Upload
dangthu
View
237
Download
3
Embed Size (px)
Citation preview
1. Total Network Inventory Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.1 Techpaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Scanning Microsoft Windows assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.1.2 Scanning Unix-based assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.1.3 Scanning other network assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Collected information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.2.1 Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.2.2 OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121.2.3 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.2.4 FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141.2.5 ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151.2.6 Generic devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.3 FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171.4 Feedback and support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221.5 Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231.6 Trial version limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241.7 Installation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251.8 User manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.8.1 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301.8.1.1 Data import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.8.2 Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331.8.3 Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
1.8.3.1 Selecting a node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371.8.3.2 Altering the Storage structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391.8.3.3 Information display settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401.8.3.4 Searching in the Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411.8.3.5 Storage assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.8.3.5.1 Working with assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431.8.3.5.2 Description of assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
1.8.3.6 Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481.8.3.7 Custom assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511.8.3.8 Synchronization with Aсtive Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
1.8.4 Network scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571.8.4.1 Adding scan tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581.8.4.2 Managing added tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601.8.4.3 Scan process and scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641.8.4.4 Saving, importing and exporting tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661.8.4.5 Scan scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.8.5 Scanning using agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691.8.5.1 Manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701.8.5.2 Logon script scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721.8.5.3 Resident agent scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.8.6 Common reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761.8.6.1 Building reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771.8.6.2 Viewing information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791.8.6.3 Printable reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811.8.6.4 Additional features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
1.8.7 Table reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861.8.7.1 Creating a template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881.8.7.2 Template management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
1.8.8 Software asset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 941.8.8.1 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951.8.8.2 Software management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
1.8.8.2.1 Browsing, searching and filtering software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971.8.8.2.2 Inspecting a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
1.8.8.3 License management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041.8.8.3.1 Creating a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1061.8.8.3.2 Sorting out auto-detected license keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081.8.8.3.3 Licensing software installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091.8.8.3.4 Editing a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
1.8.8.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1131.8.8.4.1 Report builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
1.8.9 Change log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151.8.10 Storage properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1181.8.11 Network node properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191.8.12 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1211.8.13 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1231.8.14 Custom fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1251.8.15 Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1261.8.16 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281.8.17 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Total Network Inventory Documentation
Total Network Inventory DocumentationSearch this documentation Popular topics
Getting started 6
Softwaremanagement 6
Printable reports 4
Alerts 4
Snapshots 4
Licensemanagement 4
Change log 4
Viewing information 3
Storage properties 3
Selecting a node 3
TechpaperList of termsMinimum system requirements for the admin unitDatabase mechanismScan technology
List of terms
TNI 3: stands for and represents its name and trademark.Total Network Inventory 3
Admin unit (main unit): a GUI application operated by the user. It's installed on a workstation or a server computer and is used for gatheringinventory information, viewing it and including into reports.
Scanning: a process of obtaining information on hardware and software from computers and other devices.
Storage: application's database.
Minimum system requirements for the admin unit
CPU 1000 MHz
RAM 512 MB
HDD space 30 MB + 0,35 MB per stored asset
Network TCP/IP
OS Windows XP Professional SP3 / Windows Server 2003 SP2
Screen 1280x1024
Database mechanism
The TNI 3 database (a.k.a the ) is a folder created by the user on a hard drive. Each inventoried asset is represented in it as aStorageseparate file of specific format. Auxiliary data is stored separately from the asset files and includes , logins and passwords foruser informationremote access, etc. All data is compressed and encrypted.
It's possible to create several separate storages and switch between them at any time. Asset-related data can be copied to another storageby copying the corresponding file.
Scan technology
Scanning Microsoft Windows assetsScanning Unix-based assetsScanning other network assets
1. 2. 3. 4. 5.
Scanning Microsoft Windows assetsTechnologyRemote scanning via the SMB protocol
How it worksRequirements for the target machine
Remote scanning via the RPC protocolHow it worksDisadvantagesRequirements for the target machine
Manual scanningHow it worksAdditionallyRequirements for the target machine
Scanning overheadLow-level hardware scan
Technology
Windows Management Instrumentation (WMI) is Microsoft's implementation of (WBEM) standard forWeb-Based Enterprise ManagementWindows operating systems.
Using WMI technology, TNI 3 obtains software and hardware information, as well as computer registry data.
There are three methods for scanning Windows-based computers.
Remote scanning via the SMB protocol
How it worksExecutable (an agent) is uploaded to the administrator's shared folder on a remote computer.tniwinagent.exe admin$TNI's main unit connects to the Service manager on the target PC, installs the agent as a service and starts it.The agent collects information and saves it into a compressed file. Then it stops.The main unit imports the resulting file into the storage.The agent service is uninstalled, and the executable is deleted.
Requirements for the target machine
CPU 500 MHz
RAM 64 MB
HDD space 10 MB
TCP ports 445, 139
Services ServerWindows Management Instrumentation (WMI)Remote Procedure Call (RPC)Remote Registry
WMI service is pre-installed on Windows 2000 and higher. For Windows NT, Windows 95 and Windows 98 it is available fordownload from the Microsoft website.
Manual scanning is the only way to collect information from computers running Windows XP Home Edition. This OS cannot beaccessed remotely due to its limitations. Any connection attempt will result in the Access denied error.
No traces of scanning will remain on the target PC after the scan is complete.
1. 2. 3.
1.
2.
Resources ipc$admin$
Protocols SMBNetBIOS (for Windows NT4)TCP/IP
Windows versions XP Pro, Vista, 7, 8, 8.1, 10, Server 2003/2008/2012(incl R2)/2016
Remote scanning via the RPC protocol
How it works
TNI's main unit connects directly to the WMI service on the target PC via the RPC protocol and collects information remotely.
Disadvantages
Significant traffic is generated.The scanning speed depends on the connection quality.All data processing is performed by the main unit. This considerably increases the consumption of system resources when scanninglarge networks.
Requirements for the target machine
CPU 500 MHz
RAM 64 MB
HDD space 10 MB
TCP ports 135 and random ports above 1024
Services Windows Management Instrumentation (WMI)Remote procedure call (RPC)
Protocols RPCTCP/IP
Windows version 2000, XP Pro, Vista, 7, 8, 8.1, 10, Server 2000/2003/2008/2012(incl R2)/2016
Manual scanning
How it works
Executable (an agent) is copied to the target computer and launched. , tniwinagent.exe manually When the scanning is complete theagent creates a file containing the collected information.The resulting file must be moved to the TNI 3 storage.
Additionally
The agent can be run by a domain logon script, by the task scheduler or on Windows startup.
Command line parameters of the agent tniwinagent.exe:
/path:"\\server\share" allows to set a path to a folder where the data file will be placed;/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;
This method has no advantage over the scanning via SMB. It is recommended for use only when, for whatever reason, the SMBprotocol can't be used.
/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;/overwrite overwrites the data file in case the target folder already contains its older version.
See the Manual scan section for details.
Requirements for the target machine
CPU 500 MHz
RAM 64 MB
HDD space 10 MB
Services Windows Management Instrumentation (WMI)
Windows version XP Home/Pro, Vista, 7, 8, 8.1, 10, Server 2003/2008/2012(incl R2)/2016
Scanning overhead
All scanning methods require CPU time and execution of a variety of disk operations, which is why an insignificant loss of efficiency may occurwhile scanning a computer. Scanning usually takes 1-2 minutes.
Online scanning methods (on demand) generate network traffic:
Method To remote computer(upload)
From remote computer(download)
SMB 1.8 MB 0.05-0.1 MB
RPC 10 MB 18 MB
Numbers in the table represent average values including service data size (i.e. packet headers, etc.).
High traffic during RPC scanning is a result of WMI's collection of data from the registry, and it depends on the number of applications andservices installed on the remote computer.
Low-level hardware scan
In the manual scan mode, as well as during remote scanning via the SMB protocol, TNI installs a third-party driver to collect low level hardware details, such as memory SPD data, HDD S.M.A.R.T. data, etc. In the normal mode, the driver is installed and uninstalled each time thescan is run, which only takes a fraction of a second.
There's a known issue with the Intel storage driver ( ). A bug in this driver causes a BSOD during low-level disk subsystem scanning.iastor.sysA workaround has been implemented for this: TNI skips low-level disk scanning when the driver is detected. This behaviour can be changedin the program settings or using command-line switches in the standalone agent.
1. 2.
3. 4.
5.
1.
2.
Scanning Unix-based assetsTechnologyRemote scanning via the SSH protocolManual scanning
Technology
Computers based on operating systems are scanned by . An agent is an executable uploaded viaOS X, Linux, FreeBSD, and ESX/ESXi agentsthe SSH and SCP/SFTP protocols to a remote computer and gathers information about its hardware and software using the operating systemutilities.
The SSH protocol enables exchanging data between two hosts using a secure channel. Currently, there are 2 versions of this protocol: SSH-1and SSH-2. TNI 3 uses SSH-2 for scanning. Most modern UNIX systems allow use of this protocol.
The and protocols are used for file transfers through a secure channel between two hosts. They are components of most modernSCP SFTP SSH servers. TNI 3 supports both of these protocols.
Remote scanning via the SSH protocol
How it works:
TNI 3 connects to the remote computer via the SSH protocol.A temporary folder is created in the remote user's home folder. The agent is uploaded there using either the SFTP or the SCPthenprotocol.The scanning agent is run and creates a file with gathered information upon completion of its work.A file containing computer information is then transferred via the SFTP or SCP protocol back to TNI 3 and added to the openedstorage.The temporary folder containing the agent and the created file is deleted.
Before starting a scan one should make sure that:
the remote computer runs an SSH-2 server (on TCP port 22) that supports SFTP or SCP, and firewall allows access to it;the remote user is allowed to access the SSH-server (the option). If scanning is done under the user, the AllowUsers root PermitRoot
option should be set to ;Login yesthe remote user must have administrative privileges (for Linux: be in the list if the user is other than ).sudoers root
The operating system should provide the agent with a number of utilities so it can collect all needed data from the computer. The list ofutilities depends on the operating system configuration. If one of the utilities is not installed on the scanned computer, a message will bedisplayed in the appropriate category of the Common reports view.
Furthermore, the operating system should be able to provide standard C++ library .libstdc++.so.6
Manual scanning
How it works:
Executable tniwinagent.exe (an agent) is copied to the target computer and launched. When the scanning is complete, manually the.agent creates a file containing the collected information
The resulting file must be moved to the TNI 3 storage.
