Solved

Microsoft Assessment and Planning (MAP) Toolkit for Audit

Posted on 2012-03-29
3
1,249 Views
Last Modified: 2012-03-30
We have a client who got notification that Microsoft has ordered an audit to be conducted on their network.  They were asked to run the MAP tool to generate a software license usage report.  Any unlicensed software that the tool finds can be purchased to get "current and legal".  As a result, no legal actions will be taken against the client.   This is a new client that came to us from a vendor who still has access to their Open License account.  The client told us that they know they are not in compliance on some software.  They also said that their previous vendor had three other clients call this week about upcoming audits.

Question:

Is it advisable for us  (or all of our clients) to run the MAP tool to verify compliance?

We stress to our clients the importance of being compliant.  

Since we have not used this tool, we want to MAKE SURE WE DO NOT trigger an audit by running the assessment!!!  Could this trigger an audit?

NOTE:  We use other tools to gather network and licensing information, such as Belarc, Spiceworks, and MS Baseline Security Analyzer.
0
Comment
Question by:sfjcpu
  • 2
3 Comments
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 250 total points
ID: 37785626
In my experience and in conversation with people who developed MAP and other MVPs who use it, MAP does NOT report ANYTHING identifiable back to Microsoft.  I wouldn't hesitate to use the tool.

Indeed, if I understand this correctly "They also said that their previous vendor had three other clients call this week about upcoming audits." what probably happened is a disgruntled employee or someone who heard a radio commercial probably decided to report them to the BSA in hopes of collecting a reward for reporting license violators.  More info, reference:
http://www.bsa.org/country.aspx?sc_lang=en
0
 
LVL 36

Assisted Solution

by:Jian An Lim
Jian An Lim earned 250 total points
ID: 37785634
the tools will not trigger audit.

audit was trigger because a improper practice (or whistle blow) on a vendor as a result all the client get audit.

If you do the right thing as best as you can, you don't need to worry an audit.

you can ask your client to run a MAP tool to verify compliance to increase sales :)  you got nothing to lost.

Of course, if some one complain to microsoft, and did an audit on your client and found some is not compliance, then microsoft might start to audit your other clients.

again, it is not your responsible, it is the company responsible to make it up to date, and you are assisting them to do the right choice (although the right choice also come with a cost)
0
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 37785645
I'll also add that if the client squares up and gets all the necessary licenses BEFORE receiving the letter requesting an audit then they should not be liable for any fines (as I understand the process).  If you have seen the letter, great... my understanding comes mostly from http://blawg.bsadefense.com/
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco 5508 WLC software upgrade 2 71
Network bottleneck identifier 13 51
Connectivity issues after power outage 5 34
VPN Server config in Modem 5 30
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question