Your Advantages of Network Inventory with LOGINventory

  • Minimum installation and maintenance effort due to agentless operation
  • Quick overview of your entire network through hardware inventory and software inventory
  • Create your own queries/evaluations to keep track of the information relevant to you
  • Log changes to hardware and software, e.g. to support the helpdesk
  • Linking of documents and own properties with the devices
  • Basis for IT documentation and license management

IT Inventory Management for the Whole Network

Based on the comprehensive inventory of your network, LOGINventory provides you, as an administrator, with an automated and detailed overview of all assets you need for the management of individual server systems, complex IT infrastructures, or entire data centers. Our network inventory software accompanies you optimally in the procurement, installation, configuration, operation, maintenance, and servicing of your network components and is the basis for a reliable IT documentation and software license management for your company. Also, you can easily create network diagrams with LOGINventory.

The network inventory feature as part of our IT Asset Management Software is agentless and covers Windows computers, Macs, Linux and mobile devices as well as all SNMP-enabled devices such as printers and switches. This orivides you with a complete overview of the entire hardware and software in your network.

What can be inventoried?

Windows

Clients starting from Windows 95 and Server starting from NT

macOS

MacBooks, iMacs, Mac mini, Mac Pro

Linux

Thin clients, NAS, telephone systems, etc.

Networking Devices

Switches, Routers & Printers

Inside the LAN, but also externally

You can use the Offline Agent to inventory laptops of field staff for example.

Virtualization

VMware ESXi, Hyper-V, XenServer, KVM

Microsoft Exchange Server

Local or in the cloud: organization, databases, mailboxes

Databases

Inventory of databases and access rights

Active Directory

Computer accounts, user accounts with recursive resolution of group membership

Mobile Devices

Smartphones and tablets connected via Exchange Active Sync

Adding Devices Manually

Manage devices in LOGINventory that do not have a network interface, such as projectors!

Permissions

Who has what kind of access to shares, folders and databases? Who has administrator rights on which devices?

Azure Active Directory

Data on users, computers and groups incl. permissions and roles in Azure AD (Microsoft Entra ID)

Microsoft 365 Cloud Subscriptions

Determination of available licenses (e.g. Office 365) and allocation to users

Azure / AWS Virtual Machines

Identification of various details about the VMs in Azure / AWS: status, plan, IP, data center, …

Test LOGINventory yourself!

Free download, ready to use in 5 minutes. Why not give it a try?

Which data does our Network Inventory Software collect?

Depending on the type of device, different data are available for evaluation. For example, a MAC address table is available for switches, but no software inventory.

Hardware Inventory

For instance, the IT inventory of your network can provide access to the following values:

Hardware Inventory

Software Inventory

By gathering data from both clients and servers, it is possible to showcase the following information pertaining to the current software in use:

Software Inventory

Scan of the Configuration

The IT inventory of all network components displays the status of firewall, antivirus and antispyware as well as the following data:

Network Inventory: Configuration

User-Related Data

LOGINventory provides a diverse range of user account-related information, significantly streamlining user management processes:

Are you interested in monitoring your network or systems with even greater precision? It’s simple; the collection process can be easily expanded and customized. For instance, you can integrate additional OIDs from SNMP devices, registry entries, or files located in specific directories into the scanning procedure. Further details about this customization are available in the manual.

How is the network inventoried?

LOGINventory presents various methodologies for gathering data, ensuring comprehensive access to all details within your company’s network for thorough evaluation. These methods are unified by a singular objective: Streamlined, automated retrieval of information from all relevant devices.

Logo Remote Scanner

Agentless Network Inventory

LOGINventory can utilize IP address ranges to effortlessly scan the network and gather comprehensive information. For this process, the device being scanned needs to support a remote interface (like Windows APIs, SSH, SNMP), and LOGINventory must have an account stored with the appropriate permissions to access the data. These scans can be automated, meaning they run on a schedule, ensuring fully automated acquisition without any manual intervention, giving you peace of mind.

IT-Inventory via Logon Script

Alternatively, data can be gathered using a logon script, eliminating the need for an agent. To achieve this, simply include the call of a scan file within the computer’s logon script. This captures computer information in the user context immediately upon user login, enabling automatic data transfer without additional manual steps.

Logo Skript
Logo Offline Agent

Agent-Based Inventory of Laptops Outside the LAN

To efficiently inventory laptops used by field staff in off-site locations lacking a VPN connection, LOGINventory can catalog these computers using an agent and subsequently transfer the data securely, for instance, through HTTPS.

Computer Inventory via USB Stick

Ideal for one-time data capture: Simply run a scan file copied onto a USB stick to swiftly scan devices in just around 30 seconds. Subsequently, import the gathered data into the respective database for convenient access and evaluation purposes.

Erfassung mittels USB-Stick

Would you like to know more? Take a look at the manual and see all the details!

IT Inventory and User Management: Issue and Return of Devices

LOGINventory offers the possibility to automatically generate an individual label including QR code for all devices, including IT peripherals and accessories, and to document the issuing or return of the device to/from a specific user.

QR Code Label Scan

Each asset managed within LOGINventory is assigned a unique inventory number. This number serves as the foundation for generating an exclusive web address for each device through a QR code.

LOGINventory streamlines the automatic creation of printable QR code labels in widely-used formats. All you require is a label printer to affix these labels onto devices. Additionally, these labels are customizable and can be personalized by incorporating your company logo.

These QR code labels are easily scannable using a smartphone or tablet without the need for an app. Upon scanning, the opened page displays various device details. During device handouts, users can be selected to whom the device is allocated. Furthermore, there are fields available to include notes and a signature section where users can sign using their finger. Completing the handover process via the designated button records a lifecycle entry within LOGINventory, capturing the entered data and signature on the device. Moreover, the device’s owner (main user) is updated accordingly. The return process operates in a similar manner.

How to Analyze Inventory Data?

Efficiently managing your company’s network relies on swiftly accessing the necessary data. Our network inventory software offers multiple evaluation options designed to facilitate quick and easy access to the information you require.

Double Click

Would you like to know which applications are available on a computer, how many memory slots are occupied, or who has administrator rights there? By double clicking on the computer name you are at your destination. All details can be viewed, filtered and exported directly in the LOGINventory interface.

Queries

With the large number of queries provided, we already provide various evaluations over the entire network. You want to see other columns? Customize the query! You only want to see devices of a certain location in the evaluation? Set your own filter conditions and also use self-defined fields, such as cost center or purchase date!

Tasks and Notifications

You want to know about all important changes even if LOGINventory is not opened? Define your own tasks and notifications and be notified by e-mail if there are too few licenses, new devices have been found in the network, critical events have occurred or the antivirus software is no longer up-to-date. Or have reports filed automatically.

Graphical Overview of the Network

With the Topology View you can create a graphical overview of the network. You can see which device is attached to which port, which virtual machines are running on which hosts, and how switches are connected.

Reports

In Reports the data is presented in a prepared form so that important information can be captured quickly. LOGINventory comes with a multitude of predefined reports, e.g. for client documentation, server documentation, authorization analysis, or compliance report. All reports can be customized and of course you can create your own report templates.

Change Log

With the help of the change history you can see when what has changed on which device. When were hotfixes installed? Where was another screen plugged in? When were USB devices removed? The evaluations can be carried out for individual computers, but also for the entire network.

You can find out in detail how to carry out IT documentation with LOGINventory here.

Web Interface

Read access to all data via a browser

Portable Version

Full access to all functions without installation

Multi-User Operation

Parallel access from multiple devices and definition of user roles

Test LOGINventory yourself!

Free download, ready to use in 5 minutes. Why not give it a try?