See the Manual scan section for details.
An approximate list of utilities needed to collect the data on a Linux-based computer: arch, cd-info, df, dmidecode, dpkg-query /emerge / pacman / pkgtool / rpm, get-edid, hdparm, head, ifconfig, iptables, iptables-save, ls, lspci (pciconf for FreeBSD), lsusb,ps, pvdisplay, pvscan, route, rpm, swapon, uname.
Scanning other network assetsTechnologyScanning SNMP devicesScanning Telnet devices
Technology
Many network assets are not covered by the SMB/RPC/SSH protocols. These are the assets that either don't run Windows or Unix-basedoperating systems, or run unsupported systems, or run simple Unix-based systems without the SSH interface. These could include networkprinters, managed switches, routers, xDSL modems, IP phones, wireless access points, etc. Most often these devices support either or SNMP
or sometimes both, and in such cases they can be scanned by TNI using these protocols.Telnet
Scanning SNMP devices
TNI considers any devices that could not been scanned via other protocols as potentially SNMP-compatible, therefore, it tries to scan themusing SNMP, if it's allowed by the scanner settings. By default, when the community is specified, it tries several well-knownpubliccommunities until it succeeds:
adminciscomngtprivatepublicsnmpd
Scanning Telnet devices
If a Telnet login is specified, TNI checks if TCP port 23 is open. If positive, TNI will try to scan the device using the Telnet protocol.
Currently TNI supports Telnet scanning for the following systems: BusyBox.
Collected informationThis section contains an overview of information collected by TNI 3 from various types of assets:
WindowsOS XLinuxFreeBSDESXiGeneric devices
WindowsHardwareSoftwareOther
Here you can see an overview of data collected from OS assets.Windows
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Hardware
SystemComputer parameters, chassis, motherboard (including chipset), BIOS.System slots, memory slots, ports.
CPUName and manufacturer, clock speed, socket designation, code name, TDP, number of cores, cache memory, etc.
System memoryGeneral information on physical memory, virtual memory and paging files. Number and availability of memory slots. Memody modules: capacity, manufacturer, type, speed, form-factor, serial number, manufacture date, etc.
Video systemVideo adapters: name and manufacturer, chipset, video memory, current video mode, drivers.Monitors: name/model, manufacturer, manufacture date, serial number, image size and diagonal, picture aspect ratio,video input, etc.
Audio systemName and manufacturer of the sound device, driver version and date.
Storage detailsHard disk drives and removable media: model and manufacturer, interface, media type (HDD/SSD/removable), size,serial number, S.M.A.R.T. data (where available).CD drives: model and manufacturer, device type, read/write support.Floppy-disk drivesLogical partitions: disk letter, drive and media type, file system, size, free/used, serial number, etc.
NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, type, connection status, DHCP,host name, etc.Modem: name, provider, port, type, etc..
Peripheral devicesPrinters (including virtual printers): name and manufacturer, paper size, driver, status, resolution, port, attributes, etc.Network printers: source name, server, user account.Keyboards: manufacturer, layout, number of keys.Mice and other pointing devices: manufacturer, interface, number of buttons.USB devices: all USB devices with USB version, driver manufacturer and version, serial number (where available).
DevicesThe full list of devices divided into classes. It duplicates the data structure of Windows device manager.
Software
Operating systemName, version, architecture, registered user, install date, country code, locale.OS type, product key, suite, SKU, supply channel.Internet Explorer version, DirectX version, etc.
Installed softwareName, publisher, version, install date and source, uninstall string.For Microsoft Office products (including Project and Visio): service pack, product ID, product key, supply channel.
System updatesID, description, comments, Service pack version, install date and user name.
SecurityAntivirus, firewall, antispyware status.Auto-updates status.Antivirus, , : name, publisher, version, status. firewall antispyware
Directory list in the Program files folderDatabases
Detected database servers (if any): MS SQL Server (including edition), MySQL, PostgreSQL, Oracle Database, Firebird.Audio and video codecs
Name, manufacturer, version, description.Virtual machines
For discovered VMware Workstation virtual machines: ID, guest OS type, total size, storage size, state, config file,hardware compatibility, memory, processors, HDD details, CD/DVD details, network adapter details.
Other
System and user environment variablesShared resources: disk drives, print queue, IPC admin, etc.
Name, type, path, comments.Autorun applications
Application name, startup string, user account, location.Services: file system drivers, kernel drivers, own and shared processes
Name, service name, executable, startup type, status, logon as...Processes
Name, command line, executable path, started on, threads number.User accounts
Name, full name, domain, description, activity, attributes.
OS XHardwareSoftwareOther
Here you can see an overview of data from collected OS X assets.
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Hardware
SystemComputer p and chassis, memory slots.arametersPower supply settings.
CPUName, clock speed, number of cores, cache memory, etc.
System memoryPhysical memory size.RAM units: capacity, manufacturer, type, speed, etc.
Video systemVideo adapters: name, video memory.Monitors: name and manufacturer, size and image size, picture aspect ratio, video input, etc.
Storage detailsHard disk drives and removable media: model and manufacturer, interface, size, number of partitions, serial number.CD drives: model.Logical partitions: label, file system, size, free/used, mount point.
NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
Peripheral devicesPrinters: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.USB devices: name and manufacturer, version, speed.
Software
Operating systemVersion, architecture, update, kernel, run time.
SoftwareVersion, install date, location, execution environment, properties.
SecurityFirewall status.
Other
Environment variablesProcesses
Name, command line, process and parent process ID, user account.User accounts
Name, full name, ID, home directory, shell.
LinuxHardwareSoftwareOther
Here you can see an overview of data collected from OS assets.Linux
This list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describingwhich data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.
Hardware
SystemComputer p , motherboard and BIOS, memory slots, ports.arameters
CPUName and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memoryPhysical memory size and swap partition.RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.
Video systemVideo adapters: name and manufacturer, video memory.Monitors: name and manufacturer, image size and diagonal, picture aspect ratio, video input, etc.
Storage detailsHard disk drives and removable media: model, interface, number of partitions, size, serial number.CD drives: model and manufacturer, location, availability, media support, features.Logical partitions: label, file system, size, free/used, mount point.
NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.List of DNS-servers.
Peripheral devicesPrinters: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.USB devices: name and manufacturer, speed.
DevicesDevices divided into types; their names and flags.
Software
Operating systemName, architecture, code name, description, kernel, run time.
SoftwareSoftware divided into groups.Name, package name, version, source, URL.
SecurityFirewall rules presented as a h .ierarchy
Virtual machinesFor discovered VMware Workstation for Linux, VMware ESX, and KVM (only partial information is collected): ID,s KVMguest OS type, total size, storage size, state, config file, hardware compatibility, memory, processors, HDD details,CD/DVD details, network adapter details.
Other
Environment variablesProcesses
Name, command line, process ID and parent process ID, user account.User accounts
Name, full name, ID, group, home directory, shell.
FreeBSDHardwareSoftwareOther
Here you can see an overview of data collected from OS assets.FreeBSD
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describingwhich data could not be collected and ways to fix the problem will be included into the report in the mode.Common reports
Hardware
SystemComputer parameters, motherboard and BIOS, memory slots, ports.
CPUName and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memoryPhysical memory size and swap partition.RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.
Storage detailsHard disk drives and removable media: model, interface, number of partitions, size, serial number.CD drives: model and manufacturer, location, availability, media support, features.Logical partitions: label, file system, size, free/used, mount point.
NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.List of DNS-servers.
DevicesDevices divided into types; their names, vendors and classes.
Software
Operating systemName, architecture, kernel, uptime.
SoftwareSoftware divided into groups.Name, version, description (properties).
Other
Environment variablesProcesses
Name, command line, process ID and parent process ID, user account.User accounts
Name, full name, ID, group, home directory, shell.
ESXiHardwareSoftwareOther
Here you can see an overview of data collected from VMware ESXi assets.
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describingwhich data could not be collected and ways to fix the problem will be included into the report in the mode.Common reports
Hardware
SystemComputer parameters, motherboard and BIOS, memory slots.
CPUName and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memoryPhysical memory size.RAM units: capacity, type, form-factor, bank label, locator.
Storage detailsHard disk drives: model, interface, number of partitions, size, firmware revision.Logical partitions: label, file system, size, free/used, mount point.
NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
Peripheral devicesUSB devices: name and manufacturer, speed.
DevicesDevices divided into types; their names and flags.
Software
Operating systemName, architecture, description, uptime.
SoftwareName, publisher, version, install date.
SecurityFirewall rules.
Virtual machinesID, guest OS type, total size, storage size, state, config file, hardware compatibility, description, memory, processors,HDD details, CD/DVD details, network adapter details.
Other
Environment variablesProcesses
Name, command line, process ID.User accounts
Name, full name, ID, group, home directory, shell.
ESX is a far more generic Linux system compared to ESXi, and it's scanned by the same Linux agent as other Linux systems. That'swhy you can find the list of data collected from ESX systems in the Linux section.
Generic devicesSNMPTelnet
Here you can see an overview of data collected from generic assets via the SNMP and Telnet protocols.
SNMP
General informationIP address, MAC address, network name.
SystemAsset name, description, object ID, uptime, contact, location, service list.
Network interfacesName, manufacturer, MAC address, interface type, speed, MTU, administrative state, operational state.
Telnet
General informationIP address, MAC address, network name.
SystemUptime.
ProcessorName, system type.
System memoryTotal/free memory, swap partition size.
NetworkNetwork interfaces: name, manufacturer, MAC address, IP address, IP subnet, BSD device name, type.List of DNS servers.ARP table.
SecurityFirewall rules presented as a hierarchy.
FAQGeneral questions
InstallationBackup and restore
Scan questionsAccess is deniedRPC server is unavailablePort numbersTCP/IP security limitNo network provider accepted the given network pathCall was canceled by the message filterDomain logon scanWindows 95/98/NT scan
Program usage questionsNetwork tree selectionList of computers with particular softwareNo antivirus installed
General questions
Installation
Q: Should I install the program on a server or on a workstation?
