent software and server software. This can be desirable, forexample, to prevent an external alteration to, or attack on, thestrength of the encryption algorithm.

FIG. 4 is a flow chart of a method in accordance with the invention forproviding secure and authenticated communication between agent softwareoperating on a managed computer and a remote computer management server.In step 401, a username and password is established for the agentsoftware on the managed computer. For example, the username and passwordcan be established as part of the installation of the agent software onthe managed computer. Any desired constraints can be placed on theusername and password, e.g. minimum and/or maximum number of characters,required number of letters and/or numbers, prohibited characters. In aparticular implementation of the invention, each of the username andpassword are restricted to a maximum and minimum length (which helpsensure strong passwords). In step 402, the agent software initiatescommunication with the remote computer management server by sending theagent software=s username to the remote computer management server. Theusername can be sent in plaintext or encoded. In step 403, in response,the remote computer management server sends a random number (e.g., a 256bit random number) to the agent software. The random number can be sentin plaintext or encoded. In step 404, the agent software performs an XORoperation (e.g., a bit-wise XOR operation) on the random number usingthe agent software=s password. In step 405, the agent software performsa hash operation on the result obtained in step 404. Any appropriatealgorithm can be used to perform the hash operation; in oneimplementation of the invention, the Secure Hash Algorithm-1 (SHA-1)algorithm is used. In step 406, the hash value produced in step 405 issent to the remote computer management server in plaintext. In step 407,the remote computer management server performs an XOR operation (e.g., abit-wise XOR operation) on the random number using the password for theagent software that is known by the remote computer management server(e.g., stored at the remote computer management server). In step 408,the remote computer management server performs a hash operation on theresult obtained in step 407. The same algorithm used in step 405 must beused to perform the hash operation in step 408; thus, in animplementation of the invention as discussed above with respect to step405, the SHA-1 algorithm is used to perform the hash operation of step408. In step 409, the remote computer management server compares thehash value produced by the agent software (step 405) to the hash valueproduced by the remote computer management server (step 408). If thevalues match, then the agent software has been authenticated andcommunication between the agent software and the remote computermanagement server is allowed to proceed in step 410 a. If not,communication between the agent software and the remote computermanagement server is not allowed, as shown in step 410 b. Failedattempts at authentication can be logged by the remote computermanagement server. If the agent software is authenticated in step 409,then, in step 410 a, each subsequent communication between the agentsoftware and the remote computer management server can be encrypted. Anyencryption algorithm can be used. In one implementation of theinvention, an n-bit RC4 algorithm is used (e.g., 128 bit, 256 bit). Theencryption key can be determined in any appropriate manner. For example,the first n bits of the hash value (determined in steps 405 and 408) canbe used as the encryption key.

To enhance the security of communication between the agent software andthe remote computer management server, the invention can be implementedso that a Arolling key@ is used in encrypting communications between theagent software and remote computer management server, i.e., a newencryption key is generated for each communication session (each timethat the agent software initiates communication with the remote computermanagement server). Each new encryption key can be generated in anyappropriate manner. For example, when the method described above withrespect to FIG. 4 is used to authenticate the agent software and encryptcommunications for each communication session between the agent softwareand the remote computer management server, a new encryption key can beproduced for each communication session by updating (changing) the agentsoftware=s password at both the managed computer and the remote computermanagement server after each communication session has been completed.(As discussed above, an encryption key can be extracted from the hashvalue, e.g, the first n bits of the hash value, produced by performing ahash operation on the result of an XOR operation performed on a randomnumber using the password.) Any appropriate method can be used forupdating the agent software=s password, so long as the same method isused by both the agent software and the remote computer managementserver.

