Inventory of the Whole Network

Based on the comprehensive inventory of your network, LOGINventory provides you as administrator with an automated and detailed overview of all assets you need for the management of individual server systems, complex IT infrastructures or entire data centers. Our network inventory accompanies you optimally in the procurement, installation, configuration, operation, maintenance, and servicing of your network components and is the basis for a reliable IT documentation and license management for your company.

The network inventory of LOGINventory is agentless and covers Windows computers, Macs, Linux and mobile devices as well as all SNMP-enabled devices such as printers and switches. This gives you a complete overview of the entire hardware and software in your network.

What can be inventoried?

Windows

Clients starting from Windows 95 and Server starting from NT

macOS

MacBooks, iMacs, Mac mini, Mac Pro

Linux

Thin clients, NAS, telephone systems, etc.

Networking Devices

Switches, Routers & Printers

Inside the LAN, but also externally

You can use the Offline Agent to inventory laptops of field staff for example.

Virtualization

VMware ESXi, Hyper-V, XenServer, KVM

Microsoft Exchange Server

Local or in the cloud: organization, databases, mailboxes

Databases

Inventory of databases and access rights

Active Directory

Computer accounts, user accounts with recursive resolution of group membership

Mobile Devices

Smartphones and tablets connected via Exchange Active Sync

Adding Devices Manually

Manage devices in LOGINventory that do not have a network interface, such as projectors!

Permissions

Who has what kind of access to shares, folders and databases? Who has administrator rights on which devices?

Azure Active Directory

Data on users, computers and groups incl. permissions and roles in Azure AD (Microsoft Entra ID)

Microsoft 365 Cloud Subscriptions

Determination of available licenses (e.g. Office 365) and allocation to users

Azure / AWS Virtual Machines

Identification of various details about the VMs in Azure / AWS: status, plan, IP, data center, …

Test LOGINventory yourself!

Free download, ready to use in 5 minutes. Why not give it a try?

Which data does LOGINventory collect?

Depending on the type of device, different data are available for evaluation. For example, a MAC address table is available for switches, but no software inventory.

Hardware Inventory

The following values, for example, can be read from the IT inventory of your network:

Hardware Inventory

Software Inventory

By collecting data from clients and servers, the following information about the existing software can be displayed:

Software Inventory

Scan of the Configuration

The IT inventory of all network components shows the status of firewall, antivirus and antispyware as well as the following data:

Network Inventory: Configuration

User-Related Data

LOGINventory can display a variety of user account-related information, which simplifies user management considerably:

Would you like to monitor your network or systems even more closely? No problem, the collection can be easily extended and adapted. For example, additional OIDs from SNMP devices, registry entries or files located in specific locations can be integrated into the scan process. You can read more about this in the manual.

How to Inventory?

LOGINventory offers different methods to collect all data so that all details from your company’s network are available for evaluation. All methods follow one goal: Simple, automated information retrieval from all relevant devices.

Logo Remote Scanner

Agentless Network Inventory

LOGINventory can e.g. use IP address ranges to scan the network agentlessly and collect all information. For this purpose, the device to be scanned must support a remote interface (e.g. Windows APIs, SSH, SNMP) and an account must be stored in LOGINventory that has the right to query the data. These scans can be automated, so that depending on the time schedule, the acquisition is fully automated and you don’t have to worry about anything.

Acquisition via Logon Script

Alternatively, the data can also be captured using a logon script without an agent. For this purpose, only the call of a scan file has to be positioned in the logon script of the computer. Then computers are captured in the user context as soon as a user logs on. The data transfer takes place automatically.

Logo Skript
Logo Offline Agent

Agent-Based Inventory of Laptops Outside the LAN

In order to inventory laptops of field staff in off-site locations without a VPN connection, LOGINventory can record the computers with the help of an agent and transfer the data e.g. via HTTPS.

Acquisition via USB Stick

Particularly suitable for one-time recording: By executing a scan file that is copied to a USB stick, devices are scanned in approximately 30 seconds. The collected data can then be imported into the corresponding database and made available for evaluation.

Erfassung mittels USB-Stick

Would you like to know more? Take a look at the manual and see all the details!

Inventory and User Management: Issue and Return of Devices

LOGINventory offers the possibility to automatically generate an individual label including QR code for all devices, including IT peripherals and accessories, and to document the issuing or return of the device to/from a specific user.

QR Code Label Scan

Each asset managed in LOGINventory has its own inventory number. This inventory number is the basis for generating a unique web address for each device by means of a QR code.

LOGINventory automatically generates directly printable QR code labels in common formats. All you need is a label printer, and you can then apply the labels to the devices. The labels can be edited and personalized with the company logo, for example.

The QR code labels can be easily scanned with a smartphone or tablet without requiring an app. On the page that opens, you can see various details of the device. In the case of the hand out, a user can be selected to whom the device should be given. Furthermore, there is a field to add a note and a signature field where the user can sign with his finger. By completing the hand-over process using the handout button, a lifecycle entry is stored in LOGINventory on the device containing the entered data and the signature, and the owner (main user) of the device is updated. The return works analogously.

How can the Inventory Data be Evaluated?

For the efficient management of your company’s network, it is essential that you get the data you really need quickly and easily. Our software solution provides various evaluation options for this purpose.

Double Click

Would you like to know which applications are available on a computer, how many memory slots are occupied, or who has administrator rights there? By double clicking on the computer name you are at your destination. All details can be viewed, filtered and exported directly in the LOGINventory interface.

Queries

With the large number of queries provided, we already provide various evaluations over the entire network. You want to see other columns? Customize the query! You only want to see devices of a certain location in the evaluation? Set your own filter conditions and also use self-defined fields, such as cost center or purchase date!

Tasks and Notifications

You want to know about all important changes even if LOGINventory is not opened? Define your own tasks and notifications and be notified by e-mail if there are too few licenses, new devices have been found in the network, critical events have occurred or the antivirus software is no longer up-to-date. Or have reports filed automatically.

Graphical Overview of the Network

With the Topology View you can create a graphical overview of the network. You can see which device is attached to which port, which virtual machines are running on which hosts, and how switches are connected.

Reports

In Reports the data is presented in a prepared form so that important information can be captured quickly. LOGINventory comes with a multitude of predefined reports, e.g. for client documentation, server documentation, authorization analysis, or compliance report. All reports can be customized and of course you can create your own report templates.

Change Log

With the help of the change history you can see when what has changed on which device. When were hotfixes installed? Where was another screen plugged in? When were USB devices removed? The evaluations can be carried out for individual computers, but also for the entire network.

You can find out in detail how to carry out IT documentation with LOGINventory here.

Web Interface

Read access to all data via a browser

Portable Version

Full access to all functions without installation

Multi-User Operation

Parallel access from multiple devices and definition of user roles

Your Advantages of Network Inventory with LOGINventory

  • Minimum installation and maintenance effort due to agentless operation
  • Quick overview of your entire network through hardware inventory and software inventory
  • Create your own queries/evaluations to keep track of the information relevant to you
  • Log changes to hardware and software, e.g. to support the helpdesk
  • Linking of documents and own properties with the devices
  • Basis for IT documentation and license management

Test LOGINventory yourself!

Free download, ready to use in 5 minutes. Why not give it a try?