A: Both a server and a workstation can run Total Network Inventory 3. It’s just a matter of usage convenience, because it's not aclient-server application, and you need to have access to the graphical console of the computer it's installed on, either directly or by using aremote desktop utility. , if you run it under the domain admin account, you’ll be able to scan all computers as "current user" –Howeverotherwise you’d need to explicitly.specify domain admin credentials
However, take note that if you install the program on Windows XP SP2/SP3 or Vista SP0/SP1 and there are a lot of scan threads launchingsimultaneously, there may be issues with connections to remote computers. This is caused by a restriction on the maximum number of TCPhalf-open connections (connection attempts, socket state) existing in the aforementioned Windows versions, which doesn't allowSYN_SENTfor more than 10 outbound connections to be in this state at a time. After reaching this limit, all other connections in the system (includingthose executed by this program) are queued and may reach their timeout, thus producing inconsistent results. This issue is also known as the
issue, because reaching the limitation produces a record in the System Event Log with EventID . Windows Vista SP2,Event 4226 4226Windows 7 and newer, and all Windows Server systems don't have this limitation. Thus, in the general case, we recommend to install theprogram on server systems or modern desktops.
Backup and restore
Q: How to backup/restore the Storage or move the program to another computer?
A: The is located in a separate folder (file system directory). It can be located by right-clicking the storage root group and selecting Storage S. Then go up how in Explorer one level and copy/archive the whole storage folder.
Program settings can be backed up by copying/archiving a folder entitled in your account's folderTotal Network Inventory 3 Application Data(referred to by environment variable), if you chose during the program installation. If you chose ,%APPDATA% Install for me Install for allthe settings are stored in " " (Windows 2000/XP/2003) or "С:\Documents and Settings\All Users\Application Data\Total Network Inventory 3 C:
" (Windows Vista/7/8/10/2008/2012). You can also find this folder by clicking in\ProgramData\Total Network Inventory 3 Open tasks folderthe tab or in the tab and then going up one level.Scanner Open templates folder Table reports
To restore the program, install it on another computer (but don't run it) and extract your backed-up settings to the Total Network Inventory 3 folder in the folder for your profile or all users, depending on your choice during the installation (after the installation, thisApplication Datafolder is locally: for instance,automatically created and contains one file: config.ini). Also, extract the storage folder to . ThenMy Documentsrun the program and browse to the storage folder when prompted (if its location differs from the path stored in previous settings).
Scan questions
Access is denied
Q: How do I deal with the errors "Access is denied" or "Unknown user name or bad password"?
A: These errors can occur for several reasons:
Username or password are specified incorrectly.
Check your username and password.
The specified user account does not have administrator rights on the remote machine.
You need to have administrator access to remote computers to be able to scan them (local administrator or domain administratorrights). If you have logged on as domain administrator or remote computers have the same name and password for the localadministrator account as your account, you can use the scan option. Otherwise specify the user name in full format: Current user DO
.MAIN\Administrator
Blank password.
Remote administrator access with blank password is not allowed starting with Windows XP.
The scanned computer has Windows XP Home Edition installed.
This version of Windows cannot be scanned remotely. It’s an OS limitation, and the error will be displayed at all times.Access deniedHowever, it’s possible to scan XP Home locally by running the standalone audit tool (located in the program'stniwinagent.exeinstallation folder) on that machine. It’ll generate an file with scan results, which should be copied to the program's storage (it.invwill be imported upon TNI’s next launch or immediately, if TNI is running) or imported by using the main menu or anyStoragegroup's context menu.
Computers are not in domain and have default settings.
Workstations running Windows XP, Vista or later client versions and not connected to a domain don't allow the local administrator toauthenticate as himself by default. Instead, the ForceGuest policy is used, which means that all remote connections are mapped tothe Guest account. But again, the administrator rights are required for running the scan. Thus, you need to update the securitypolicy on each computer using one of the following ways:
Run , expand , locate the secpol.msc Local policies / Security options Network access: Sharing and security model for local policy and change its value from to .accounts Guest Classic
Disable the option in File Explorer’s Folder Options.Use simple file sharingModify the registry: set the value, located in the "forceguest HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa" key, to zero.
For Windows an additional step should be taken: it concerns the (UAC). Itclient versions starting with Vista, User Account Controlrestricts administrator rights for remote logons in certain cases. You should either disable UAC or make changes to the registry:create a parameter (name: ; value: ) in the "DWORD LocalAccountTokenFilterPolicy 1 HKLM\SOFTWARE\Microsoft\Windows\CurrentV
" key A reboot may be required.ersion\Policies\system (source).
You can modify both settings easily by running a file with the following contents on such computers (omit the last two lines for.regWindows XP):
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]"forceguest"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system]"LocalAccountTokenFilterPolicy"=dword:00000001
RPC server is unavailable
Q: How do I deal with the error "RPC server is unavailable"?
A: This error may be caused by one of the following reasons:
onnection is blocked by a firewall (Windows Firewall or third party firewall).The c
Try temporarily disabling the firewall on the remote computer. If the target computer runs on Windows XP SP2/SP3, Vista or 7, seethe .question regarding the Windows Firewall setup
The target computer does not have the Windows Management Instrumentation service installed.
According to the Microsoft documentation:
"WMI is preinstalled in Windows 7, Windows Vista, Windows Server 2008, Windows Server 2003, Windows XP, Windows Me, andWindows 2000. Windows NT Workstation 4.0 SP4 and later: WMI is available through "Add/Remove Windows components" in Control Panel, asWBEM option install. A later, more comprehensive, version is available as an Internet download from http://www.microsoft.com/downloads. See "WMI CORE 1.5 (Windows 95/98/NT 4.0)".Windows 98/95: WMI CORE 1.5 (Windows 95/98/NT 4.0) is available as an Internet download from http://www.microsoft.com/downloads. This download requires Microsoft Internet Explorer version 5 or later."
Additional information about scanning the Windows computers using WMI
The target computer is offline or the IP address may not be occupied at all (when scanning by IP's and if the ICMP ping option is
disabled).
Remote interrogation of Windows 98/95 computers is supported partially, because problems with DCOM authentication may occur.The solution is to run a local scan (manual or autostart) with the help of the standalone audit tool ( ).tniwinagent.exe
1. 2.
3.
disabled).
The Windows Browser service updates the computer list every 12 minutes, so a computer can go offline, but remain visible in MyNetwork Places. However, in this case you are more likely to get the status. But if the ICMP protocol (ping, echo) is notPing failedallowed in your network, you might want to disable pinging in . After this, you will be able to scanOptions Scanner Use ICMP ping– –online hosts which don't respond to pings, but all offline hosts (and also unoccupied IP addresses) will show the status,RPC errorand thus it will slow down the scanning of large IP groups or ranges.
Wrong DNS record.
If you scan the computer by name, it could be resolved to an invalid or not existing (unoccupied) IP address due to problems withDNS or WINS. If you scan the computer by IP address, you are likely to receive Ping failed, but if pinging before scanning isdisabled, you will receive the RPC error when scanning an offline or unoccupied address (see the previous point). A TNI user hasencountered this problem and described it on our forum: http://www.softinventive.com/forum/index.php?showtopic=428
The target host is not a computer, or it runs an operating system other than Windows when scanning via the RPC protocol.
If the scanned name or IP address belongs to a network device which can be pinged, but is not a Windows computer (NIX-computer,network printer, router, managed switch, type library, IP phone, firewall, thin client, etc.), it cannot be scanned via the RPC protocoland shows this error. However, the program tries to scan this host via other protocols (SMB, SSH and SNMP), and the scan resultmay vary depending on the settings for these protocols and the nature of the scanned network host.
Port numbers
Q: How can I find out which port numbers are used by TNI, so I can configure the firewall?
A: By default, TNI uses the SMB protocol to scan Windows computers. It can be allowed by enabling the exception inFile and Printer Sharingthe Windows Firewall or in other firewalls. You could also enable (NetBIOS) for older systems.TCP port 445 TCP port 139
Also, TNI uses the RPC protocol to scan Windows computers (direct WMI connection) if SMB fails. To allow remote RPC connections, youshould either disable Windows Firewall or set it up in the following way:
Use the following netsh firewall command in the command prompt: for Windows XPnetsh firewall set service RemoteAdmin enable or for Windows Vista/7 or newer;netsh advfirewall firewall set rule group="remote admin" new enable=YesUse the Group Policy editor: Group Policy editor (gpedit.msc) -> Local Computer Policy -> Computer Configuration -> AdministrativeTemplates -> Network -> Network Connections -> Windows Firewall -> Domain Profile or Standard Profile -> Windows Firewall:
.Allow remote administration exception -> Action -> Properties -> Enable
TCP/IP security limit
Q: How do I deal with the following warning "TCP/IP has reached the security limit imposed on the number of concurrent TCP connectattempts"?
A: This warning may appear when you run the network scan under Windows XP SP2/SP3 or Windows Vista SP0/SP1 with port scan enabled.In these operating systems a controversial limitation of not more than 10 concurrent TCP connect attempts ("half-open connections") hasbeen introduced by Microsoft to reduce the speed with which malicious software spreads over the networks. You can find more information in
. When you see this message in the scanner log, it means that the program detects that some computers have no openthis Microsoft articleports and there is an event with (source: ) in the system Event Log with the same message. As a consequence of reaching theID 4226 Tcpipaforementioned limitation, the program cannot reliably detect whether ports on computers are open or not. That's why the program starts toignore the port scan results and connects to all computers using all selected protocols to provide successful scans. This policy remains activeduring the current session, that is, until the next program restart. To avoid this warning you can do the following:
Disable the option in the Scanner settings. Note that this will decrease the network scan performance;Scan portsPatch your system using the widely known or (based on the former). However, note that this is illegalpatch by LvlLord this patchaccording to the Windows EULA;Run TNI on the system which is not affected by this limitation: Windows Server 2000/2003/2008, Windows 2000, Vista SP2 orWindows 7.
No network provider accepted the given network path
Q: How to fix the error "No network provider accepted the given network path"?
A: Take the following steps:
Make sure that you can ping the remote computer by network name;Make sure that the exception is enabled in the Windows Firewall (or that NetBIOS is allowed in any other File and Printer Sharing firewall), or the firewall is disabled;Make sure that both and are enabled in the propertiesClient for Microsoft Networks File and Printer Sharing For Microsoft Networks
of the network connection on the remote computer;
Windows Firewall in Vista, 7 or newer has a special exception entitled which can "Windows Management Instrumentation (WMI)",be enabled and thus save you from the necessity of setting up the policies manually.
3.
4.
5.
6.
1.
2.
3. 4. 5.
1.
2.
3.
4. 5.