A communication session can include many communications between themanaged computer and remote computer management server. On occasion, acommunication session is unintentionally interrupted, i.e., terminatedbefore all communications for that session have been completed. (As iswell known, this is a not uncommon occurrence during communication via anetwork, particularly when the network is large and/or complex, that canoccur for any of a variety of reasons.) When the invention isimplemented so that a Arolling key@ is used in encrypting communicationsbetween the agent software and remote computer management server,interruption of a communication session can cause the current agentsoftware password stored at the managed computer to become differentfrom the current agent software password stored at the remote computermanagement server. This may occur, for example, if one of the remotecomputer management server and agent software concludes that thecommunication terminated normally, while the other does not (e.g., ifthe network connection was lost at a particular point in time that leadsto this conclusion). In that case, the agent software cannotauthenticate itself to the remote computer management server. If theagent software cannot be authenticated to the remote computer managementserver, then the agent software must be re-installed on the managedcomputer to re-initialize the agent software password (the agentsoftware can be implemented, for example, so that a unique initialpassword is associated with each copy of the agent software operating ona particular managed computer). To reduce or eliminate the need for this(and avoid the human intervention that would be required to again makeremote computer management available), the invention can be implementedso that a specified number (e.g., 2, 3, 4) of the most recent agentsoftware passwords are stored by both the managed computer and theremote computer management server. If authentication fails with the mostrecent passwords stored by the managed computer and remote computermanagement server, different combinations of the passwords stored by themanaged computer and remote computer management server are successivelytried until authentication occurs, or no more combinations remain to betried. In most cases, one of the sets of passwords will match, so thatthe agent software can be authenticated without need for re-installationof the agent software.

FIG. 5 is a diagram of another embodiment of a network in which remotecomputer management according to the invention can be used, illustratinganother embodiment of remote computer management in accordance with theinvention. In FIG. 5, as in FIGS. 1, 2 and 3, computers at various sitesare connected to the Internet. A remote computer management serveroperates at site 501. A remote administrator uses a computer at site 502to effect management of a remote computer by communicating request(s)for management action(s) to the remote computer management server. Acomputer at site 503 is connected to the Internet through a firewallwhich controls access to the Internet by the computer. A Amaster server@operates at site 504. The master server supplies the remote computermanagement server at site 501 with the server software and providesupdates to the server software as they occur (the master server can alsoprovide the same service for other remote computer management serverslocated at other sites, not shown in FIG. 5).

The invention can be implemented, in whole or in part, by one or morecomputer programs and/or data structures, or as part of one or morecomputer programs and/or data structures, including instruction(s)and/or data for accomplishing the functions of the invention. The one ormore computer programs and/or data structures can be implemented usingsoftware and/or firmware that is stored and operates on appropriatehardware (e.g., processor, volatile data storage apparatus such as amemory, non-volatile data storage apparatus such as a hard disk).Additionally, as well understood by those skilled in the art in view ofthe description herein, the one or more computer programs and/or datastructures can effect use of appropriate hardware to effect thefunctions of the invention (e.g., processor; volatile and/ornon-volatile data storage apparatus, such as a memory and/or hard disk;network communication apparatus). Those skilled in the art can readilyimplement the invention using one or more computer programs and/or datastructures in view of the description herein. Further, those skilled inthe art can readily appreciate how to implement such computer program(s)and/or data structure(s) to enable execution on any of a variety ofcomputational apparatus and/or using any of a variety of computationalplatforms.

Various embodiments of the invention have been described. Thedescriptions are intended to be illustrative, not limiting. Thus, itwill be apparent to one skilled in the art that certain modificationsmay be made to the invention as described herein without departing fromthe scope of the claims set out below.

