Hardware and Software Inventory
Inventory of the Whole Network
Based on the comprehensive inventory of your network, LOGINventory provides you as administrator with an automated and detailed overview of all assets you need for the management of individual server systems, complex IT infrastructures or entire data centers. Our network inventory accompanies you optimally in the procurement, installation, configuration, operation, maintenance, and servicing of your network components and is the basis for a reliable IT documentation and license management for your company.
The network inventory of LOGINventory is agentless and covers Windows computers, Macs, Linux and mobile devices as well as all SNMP-enabled devices such as printers and switches. This gives you a complete overview of the entire hardware and software in your network.
What can be inventoried?
Which data does LOGINventory collect?
Depending on the type of device, different data are available for evaluation. For example, a MAC address table is available for switches, but no software inventory.
The following values, for example, can be read from the IT inventory of your network:
By collecting data from clients and servers, the following information about the existing software can be displayed:
Scan of the Configuration
The IT inventory of all network components shows the status of firewall, antivirus and antispyware as well as the following data:
LOGINventory can display a variety of user account-related information, which simplifies user management considerably:
Would you like to monitor your network or systems even more closely? No problem, the collection can be easily extended and adapted. For example, additional OIDs from SNMP devices, registry entries or files located in specific locations can be integrated into the scan process. You can read more about this in the manual.
How to Inventory?
LOGINventory offers different methods to collect all data so that all details from your company’s network are available for evaluation. All methods follow one goal: Simple, automated information retrieval from all relevant devices.
Agentless Network Inventory
LOGINventory can e.g. use IP address ranges to scan the network agentlessly and collect all information. For this purpose, the device to be scanned must support a remote interface (e.g. Windows APIs, SSH, SNMP) and an account must be stored in LOGINventory that has the right to query the data. These scans can be automated, so that depending on the time schedule, the acquisition is fully automated and you don’t have to worry about anything.
Acquisition via Logon Script
Alternatively, the data can also be captured using a logon script without an agent. For this purpose, only the call of a scan file has to be positioned in the logon script of the computer. Then computers are captured in the user context as soon as a user logs on. The data transfer takes place automatically.
Agent-Based Inventory of Laptops Outside the LAN
In order to inventory laptops of field staff in off-site locations without a VPN connection, LOGINventory can record the computers with the help of an agent and transfer the data e.g. via HTTPS.
Acquisition via USB Stick
Particularly suitable for one-time recording: By executing a scan file that is copied to a USB stick, devices are scanned in approximately 30 seconds. The collected data can then be imported into the corresponding database and made available for evaluation.
Inventory and User Management: Issue and Return of Devices
LOGINventory offers the possibility to automatically generate an individual label including QR code for all devices, including IT peripherals and accessories, and to document the issuing or return of the device to/from a specific user.
Each asset managed in LOGINventory has its own inventory number. This inventory number is the basis for generating a unique web address for each device by means of a QR code.
LOGINventory automatically generates directly printable QR code labels in common formats. All you need is a label printer, and you can then apply the labels to the devices. The labels can be edited and personalized with the company logo, for example.
The QR code labels can be easily scanned with a smartphone or tablet without requiring an app. On the page that opens, you can see various details of the device. In the case of the hand out, a user can be selected to whom the device should be given. Furthermore, there is a field to add a note and a signature field where the user can sign with his finger. By completing the hand-over process using the handout button, a lifecycle entry is stored in LOGINventory on the device containing the entered data and the signature, and the owner (main user) of the device is updated. The return works analogously.
How can the Inventory Data be Evaluated?
For the efficient management of your company’s network, it is essential that you get the data you really need quickly and easily. Our software solution provides various evaluation options for this purpose.