6.
of the network connection on the remote computer;Make sure that the setting in the properties of the network connection ( NetBIOS over TCP/IP Internet Protocol Version 4 Properties–
) is set to Default or and that the is set to and started; Advanced WINS– – Enabled TCP/IP NetBIOS Helper service Automatic Make sure that the security policy ( )Network security: LAN Manager authentication level secpol.msc–Local Policies Security Options–is set to (option #1) or (optionSend LM & NTLM responses Send LM & NTLM responses use NTLMv2 session security if negotiated–#2);Run .sfc /scannow
Call was canceled by the message filter
Q: How to fix the error "Call was canceled by the message filter"?
A: Take the following steps:
Run on the remote computer and make sure that the service is set to services.msc Windows Management Instrumentation Automaticand started;
Make sure that is enabled: run , select , right-click, choose DCOM dcomcnfg Component Services Computers My Computer– – Properti, open the tab and make sure that is on;es Default Properties Enable Distributed COM on this computer
Restart the remote computer;Run from Microsoft;WMI diagnosis utilityFollow to repair WMI on the remote computer.these tips
Domain logon scan
Q: How do I set up the program to scan computers when users log on to a domain?
A: This is a shortened guide. The full version of this guide is available .here
Copy the standalone scan agent located in the program’s installation directory to a shared folder on your file servertniwinagent.exeaccessible to all users with read-only access. For this, open the window, then open the page, press the Options Logon script Export
button and specify the folder to export to. This action will also fill the field. It should be a UNCstandalone scanner Path to agentpath (a network path starting with double backslash).Create and share a folder on your file server. This will be the folder where the scan agent will save thewith write access for all users scan results. Note: instead of creating a separate folder (most secure), you can share an empty folder inside the TNI 3 storage(secure) or the storage root folder (least secure) with write access for all users.In specify a path to the folder where the agent should save the files (the folder from step 2).Options – Logon script – Save pathThis should also be a UNC path. Specify other options if necessary (such as and ).Delay before scan start Overwrite existing filesCopy the auto-generated command using the button.Copy the commandIf you already have a logon script for your domain, a particular Organizational Unit or a single user, paste the command you’vecopied earlier to this script and save it. Otherwise, refer to the full version of this guide.In the main window of Total Network Inventory 3 press , open the page and specify the path to the folder withOptions Auto-importthe inventory files in the field. You can import new data right now or set the settings to import on startup or setImport data paththe timer. Each time you want to update the information manually, open and click . Also, you canOptions – Auto-import Import nowdelete files after importing or import from subfolders (in case each OU has its own logon script which runs the scanner with differentparameters to save results in different folders). If you chose to share a folder in the storage or the whole storage folder, you don’tneed to set up Auto-import. The scan results will be automatically imported as you run the program and it opens the storage, orimmediately, if the program is already running.
Resources to read:Logon script scanStandalone agent's command-line parametersData importLogon scripts FAQCreating logon scripts
Windows 95/98/NT scan
Q: Is it possible to scan Windows 95/98/NT machines?
A: It's possible, however these systems can only be scanned remotely (via the RPC protocol). First of all, you should install corMicrosoft WMIe components for Windows 95/98/NT. (Windows 95/98/NT 4.0) is available as an Internet download from WMI CORE 1.5 http://www.micros
. oft.com/downloads
Then place a link to into the startup folder and reboot, or run the file manually. \WINDOWS\SYSTEM\WBEM\WinMgmt.exe
Additionaly, in order to perform the remote online scan, you need to run a registry file ( ) with the following content on a Windows 95/98*.regmachine:
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Microsoft\OLE]"EnableDCOM"="Y""EnableRemoteConnect"="Y"
[HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM]"SetupForDCOM"="1""AutostartWin9X"="2""EnableAnonConnections"="1"
Alternatively, you may change these values manually. Rebooting is advised. After this, you should be able to connect remotely using anycredentials or as current user.
Program usage questions
Network tree selection
Q: I have selected several assets in a network tree, but the report shows only one. Why?
A: In TNI 3 the Network tree has two node selection modes: and . To build a report for several nodes, either select a groupsingle multiple(the report will be built for all assets in this group and all subgroups) or enable multiple selection by ticking the Multiple selection checkbox over the tree — checkboxes will appear in front of each node. Rectangular selection (as well as selection using or ) is not used forCtrl Shiftbuilding reports and is used for working with the nodes in the tree (drag'n'drop moving, deleting, etc). For more details, see Selecting a node.
List of computers with particular software
Q: How to get a list of computers which have particular software installed?
A: Go to the tab, use the bar and filters to find the necessary software and select it to display a list of computersSoftware accounting Searchit's installed on (in the details area on the page). You can select the items in the list and copy or export them, or click the Installations Install
link to get a printable report.ations summary
No antivirus installed
Q: Why does the program show that no antivirus (or firewall, or antispyware) is installed?
A: TNI 3 can recognize all antiviruses and firewalls (in Windows XP SP2/SP3, Windows Vista, 7, and 8) and antispyware (only in WindowsVista, 7, and 8) that support (previously known as Windows Security Center), that is, if they are displayed by theWindows Action CenterAction Center. The vendors of antivirus (firewall and antispyware) software should provide this support from their side, because they have topublish the product information and status to the system in a special way. Otherwise neither our product, nor Windows itself can recognizesuch software (in this case Windows Action Center should usually generate a message from time to time that the computer is not protectedby antivirus/firewall/antispyware).Unfortunately, even with the support from the side of the security products, this does not work on Windows 2000 and earlier and also on allWindows Server systems, because they don't have Action Center, that is they don't provide an interface for these products to publish theirstatus to the system and thus to other applications.We are going to add support for direct detection of the most popular products without dependency on the Action Center interface in thefuture versions of our program.
Please note that support for Windows 95/98/NT is provided "AS IS", because Microsoft has officially stopped supporting theseoperating systems.
Feedback and supportSending feedback from the softwareSupport page on the Softinventive Lab websiteE-mail supportOnline supportSocial networks
Please contact us if:
You've found a bug in our program — we'll fix it!You'd like to see new functions added — describe the situations they can help you in.You dislike something about our program — tell us how to improve it.You like something about our program — it's important for us to know, what exactly!You have any technical or financial questions — our answer will be fast, polite and clear.
Your feedback is very important to us, your comments define the ways we improve our software. We'd be grateful for any message!
Sending feedback from the software
The button in the top right corner of TNI's window opens the quick feedback form. Feedback
Don’t forget to include your name and email address otherwise we won’t be able to reply to you.—
Support page on the Softinventive Lab website
Welcome: www.softinventive.com/support/
E-mail support
Technical support: [email protected] questions: [email protected] questions: [email protected]
Online support
You can rely on our assistance whenever you need it. Our technicians can be contacted via instant messengers.
softinventive
Social networks
Follow us online!
softinventive.lab
@Softinventive
UpdatesTNI 3 updates regularly. To make sure that you have the latest version, use the / option from the main menu.Help Check for updatesFurthermore, the program automatically checks for updates on launch, but no more than once a day.
If an update is found, you'll see a list of changes in the new version. Click , and after the download is complete. TheStart download Install updateprogram will be closed and restarted after the update has been applied.
1. 2. 3.
Trial version limitationsTotal Network Inventory is distributed as .shareware
The evaluation version of has Total Network Inventory 3 limitations:
The program only works for after its first launch on a computer.60 daysThe maximum number of computers (network nodes) allowed to scan and manage is limited by 50 nodes.Reports created by the program can be exported and printed, but certain fields are randomly substituted with the phrase TRIAL VERSION.
Installation instructionsRun the Total Network Inventory installer
After clicking the download link, save the file and run it.tni-setup.exe
In Google Chrome
Once the download is finished, click the file at the bottom of the browser.
In Mozilla Firefox
In MS Internet Explorer
Install the software
Tell Windows it's OK to run the file:
And once again:
Then follow the instructions as the installer guides you through the process:
Begin working with Total Network Inventory
To get familiar with the software, see .our documentation
Uninstallation instructions
Total Network Inventory can be uninstalled using standard Windows tools.
For example, from its start menu group:
User manual
StorageData import
Workspace
Network treeSelecting a nodeAltering the Storage structureInformation display settingsSearching in the Network treeStorage assistants
Working with assistantsDescription of assistants
ActionsCustom assetsSynchronization with Aсtive Directory
Network scanningAdding scan tasksManaging added tasksScan process and scan resultsSaving, importing and exporting tasksScan scheduler
Scanning using agentsManual scanLogon script scanResident agent scan
Common reportsBuilding reportsViewing informationPrintable reportsAdditional features
Table reportsCreating a templateTemplate management
Software asset managementGetting startedSoftware management
Browsing, searching and filtering softwareInspecting a software item
Tracking software installationsMerging software items
License managementCreating a licenseSorting out auto-detected license keysLicensing software installationsEditing a license
ReportsReport builder
Change log
Storage properties
Network node properties
Alerts
Snapshots
Custom fields
Logins
Users
Options
1. 2. 3. 4.
1. 2. 3. 4. 5. 6. 7.
StorageStorage conceptStorage contents
Contents of auxiliary filesContents of an asset file (*.inv)
Storage managementData import
Storage concept
TNI 3 Storage is a folder on a hard drive selected by user.
Each asset is represented by an file..inv
The folder structure inside the Storage replicates the structure of the groups created by user in the . Any direct changes to theNetwork treeStorage contents shall be registered by the program.
It means that you can create, delete and rename groups, move and delete asset files either using TNI's tools or via any file manager.Furthermore, its design makes it possible to back-up and share data with other TNI 3 users, etc.
Storage contents
Contents of auxiliary files
Logins to access the assets (encrypted);User information (manually created and domain users);Software accounting data;Storage properties (storage name, company name and logo, inventory numbers template).
Contents of an asset file ( )*.inv
Asset network identifiers (network name, IP address, MAC address);Properties (alias, type, description, inventory number, etc.)Asset configuration snapshots, collected as a result of scanning (see );Collected informationAn alias of the login assigned to the asset;ID of user assigned to the asset;The asset's local user information;Special field values.
Storage management
A copy of TNI 3 is not . when the program is running.linked to any particular storage This means that you can switch between storages
Storage management is carried out from the menu:Storage
Create: select an empty folder on a computer and create an empty Storage there;Open: select a folder containing a previously created Storage to work with;Recent: contains a list of recently opened Storages that allows to quickly switch between them;Reload: reads the data from the computer again, if the changes made to the currently opened Storage have not been automaticallyregistered by TNI 3;Close: closes the Storage.