We claim:
 1. A non-transitory computer readable storage memory encodedwith one or more computer programs being executed to cause a processorto perform: transmitting, from a remote computer management server to amanaged computer, a dynamically loaded library (DLL) including one ormore sets of instructions that, when implemented by agent software,produce functionality not enabled by the agent software at the time theDLL is transmitted to the managed computer, the functionality performedby the DLL comprising: transmitting device identification information tothe remote computer management server indicating existence of at leastone device connected to the managed computer; receiving at the managedcomputer another DLL comprising additional commands instructing theagent software to perform management actions responsive to theidentification information transmitted, the additional commandsidentifying a communication protocol to be used by the agent softwarewhen communicating with the at least one device; and transmitting fromthe managed computer to the remote computer management server a resultof the performance of the management action.
 2. The non-transitorycomputer readable storage memory as in claim 1, that causes theprocessor to perform receiving at the managed computer a request fromthe remote computer management server to perform a management action. 3.The non-transitory computer readable storage memory as in claim 1, thatfurther causes the processor to perform routing all communicationbetween the managed computer and the remote computer management server.4. The non-transitory computer readable storage memory as in claim 1,that further causes the processor to perform the routing through asingle network communications port that is allowed for other networkcommunication by a firewall and/or gateway that mediates communicationwith the managed computer.
 5. The non-transitory computer readablestorage memory as in claim 1, that causes the processor to performauthenticating the managed computer to the remote computer managementserver.
 6. The non-transitory computer readable storage memory as inclaim 1, that causes the processor to perform encrypting communicationbetween the managed computer and the remote computer management server.7. The non-transitory computer readable storage memory as in claim 6,wherein the encrypting communication between the managed computer andthe remote computer management server causes the processor to perform atleast one of: generating a new encryption key each time that the managedcomputer initiates communication with the remote computer managementserver; and successively comparing different combinations of a specifiednumber of the most recent encryption keys stored by the managed computerand a specified number of the most recent encryption keys stored by theremote computer management server.
 8. The non-transitory computerreadable storage memory as in claim 1, that causes the processor toperform one or more primitive functions via the agent software installedon the managed computer, wherein the primitive functions are at leastone of: get value for script variable; added printers to audit; get Filein multiple blocks; enumerate registry subkeys; enumerate registryvalues; enumerate directory listing; incremental audit; executeapplication and return output; and extend audit to include file types inaddition to .exe.
 9. The non-transitory computer readable storage memoryas in claim 1, that causes the processor to perform scanning a LANassociated with the managed computer to perform the identifying of theat least one device.
 10. The non-transitory computer readable storagememory as in claim 1, that causes the processor to perform receivingresponses at the managed computer indicating the presence of the atleast one device.
 11. The non-transitory computer readable storagememory as in claim 1, that causes the processor to perform transmittingperiodic messages from the managed computer to the remote computermanagement server, wherein the transmitting periodic messages from themanaged computer to the remote computer management server determineswhether there is an outstanding management action that needs to beperformed by the managed computer.
 12. A method, comprising:transmitting, from a remote computer management server to a managedcomputer, a dynamically loaded library (DLL) including one or more setsof instructions that, when implemented by agent software, producefunctionality not enabled by the agent software at the time the DLL istransmitted to the managed computer, the functionality performed by theDLL comprising: transmitting device identification information to theremote computer management server indicating existence of at least onedevice connected to the managed computer; receiving at the managedcomputer another DLL comprising additional commands instructing theagent software to perform management actions responsive to theidentification information transmitted, the additional commandsidentifying a communication protocol to be used by the agent softwarewhen communicating with the at least one device; and transmitting fromthe managed computer to the remote computer management server a resultof the performance of the management action.
 13. The method of claim 12,comprising receiving at the managed computer a request from the remotecomputer management server to perform a management action.
 14. Themethod of claim 12, comprising routing all communication between themanaged computer and the remote computer management server through asingle network communications port that is allowed for other networkcommunication by a firewall and/or gateway that mediates communicationwith the managed computer.
 15. The method of claim 12, comprisingauthenticating the managed computer to the remote computer managementserver.
 16. The method of claim 12, comprising encrypting communicationbetween the managed computer and the remote computer management server,wherein the encrypting comprises at least one of: generating a newencryption key each time that the managed computer initiatescommunication with the remote computer management server; andsuccessively comparing different combinations of a specified number ofthe most recent encryption keys stored by the managed computer and aspecified number of the most recent encryption keys stored by the remotecomputer management server.
 17. The method of claim 12, comprisingscanning a LAN associated with the managed computer to perform theidentifying of the at least one device.
 18. The method of claim 12,comprising receiving responses at the managed computer indicating thepresence of the at least one device.
 19. The method of claim 12,comprising transmitting periodic messages from the managed computer tothe remote computer management server, wherein the transmitting periodicmessages from the managed computer to the remote computer managementserver determines whether there is an outstanding management action thatneeds to be performed by the managed computer.
 20. The method of claim12, comprising performing one or more primitive functions via agentsoftware installed on a managed computer, wherein the primitivefunctions are at least one of: get value for script variable; addedprinters to audit; get File in multiple blocks; enumerate registrysubkeys; enumerate registry values; enumerate directory listing;incremental audit; execute application and return output; and extendaudit to include file types in addition to .exe.