The table below details the various tasks commonly performed by Loop1 during an engagement and the associated information or preparation that is required by the client.

Task performed by Loop1

Client to provide for Loop1 to accomplish associated task

Deploy, configure and tune additional data collectors A list of servers where additional (optional) data collectors are to be installed on has been created or determined during the review phase. Details for such servers have been gathered such as IP Addresses, DNS names, administrative credentials, etc.
Create Users and Account Limitations A list of Profiler Administrators and Users has been provided; user roles and desired view limitations have been captured in the requirements phase.
Setup email (SMTP) server settings SMTP server details have been provided (IP address, DNS name and authentication parameters if needed).
Email alert customization parameters (from address, email subjects) have been defined.
Generate Alerts Email distribution group addresses for personnel receiving alerts and SMTP server settings have been provided.
Generate Reports, Configure Report Scheduler Reporting requirements have been established during the requirements phase.  E-mail distribution groups or addresses have been provided for Report Scheduler, SMTP server settings have been provided.
Optional: Generate Pass-through Authentication with Active Directory Domain and user information is provided (Should the Client require pass-through authentication with Active Directory.)
Create Targets in Storage Profiler A list of Storage Arrays to be monitored has been gathered during the requirements phase. Administrative credentials to the array(s) will be required.
IP Addresses for all storage processors have been identified during the requirements phase.
For most arrays, downloading a vendor-supplied SMI-S Provider is required prior to configuring the array in Profiler.
Download and install SMI-S Providers (not all arrays) Computers where this component is to be installed have been identified during the requirements phase. Local administrative credentials to these systems will be required.