For the program to function correctly, do not delete, move or rename auxiliary hidden files in the Storage root folder. This maylead to data loss or corruption.
Do not rename asset files (*.inv). See here to learn how to change displayed names.
Asset files can be moved between storages. However, various storage data will not be moved. For instance, the remote accesslogin will be lost, but it could be restored manually.
To quickly locate the folder containing the current storage or a file representing one of the devices, you can use the Show inExplorer option in the context menu of the Network tree.
Data import
Learn about importing possibilities in the section.Data import
It's possible to create a Storage in a shared folder and have several copies of TNI connected to it from different computers. Keep inmind that simultaneous access of the same Storage by different copies of TNI is not supported and could lead to irrelevantinformation being displayed. This happens when changes made by one user are not yet reflected in the program of another.
Data importImporting by moving or copying data filesImporting files and foldersAutomatic importConverting the Storage from TNI 1.x
Importing by moving or copying data files
To import assets that were scanned by any version of TNI, simply copy the files of these assets into the storage folder. If TNI 3 is .invrunning and connected to that storage at the moment, the new files will be converted to the new format if necessary and importedimmediately. Otherwise, the files will be imported next time TNI 3 is started and the Storage opened.
Importing files and folders
To import one or several assets, right-click a group or the root node of the Network tree and click , then select theImport / Import files...data files for import. This will place the specified assets into the group that you initially right-clicked.
To import the contents of a folder including subfolders, do the same, but click instead. After you specify the sourceImport / Import folder...folder, you'll be prompted to choose whether to import the folder structure. If you choose to do so, groups will be created in your storage tomatch the contents of the source folder. Otherwise, all the assets found in the source folder and its subfolders will be placed in the group youinitially right-clicked.
These commands are also available from the main menu Storage / Import when the Storage is opened.
Automatic import
You can set up TNI to automatically refresh asset files from a certain folder on program launch or at regular intervals. This is done from the A section of the window. Additional options are:uto-import Options
Press the button to perform the importing without having to restart TNI or waiting for the timer;Import nowImport from subfolders is optional;Import folder structure: if enabled, TNI creates groups in your Storage root to match the folders found inside the source folder whenthe importing is being performed. Groups are only created for the folders that contain asset files. If disabled, all the discoveredassets will be placed into the root group of your storage;It is possible to ;Delete files after importYou can enable or disable and and specify a custom .Import at startup Import on timer Import period
Converting the Storage from TNI 1.x
To convert the whole Storage from the old format, use the option from the main menu and select the root folder of the targetStorage / Open Storage. The Storage contents will be wrapped into a ZIP archive first, and then converted to the new format. This process also preservesyour group structure.
To locate the storage folder, right-click the Storage root group in the Network tree and select Show in Explorer.
When importing an asset that is already present in the Storage, configuration snapshots from the new file will be moved to theexisting one. If the new file was placed into the Storage manually, it will be deleted. This ensures that a single asset in TNI 3always has one file corresponding to it. This is true for import of any kind.
Converting an asset file from the TNI 1.x format to that of TNI 3.0 reduces its size from ~1,5 MB to ~35 KB. Thus, completeconversion of the old Storage shrinks it about 40 times without losing any useful data.
1. 2. 3.
WorkspaceIntroducing the main windowBasic operations with the Network treeTNI 3 view modes
Introducing the main window
The Network treeThe Main areaThe Sidebar
The right side of the contains:Main menu
The menu;FeedbackThe button;OptionsThe switcher;languageThe menu, which contains tools that allow to check for updates, register your copy of TNI 3 and upgrade your license.Help
The and the can be temporarily hidden in order to increase the main area. This can be done by clicking the small Network tree Sidebar Hide/ and buttons located on both sides of the tab bar.Show network tree Hide/Show sidebar
You can alter the widths of the and the by dragging their edges.Network tree Sidebar
Basic operations with the Network tree
The displays the contents of the currently opened .Network tree Storage
To select an asset to display in the main area, left-click its node.
In order to choose several assets at once, tick the checkbox on the toolbar above the Network tree. A checkbox will beMultiple selectiondisplayed next to every node for you to select the necessary assets. To return to the normal selection mode, untick . Multiple selection
To create a new group, right-click the parent group or Storage root and select . To move some assets into a new group, firstCreate groupselect them using your mouse's or keyboard Rectangle selection keys Shift and Ctrl and then drag them onto the group node. Alternatively,you can use the Move to group option from the context menu of a node.
Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. The
See the Network tree section for information on searching the Network tree, displaying additional text and graphic information in it andfiltering assets according to various criteria.
TNI 3 view modes
There's a separate view mode in TNI 3 for each specific task. View modes can be switched by clicking on tabs above the main area. The Side is automatically adjusted to always display an appropriate set of controls.bar
ScannerCtrl + 1
Before any of the information on remote assets becomes available for viewing and building reports, these assets have to bescanned. The view makes collecting asset information a breeze.Scanner
TNI 3 can collect information from Windows, Mac OS X and Linux computers or scan any other devices via the SNMP protocol.See the section on how to ensure that all the conditions for successful scanning are met.Whitepaper
Read more: .Network scanning
Viewer &reportsCtrl + 2
This mode displays the first thing you'll want to see after you've scanned your network: common reports. These reportscontain detailed information on hardware and software of each scanned asset sorted into convenient categories and availablefor instant search. It's possible to build descriptive and accurate reports, print them or export them to , etc.PDF, RTF, HTML
Read more: .Common reports
TablereportsCtrl + 3
Here it's possible to create a table that contains only the necessary information. Rows can represent individual devices or anydevice components such as HDDs, monitors, RAM units, software items, etc. Columns represent properties of the selectedobject. When the table has been built, it can be sorted, filtered, printed or exported for further analysis.
Read more: .Table reports
SoftwareaccountingCtrl + 4
Here you're able to see the list of software found on Windows and Mac assets in the Storage. For each software item you candisplay the full list of computers that it's installed on. Software can be organized, searched and filtered in a multitude of ways.
If you have the license, you'll find at your disposal a variety of tools that will help with keeping track ofTNI 3 Professionalyour software licenses, individual licensed installations, license keys, compliance problems, etc.
Read more: .Software asset management
ChangelogCtrl + 5
After scanning an asset several times over a period of time, you may want to know what has changed in terms of hardwareor software installed on the asset, system parameters, disk space usage, connected peripherals, etc. In this mode, you'll finda precise list of all changes. Also at your disposal are: advanced search, filtering and reporting tools.
Read more: .Change log
EditCtrl + 6
This view mode allows to change properties of individual assets or the Storage itself, manage user records, custom fields,snapshots and logins.
Read more:
Storage properties: storage name, company name and logo, inventory number generator;Network node properties: network identifiers, alias, description, etc;Snapshots: viewing and deleting configuration snapshots;Custom fields: adding or changing user information;Logins: managing logins and linking them to assets;Users: viewing and editing information on network asset users.
Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. Theformer is only used for operations with several nodes (e.g. moving and deleting) and does not influence the contents of the mainarea.
There's a way to start working with normally selected assets in the main area. To do that, use the Choose option after right-clickingone of the selected assets. The assets will become selected with Multiple selection.
Groups in the Network tree replicate the structure of directories on the hard drive as described in the Storage section. Thus,operations such as creating, deleting or renaming groups and moving assets between them can be performed in any file manager.
Pressing provides quick access to the desired view.Ctrl + <tab number>
1. 2. 3. 4. 5. 6.
Network treeThe reflects the contents of the opened .Network tree Storage
Main elements:
The ;Network tree toolbarThe list of added assistants;The main area;The icon marking the computer TNI 3 is currently running on;Additional text output;Assistants' indicator icons.
Below the tree is the status bar where several indicators can be found:
The first of them shows the license usage. It displays how many licensed spots are occupied by scanned assets, the total number of nodesthat your license allows, and the usage percentage.The second indicator shows the number of unscanned assets, and the third one shows the number of custom assets. These types of assetsdon't occupy license spots, so they are displayed separately. These indicators may be missing if there are no assets of the corresponding typein your Storage.
Related topics:
Selecting a nodeAltering the Storage structureInformation display settingsSearching in the Network treeStorage assistantsActionsCustom assetsSynchronization with Aсtive Directory
Selecting a nodeSimple selectionSelection for processing
Single selectionMultiple selection
There are two ways of selecting nodes in the Network tree.
Simple selection
It's used for performing such operations as deletion and moving between groups containing one or multiple nodes.
It's done in the same manner as in Windows Explorer: using your mouse's or keyboard keys and and Rectangle selection Shift Ctrl arrow keys.
The selected nodes are highlighted with the blue background:
This type of selection doesn't affect other workspace areas in any way.
Selection for processing
This selection type is used for selecting nodes to work with in the , , Common reports Table reports Software accounting and Edit modes.
The has two selection modes: and . Press the button located to the right ofNetwork tree Single selection Multiple selection Multiple selectionthe root node to switch between modes.
Single selection
Active when the button is released.Multiple selection
Only one network node or one group can be selected. To select it, simply click the node. The selected node is highlighted with the bluerectangle:
While staying in the single selection mode, you can quickly select the next or previous node in the tree: .Alt + arrow up/down
Multiple selection
Active when the box is checked.Multiple selection
Each node will receive a checkbox, and the nodes are selected when their checkboxes are ticked:
You can check or uncheck the box either with the mouse or by selecting the nodes using and pressing the .Single selection space bar
Nodes selected using Simple selection can be by using the selected for processing Choose option from the context menu.
Selecting a group in the Single selection mode is the same as selecting all assets in this group and its subgroups in the Multipleselection mode. A report will be built for all assets in the single selected group and editing will affect all assets in it, so you don'tneed to enable the Multiple selection mode to build reports for whole groups. The only exception is the Group summary modewhich displays information about the group itself and is not available in the Multiple selection mode.
1. 2. 3.
1. 2.
a. b.
Altering the Storage structureCreating a groupRenaming a groupMoving nodes into a groupDeleting network nodes and groupsWorking with storage files directly
The Network tree allows to create, rename and delete groups of network nodes.
