Inventory
🖥️ Inventory
Know What You Have, in Rich Detail
Have you ever needed to quickly answer how many laptops with 512GB SSDs are in a specific location? Or which machines have outdated antivirus?
With Hardware Inventory, you get those answers in seconds. And the Machine Profile gives you a complete X-ray of each device: processor, memory, manufacturer, status, and much more.
In the Software Inventory, you can see what’s installed, what’s been changed, and with the approval control, define what is allowed — and what needs to be removed.
Additionally, with Custom Data, you can add key fields like asset number, cost center, or user name. This lets you correlate technical data with administrative information.
Hardware
- Hardware Inventory: View detailed information about equipment.
- Machine Profile: Access specific data for each device.
Software
- Software List: Complete listing of detected software.
- Software Approval: Approve or reject software according to internal policies.
- “Red Alert” Software: Identify software that poses security risks.
Custom Data
- Custom Data: Additional configurable fields to enrich the inventory.
- Associate Form: Customize asset registration with specific information.
- SNMP: Manage network devices using the SNMP protocol.
- Network Devices: Inventory of switches, routers, and other equipment.
- Related Interfaces: Monitor network connections.
Reports
- Hardware: Custom reports about physical devices.
- Monitor: Information about monitors connected to devices.
- Software: Data about installed and used software.
- Software Metering: Evaluation of actual software usage.
- Shared Folders: View and manage network shared folders.
- Downloaded Batches Reports: Track inventory and update packages.
- Consolidated Inventory: Overall grouped inventory view.
- Changes: Tracking and managing changes within the environment.
- Machine Downtime: Monitor periods when devices were offline.
- Device without Agent: Identify devices that lost communication with the system.
- Attachment Manager: Manage the files that are attached to licensing or device records.
Geolocation
- Perimeter Exception: Detect assets that are outside the expected area.
- Location History: View records of device movement.
- Define Perimeter: Set location limits for monitoring.
Lifecycle
- Manage Substatus: Define sub-stages for better lifecycle control.
- Manage Models: Register and organize device models.
- Register Contract: Record purchase, lease, or maintenance contracts.
- Link Device to Contract: Associate devices with active contracts.
- Manage Device Lifecycle: Control the lifecycle stages of your assets.
- Contract Management: Administer all contracts related to your assets.
- Equipment Status Report: Assess the current status of assets linked to contracts.
- Manage Companies: Organize the companies involved in asset management.