Creating a group
Right-click the parent group (to create a first-level group, right-click the root node);Click in the context menu;Create groupType the name of the and press .group Enter
Renaming a group
Click in the context menu or select the group and press . Type the desired name and press .Rename F2 Enter
Moving nodes into a group
If you need to move multiple nodes, select them using your mouse's Rectangle Selection or your keyboard's or ;Shift CtrlDo one of the following:
Drag the selection with your mouse and drop it onto the title of the target group;Right-click one of the selected nodes and use the menu item.Move to group
Deleting network nodes and groups
To delete one or several nodes or groups, select them and press on your keyboard or use the option from the context menu.Delete Delete
Working with storage files directly
Right-click any node and choose to quickly locate a directory or file corresponding to the node. This will launch an instanceShow in Explorerof Windows Explorer navigated to the target directory. If the selected node is an asset node, its file will be selected.
You can also use this function when backing up data, copying, transferring to another TNI 3 user, etc.
Renaming the root node will change the Storage name. Another way to do this is via the Storage properties.
Deleting a network node is an irreversible operation. All the data connected to the deleted asset will be permanently lost. Consultthe Contents of an asset file section to find out what exactly is being deleted.
Deleting a group is not the same as "ungrouping". All the assets inside the group will be deleted as well.
The Storage structure fully replicates the structure of files and directories inside the Storage directory, as described in the Storage section. Therefore, it's possible to create, delete or rename groups and move assets between them by performing correspondingoperations over file system objects, which can be done in any file manager. TNI 3 will react to these changes automatically.
Information display settingsNetwork node namesAdditional fieldSorting the nodesNumber of assets in groups
What information is displayed in the Network tree can be chosen in the menu on the .Tree display settings Network tree toolbar
For instance, setting as hostnames node names, selecting for the and enabling theIP addresses additional field Show number of assets ingroups option will result in the Network tree looking like this:
Both node names and the additional field are used when .searching the Network tree
Network node names
A variety of values can be displayed as the node name: , etc.network names, IP addresses, inventory numbers, usernames
Additional field
An additional value can be displayed in the Network tree for every node. This value is selected from the same list as for the node name.
Sorting the nodes
The Sorting section allows to select the sorting criteria: nodes can be sorted either by their names or by the additional field values(configured as shown above), with an option to reverse the sorting order.
Number of assets in groups
When is enabled, the number of assets is displayed Show number of assets in groups in parentheses to the right of the group title.
If Alias is set as the node name, network nodes can be renamed by choosing Rename from the individual context menu or bypressing F2. The asset's alias will be changed. Another way to do this is via the Network node properties.
Searching in the Network treeSaving the search
A case of using a saved search
To start searching the Storage, click the search field on the Network tree toolbar or press .Ctrl + Shift + F
Matching text is instantly highlighted as you type:
Both node names and additional text are searched. See for details.Information display settings
By default, the contents of the Network tree are filtered to only display the nodes which match the query, and the rest is hidden. Thisfunction can be disabled by clicking the button to the left of the search input field. When it's disabled, all nodes will remain visible whileFilter the matching ones will be highlighted.
You can use the when the search field is in focus to navigate the nodes. Pressing opens the selected node in up and down arrow keys Enter the main area.
Saving the search
You can deactivate search without losing its results by pressing the button. You will then be able to toggle filtering on or off, runSave searcha new search in the results of the saved one, etc.
Searching actually uses the . See for more details about what assistants can do.Search node assistant Storage assistants
A case of using a saved search
Let's imagine that inventory numbers of developer workstations in the Storage are prefixed with . We can quickly put together a simple DEV_tool for switching the Storage from to . All it takes is setting the to showing all assets showing only developer workstations Additional field Inv
and saving a search for . Now if we want to see developer workstations, all we have to do is turn the filtering on for theentory numbers DEV_newly-created assistant.
As with all added assistants, saved searches are not deleted when TNI is closed. After saving a search once, you can use it as longas you need, temporarily disable it or remove it at any time.
Storage assistantsStorage assistants is a tool that displays additional graphic and text information in the , and also enables searching and filteringNetwork treeby various criteria.
For example:
The displays the icon and the currently running operating system in front of every asset and can hide theOS Assistant version of thenodes with OSes different from the one displayed.The displays a green or red circle, depending on the asset's online status. When the status changes, theOnline status Assistantindicator is automatically updated. There's an option to hide all offline computers.The displays a red flag and the number of problems in front of each asset where problems have beenAlerts presence Assistantdetected. The hint lists the problems found.
There are many other assistants. This is how the Storage looks when the abovementioned assistants have been added:
Related topics:
Working with assistantsDescription of assistants
1. 2. 3.
Working with assistantsAdding assistantsManaging the added assistants
Adding assistants
Follow these steps to add an assistant:
Click the button on the toolbar in the Network tree;Add assistant (+) Select the assistant type from the appearing menu;Set a condition if necessary.
Setting up the assistant.Installed RAM
Any number of assistants can be used at the same time.Several assistants of the same type can be added.The assistants are saved when TNI is closed.
Managing the added assistants
Newly added assistants appear in a separate area under the toolbar: the , which isn't displayed when empty. The caAssistant list Assistant list n always be collapsed or expanded by clicking the title area.
This is what the expanded list looks like:
Every added assistant has several controls:
The toggle.Indicator
This enables or disables the corresponding icon on the right of every network node. Hovering the mouse cursor over an icon reveals ahint with additional info.
The toggle.Filter
When enabled, all assets that don't meet the assistant's condition are hidden.
The button.Remove assistant
The number of assistants that currently act as and is shown in the assistant list's header when the list is collapsed.Indicators Filters
The number of assistants that currently act as and is shown in the assistant list's header when the list is collapsed.Indicators Filters
By default, assistants are added as Indicators.
The Filter and Indicator toggles may be enabled simultaneously. If they are both disabled, the assistant is considered disabled and will notaffect the contents of the Network tree. The illustration above shows the Alerts assistant is disabled and the has bothOnline status assistant toggles enabled.
In case you can't find an asset that exists in the Storage, make sure it has not been filtered out by one of the active assistants.
Double-click the title of any added assistant to edit it (instead of removing it from the list and adding another). When the editing isdone, click Apply.See how editing the Installed RAM assistant looks like:
Description of assistantsHardware
Installed RAMVirtual type
SoftwareOperating systemTracked software
InventoryLast snapshot age
MiscOnline statusNote contentsAlerts presenceSearch node
The purpose of any assistant is to display additional information in the network tree. Assistants are sorted into groups by the nature of thisinformation: , , or .Hardware Software Inventory Miscellaneous
Each assistant has a . When an assistant is active, every network node is matched against its condition.condition
When the mode is active, the nodes that passed the check are marked with an icon.Indicator
Hovering the mouse cursor over this icon will provide additional information in the form of a .hint
In the mode, an assistant will hide all assets that do not satisfy its condition.Filter
Hardware
Installed RAM
Compares the amount of RAM on an asset with the user-defined value.
The Indicator displays an icon with the amount of RAM.
Virtual type
Shows whether a device is physical or virtual.
Software
Operating system
The Indicator displays the icon representing the installed OS and its version. The full title and version of the OS can be found in the hint.
If you've got a suggestion for a new assistant type, feel free to send us a message! Use the main menu option Feedback / Featurerequest and tell us. Perhaps, next update you'll find your assistant in the program.
Example of usage: excluding all virtual devices from a hardware report.
The hides all assets that run on an OS from a different OS family than the one specified ( ).Filter Windows, Linux, MacOS, FreeBSD or ESXi
Tracked software
This assistant is related to the mode, where it's possible to enable tracking for Software accounting presence or absence of certain softwareon selected assets. It has three modes and can point out the computers with must-have violations, forbidden violations or both. In the must-
mode, the assistant displays an icon for each asset where "must-have" software is not found and the amount of such software. With have for, an icon is displayed for each asset where forbidden software is found. When choose , an icon is displayed when both types ofbidden all
violations exist. The hint lists which software caused the icon to appear and the type of violation.
Inventory
Last snapshot age
Compares the age of the latest snapshot with the user-defined number of days.
The displays the number of days since the asset was last scanned.Indicator
Misc
Online status
TNI 3 pings all the assets in the storage once every several seconds, and this assistant is used to display the result in the Network tree.
In the mode, this assistant only Filter shows the nodes that are online at the moment (or offline, if the user changes the condition).
Note contents
Each asset can have a assigned to it. These are comments added by the user of TNI 3.note
Notes can be easily added in the mode or in .Common reports Network node properties
This assistant's condition contains a search string. When left blank, all the nodes that have a note will satisfy the condition. When text isentered into the assistant's field, only the nodes which have a note containing the entered text as part of it will satisfy the condition.
The displays an icon for each asset that satisfies the condition. The hint contains the full note.Indicator
Example of usage: view all the assets that were not scanned for at least a month.
It's a good idea to include a short keyword in every note along with the actual message (e.g., "TODO" for tasks, "FIX" for faultyassets, "UPGRADE" for assets that need to be upgraded, etc.) In this case, the Note contents assistant becomes very helpful. Forinstance, you can use it to filter all the nodes by the presence of "FIX" in their notes, which will yield the list of malfunctioningassets. Then you hover your mouse over one of them to find out what exactly is wrong:
Alerts presence
The displays a red flag and the number of problems in front of each asset where problems have been detectedIndicator .
The allows you to hide all the devices that don't have any alerts. This can be useful when building an alert report.Filter
See: .Alerts
Search node
The condition contains a search string. Only the nodes that have the string as part of their name or additional text will satisfy the condition.
An alternative way of creating this assistant is by saving the tree search.
See: .Searching in the Network tree
ActionsStandard actionsCustom actions
Defining a new actionTemplatesConditionsActions for multiple nodesAccidental run protectionSending keystrokes
Actions is a tool for performing operations on the network nodes in your Storage right from the Network tree.
Actions can be accessed via the network node and group context menus:
Standard actions
TNI comes with three standard actions:
Reboot;Power off;Wake-on-LAN.
These actions don't need to be configured. To execute one of them, simply select it from the action list of the desired node or group ofnodes.
Custom actions
Custom actions allow you to use any system routines or third-party utilities in order to accomplish a desired task involving a remote networkdevice.
Custom actions are defined in the using a simple syntax. To access the file, right-click any asset, choose from the action text file Edit actions sub-menu and, when the window opens, click the button in Actions Options Edit commands in Notepad Options / Actions.
Defining a new action
To add a new action, add a line to the action text file:
By default, only the actions that are applicable to the selected nodes are visible in the menu. This can be changed from the Options.
A convenient, brief summary for the action definition syntax, with examples and a complete list of keywords and templates, can befound in the Actions section of the Options window, with one-click copy capability included. The list is also available on thisdocumentation page.
Action name=command
Action name is the name that will appear in the menu.Actions
Command is the command for the operating system to execute.
Templates
Inside the command's definition, certain string templates are used to pass the parameters of a targeted network node into the command.These are the supported templates:
%HOST% FQDN, hostname or IP, depending on the flag of the asset Static IP
%HOSTNAME% Hostname of the asset
%ALIAS% Alias of the asset
%IP% IP-address of the asset
%MAC-% Hyphen-separated MAC-address
%MAC:% Colon-separated MAC-address
%MAC% MAC-address without delimiters
%SSHPORT% Custom SSH port as specified in the scanner options
%USERNAME% Username from the login record used for asset scanning
%PASSWORD% Password from the login record used for asset scanning
%DATE% Current date (YYYYMMDD)
%TIME% Current time (HHMM)
%TIMES% Current time (HHMMSS)
An example of using a template in a command:
Ping asset=ping.exe %HOST%
Conditions
Conditional directives may be added to the action's definition, thus rendering the action inapplicable to certain assets. This is useful in avariety of cases, i.e. to prevent attempts to execute a command that are certain to fail.
A condition is specified when is added before the action's definition in this way:{$IF condition}
{$IF condition}Action name=command
These are the supported conditions:
OPEN00 The specified port is open
OPENSSHPORT The SSH port specified in the scanner settings is open
ONLINE The device is online
WIN It's a Windows device
LIN It's a Linux device
MAC It's an OS X device
SSH The device was scanned via SSH (a Linux, OS X, FreeBSD, or an ESX/ESXi device)
SNMP The device was scanned via SNMP
LAN The device and the PC running TNI 3 share the same subnet
EXISTS(filename.exe) The specified executable exists on the paths specified in the PATH environment variable
Several conditions separated by commas result in a treatment.logical AND
Adding an before a condition "!" negates it (logical NOT).
Adding an before a condition "!" negates it (logical NOT).
Example usage with conditions:
{$IF LAN,!ONLINE}Wake-on-LAN=wol.exe %MAC:%
Actions for multiple nodes
By default, any action is considered inapplicable to several devices at once. Thus, it won't appear in the action list when you select severaldevices or a group. To make it available in these cases, multiple targets have to be allowed explicitly by adding the directive in{$MULTI}front of the definition.
Example:
{$MULTI}{$IF LAN,!ONLINE}Wake-on-LAN=wol.exe %MAC:%
When targeted at multiple devices, a condition is considered satisfied if any of the target nodes satisfies it. To make a condition mandatory an should be added after it.for all targets, "!"
Examples:
{$IF LAN} If any of the target nodes share the local subnet
{$IF LAN!} If all of the target nodes share the local subnet
Negation and mandatory-for-all modification can be combined:
{$IF !ONLINE!} If all of the targeted nodes are offline
Accidental run protection
If an action is "unsafe", adding an directive to the definition will display a confirmation dialog before every execution.{$?}
{$?}Shutdown="C:\PSTools\psshutdown.exe" -k \\%HOST%
Sending keystrokes
Sometimes executing a command launches a user interface that requires further user input. In order to automate this task, TNI can sendpredefined keystrokes to the launched application.
To send keystrokes, append /sendkeys: to the action's definition, followed by a string of keys to send. After the /sendkeys: command youmay use:
Arbitrarytext
sent as is
Templates converted to text and sent as they are
{$WAITX}
pauses the execution for X milliseconds (if this directive is omitted, the default pause before sending any keys is one second)
{keyname}
simulate pressing a special key (the following keyboard keys can be used: F1..F10, LEFT, RIGHT, UP, DOWN, ENTER,BACKSPACE, PGUP, PGDN, HOME, END, TAB)
Example of usage:
Remote Desktop with login=mstsc.exe /v:%IP% /sendkeys:%PASSWORD%{ENTER}
When the action is executed, an authorization window will open up. TNI then sends the password to the input box and presses to logEnterin, automatically.
1.
2. 3.
Custom assetsAdding custom assetsCloning custom assetsAdding custom assets from fileConverting non-scanned assets to custom assets
Adding custom assets
Custom assets can be added to your Network tree manually by using the Add custom asset feature. This allows to create new assets in yourStorage, even if they don’t have a network interface (e.g. monitors, tablets, webcams). As a result, viewing and building reports becomespossible for both custom and automatically created assets.
Follow these steps to add a custom asset:
Click the Add custom asset
button above the Network tree (or in the context menus of your Storage root node or any asset group);In the new window, specify the asset’s type and name;If necessary, fill in the values for common fields and add special fields.
A new asset will appear marked with
in the Network tree:
It's possible to save and load special field presets by clicking and buttons in the windoSave preset as… Load preset Adding new custom asset w.
Cloning custom assets
To add a large number of identical assets you can use the button (by right-clicking any custom asset on your network tree).Clone assetEnter the number of copies you need and press OK.
The copies you make will appear in the Network tree as follows:
Adding custom assets from file
The option allows you to perform a quick import of a whole list of assets or IP addresses to your Network tree. Add custom assets from fileTo add custom assets from file, right-click your storage root node or any asset group node, and then click the corresponding button:
It's possible to import from a text file only.(*.txt)The file should contain only one asset name or IP address per line.For example, the following list of names:PC-1PC-2PC-3PC-4...will appear in the Network tree in this way:
Converting non-scanned assets to custom assets
The option allows to transform an asset that couldn't be scanned by any method to a custom asset. As a result, you Convert to custom assetcan avoid scan error alerts.
To convert an asset, right-click any non-scanned asset in the Network tree and choose :Convert to custom asset
The asset will be displayed and marked with
in the Network tree.
Conversion does not bring any changes to the information fields or properties of assets.
Synchronization with Aсtive Directory
Synchronizing with allows you to automatically transfer the Active Directory OU structure to your network tree. A group will be created for eachOU in the current domain, and each computer in the domain will be moved to its proper place in the structure.
To perform AD synchronization right-click the root and choose the corresponding option:Storage
During the synchronization, assets will receive and retrieved from AD (if they are filled), and also the (for assetsLocation Description OS Versionthat have logged into the domain at least once).
Users are also synchronized with AD during every Storage synchronization, and can be synced separately by going to the Edit – Users tab andclicking . This function Synchronize with AD retrieves AD users with their names, positions, contact info, etc. and places them into your Storage forconvenient search and report building.
Placeholders are created for each device that has been discovered in the domain but has not yet been scanned. These placeholders are emptynodes that can be rescanned to retrieve inventory information. They will be displayed as
in the , and the following hint will be displayed in the tab for such assets:Network tree Viewer & reports – General information
Placeholders contain some basic information from AD: Description, Location, OS name, its version and installed Service Pack.
You also get to choose which action to take if a previously scanned PC has not been discovered in the domain during synchronization: move it toa separate group or delete it.
You can configure TNI to perform synchronization on startup. This and several other switches are located in Options – General.
Active Directory synchronization is one-way only: it's only possible to import data from AD to TNI at this time.
Network scanningThe mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing . Scanner Ctrl + 1
Scanning in TNI 3 is a process of data collection from remote assets and saving it to the current Storage.
When the program scans an asset not present in the Storage, a new node is created for it. Assets that are already in the Storage can bescanned repeatedly to update with the collected information.
Related topics:
Adding scan tasksManaging added tasksScan process and scan resultsSaving, importing and exporting tasksScan scheduler
Adding scan tasksQuick AddSidebarRescanning network nodes
Before starting a scan, you'll need to specify a task list for the scanner.
Quick Add
Type what you'd like to scan into the field and press . Quick Add Enter
Here you can type in the following:
Network namePC321host.domain.com
IP-address192.168.0.1
Subnet192.168.0.0/24 (allowed CIDR notation number range: )from 16 to 30192.168.0.0/255.255.255.0 (allowed masks range )from 255.255.0.0 to 255.255.255.252
IP range192.168.0.1-192.168.0.254192.168.0.1-192.168.2.150(the total number of hosts must not exceed , i.e. )65536 X.X.0.0-X.X.255.255
Shortened IP range192.168.0.1-254192.168.0.1,5,7192.168.0.1-50,125,130192.168.0-3,5,7.1-254
Windows workgroup name (prefixed with )WG:WG:MSHOME
Domain controllerHostname or IP address of a controller prefixed with AD:AD:10.0.0.1AD:servernameThis works even when your PC is not in a domain.
LDAP notationLDAP://OU=Seattle,OU=Washington,OU=USA,DC=company,DC=localOnly works when your PC is in a domain.
Shortened LDAP notationThere are several ways of defining an Active Directory object. These notations are converted into LDAP and can only beused from inside a domain.Domain
DC:companyDC:company.local
ContainerCN:Computers
Organizational unitOU:SeattleOU:Seattle.Washington.USA
Exception taskA hostname or an IP address of a node that needs not to be scanned, prefixed with a " "--APACHESERVER-10.0.0.1
Sidebar
The Quick Add field stores the history of commands you typed in, similar to how Windows command prompt does. Browse recentlyused commands using up and down arrow keys.
1. 2.
3. 4.
The group on the sidebar contains these items:Add scan task
This PC: adds a task for scanning the computer running the current instance of TNI 3;All assets: adds tasks for rescanning of each asset in the storage;Selected assets: adds tasks ;for rescanning of the selected assetsIP networks;
This group contains automatically detected networks that your network adapters are set up to use.Windows network;
Here, all visible Windows workgroups are listed.Active Directory.
Your default naming context and root domain naming context are presented here.The option allows to use another domain controller. It has the same effect as typing Connect to domain AD:<hostname or
into the field.IP of a domain controller> Quick Add
Rescanning network nodes
You can create tasks for rescanning the existing nodes in several ways:
Simply type the hostnames or addresses of assets into the field;Quick AddSelect the corresponding nodes in the with your mouse or using or and drag them into the task list area: Network tree Shift Ctrl
Use All assets or Selected assets from the Sidebar;While in any mode (not necessarily the Scanner), select Rescan from the context menu of a node or a group.
Drag and drop a group, and a task will be created for each asset it contains.
Managing added tasksNode discoverySetting logins
Logins for single tasksLogins for complex tasksLogins for assets of various typesAssigning logins to assetsSetting a login for a task created with Quick Add
Setting the destination folderDeleting and disabling tasks; exceptions
Deleting tasksDisabling tasksExceptions
Node discovery
Complex scan tasks (i.e. network scan, IP-address scan or Windows workgroup scan) work with previously discovered nodes. The discoverywill be performed automatically, but it also can be done manually before scanning starts.
To perform the network discovery, just expand a complex task. The subtasks corresponding to discovered nodes will gradually show up.
Searching is accompanied by animation. It can be stopped by pressing the button. Stop search When the search is completed or stopped, two additional buttons appear on the right:
Repeat search deletes all subtasks and performs a new node discovery;The option shows the way the complex task will be saved in .Padlock Saved tasks
When the is , the task will be saved without subtasks, and the search will be performed again padlock opened when the.saved task is added again
To save the task along with the configured subtasks, click the and it'll .padlock close.About saving scan tasks
Setting logins
To access a remote node, the TNI 3 scanner requires a login (username and password, or a community string for the SNMP protocol).
Logins for each task can be specified in columns corresponding to their protocols.
Click on an arrow in any protocol cell, and the login menu will show up.
This list contains all logins created by the user and the standard login for the protocol (for Windows: the current user of the system wherethe program is run; for SNMP: a public community).
To scan an asset by the selected protocol, select one of the logins or create a new one by using the option.Add
Along with the username and password (or the community string for SNMP), an should also be specified when adding a new login. An alias alis a unique identifier that will be used to address this login in TNI.ias
To change the username and password for previously created logins, use the button (the icon) located in front of every login inEdit pencil the list.
To skip scanning the asset by a particular protocol, select .Ignore
Logins for single tasks
Only one login for one of the protocols can be selected for any single task. If the login is not specified, the task will be ignored duringscanning.
Logins for complex tasks
Complex tasks can have several logins for each protocol. In this case, access to every asset scanned within this task will be sequentiallyrequested using all specified logins until one of them matches.
A in a login cell means that the task uses the logins of a parent task, but another login can be assigned to the task, and it will betilde (~)used for scanning.
Logins for assets of various types
If the asset is not present in the Storage and the scanning has not been started yet, TNI doesn't know its type, therefore the protocol to scanthis asset with is unknown as well. In this case, login for any protocol can be set.
When the asset type is known, it can only be scanned via the appropriate protocol: for Windows-assets, for Mac OS X and LinuxWin SSHassets, etc. The cells of other protocols will be greyed out and inactive.
Assigning logins to assets
Assigning a login to an asset in the Storage means that a new scan task for this asset will be automatically created with the assigned login.
Assigning logins to assets, as well as creating, deleting, editing logins and changing default logins can be performed in the mode. ForEdit more details, see .Logins
Setting a login for a task created with Quick Add
A new task automatically acquires a login entered with additional semicolon-separated login command:
<task creating command>; login <login alias>
For instance:
10.0.0.3; login Homer
You can also enter several logins separated by commas:
10.0.0.0/24; login Homer, Marge
Setting the destination folder
By default, all new assets are placed in the root folder of the Storage.
You can select a folder in the Storage for every task, and the scanned assets will be placed there.
The column serves this purpose. Clicking on an arrow in this column will show a menu with the list of all storage folders.Destination folder
You can use an additional " command when creating a new task with :to" Quick Add
<task creating command>; to <path to folder>
EARTH; to Planets
10.0.0.3; login Homer; to New devices
PLUTO; to Planets\Dwarf planets
Deleting and disabling tasks; exceptions
Deleting tasks
To delete a task, use the Delete button in front of its title in the Task column or select multiple tasks and press Delete on the keyboard.
Disabling tasks
To disable a task without deleting it, tick off the checkbox in front of its title. This can also be done by selecting multiple tasks and pressingthe . To enable or disable all tasks, use the checkbox in the column.Space bar Task
You can create a new task as disabled through by using an additional command:Quick Add disable
On the first scan of a remote asset, the login that successfully provided access is automatically assigned to it.
It's not possible to create a new folder from this menu. If assets should be placed in a new folder, create it manually beforehand.
<task creating command>; disable
HALLEY; to Comets; disable
Exceptions
You can create an exception task using . Just enter a network name or an IP-address with prefix (minus). If the exception taskQuick Add "-"is enabled, the scanner will ignore the specified asset.
1. 2.
Exceptions are convenient to use for scanning networks and ranges. For instance, if one or several assets in the netwo10.0.0.0/24rk should not be scanned, you can do the following:
Create a task, expand it and wait for all subnodes to be discovered, then delete the unnecessary ones;Create a task and several exception tasks.
Option 2 is sometimes faster and more handy.
Scan process and scan resultsEditing the task listScanningScan results
The scanner control block is located at the top of the Sidebar.
It displays the current status of the scanner and additional command buttons. Certain buttons may appear or disappear depending onsituation.
Editing the task list
When the tasks have been and , click .added configured Start scan
Looped scan: performs current tasks with specified frequency.Set up scanner: opens the options window.Set up logon script scan (see ).Logon script scanSet up scheduler (see ).Scan schedulerSet up resident agent (see ).Resident agent scanSet up logins: opens the subpage in .Logins EditClear all: removes all added tasks.
Scanning
You can't remove, disable or configure scan tasks during scanning. All disabled tasks are hidden.
The column displays the progress of each task and their current states.Status
The overall scanning progress is displayed in the Sidebar.
Click if you want to interrupt the scan process. This operation can take some time.Stop scan
Click if you want to interrupt the scan process. This operation can take some time.Stop scan
Scan results
When the scanning is done, the results of every task are displayed in the main area.
If an error has occurred while processing any of the tasks, you'll see an error message in the column.Status
Names and statuses of tasks can be copied by selecting them and pressing or via the context menu.Ctrl + C
The sidebar displays the overall scan result and some additional commands.
Back to editing: dismisses the scan results and returns to normal mode.Clear finished: only the tasks that have not finished with success for one reason or another. This allows to eliminate theleavescauses of errors and run the scanner again without rescanning the tasks that finished with success.
You don't have to stop the scan process to add new tasks. Simply create new tasks during the scan: from the Quick Add field, bydragging assets into the scanner area or in any other way. They will be processed when in turn.
You don't have to monitor the scan process. You can freely switch to a different mode and work there while the scan is performedin the background. The icon in the Scanner tab displays the scan progress.
Saving, importing and exporting tasksSaving and loadingImporting and exportingManually creating a task list file
Saving and loading
To save a task list, click on the Sidebar. Once saved, a task list can be loaded and used at any time.Save current tasks
To load a previously saved task list, click on its title in the list.Saved tasks
Importing and exporting
Task lists can be exported to a file or imported from it.
To export the current task list click . You can choose between file extensions and .Save tasks to file .task-list .txt
To import a task list file, click . Load tasks from file
Manually creating a task list file
Sometimes it's convenient to manually create a list of nodes that need to be scanned.
Using the command, you can turn such a list into tasks for the TNI 3 scanner. Load tasks from file
In general, the task file in TNI 3 is a simple text file where each line is a command that adds one task.
The simplest example of a valid task file is a list of IP addresses and network names, each in a separate line. However, the options are notlimited to network names and IP addresses. You can find the full list of supported notations .here
When a task list is loaded, its tasks are appended to the tasks already in the scanner. If you want to only load the tasks you saved,clear the tasks in the scanner before loading the list.
If you need to pass a task list on to another TNI 3 user, you can find your saved lists as separate files in the Tasks subfolder of theprogram's application data folder ( ). It can be accessed by{Path to the Application Data folder}\Total Network Inventory 3\Tasksclicking the Open tasks folder link on the Sidebar in the Scanner mode.
1.
2.
Scan schedulerCreating a scheduled scan taskSetting up a scheduled scan taskRun logManaging scheduled scan tasks
Scan tasks can be scheduled to run on a specified day and at specified time, or daily, weekly or monthly using flexible rules.
Creating a scheduled scan task
The scheduler works with saved tasks. For information on how to create them, see:
Adding scan tasks Managing added tasksSaving, importing and exporting tasks
A scan task can be scheduled in two ways:
Move your cursor over a task in the 's sidebar and click ;Scanner Schedule this task
Go to click the dropdown and choose your task from the list.Options / Scan scheduler, Add task
As a result of one of these actions, a will be created.scheduled scan task
Setting up a scheduled scan task
Clicking the button to the left of the task name in reveals its settings. [+] Options / Scan scheduler
The section allows to set up the type of repetition:Run
OnceOn a specified date.
DailyEvery day at specific time, or once every N days.
WeeklyOn specific weekdays every Nth week.
MonthlyOn specific days of chosen months of the year.
The exact of scanning can be specified using the corresponding field.Time
For repeated tasks, the date can also be specified The task will not be executed before this date.Starting .
Run log
Each scheduled scan task has a separate (accessible from ). Each time a task is run or skipped, TNI adds Run log Options / Scan scheduler anappropriate descriptive entry to the corresponding log. A run log can be cleared or copied to clipboard.
Managing scheduled scan tasks
Toggling the switch to the right of a scheduled scan task in Options / Scan scheduler on or off or enables disables the task. You can temporar the task to stop it from running on scheduled days and re-enable it at any time.ily disable
To a task, click the to the right of the scheduled scan in the Options window.unschedule X
Another way to remove a scheduled scan task is to delete the corresponding scan task itself from the Scanner's Sidebar.
For a task to be executed at the scheduled date and time, TNI must be running, and the scanner must not be busy with othertasks.
The saved task itself will not be deleted, only removed from the scheduler.
Scanning using agentsOne of the ways TNI scans remote devices is by sending an agent to them. The agent then studies the remote system, obtains the inventoryinformation in the form of a data file and sends it back to TNI. When the scanning is complete, the agent is erased from the remote system andno traces of scanning remain. You can learn more about the scanning technology from the .Techpaper
This section describes how TNI's scanner agents can be used as standalone tools.
Manual scan: use standalone scanner tools for inventorying assets locally when they're not accessible remotely.Logon script scan: configure the script that automatically scans computers that show up in a domain.Resident agent scan: automatic scheduled scan of any Windows computer without the main unit's direct participation.
Manual scan1. Copy the agent executable to the asset you need to scan2. Perform the scan3. Import the data into your Storage
Manual scan can be used to inventory assets that are not connected to your network or are inaccessible for regular scanning for one reasonor another. For example, assets running Windows XP Home Edition can only be scanned this way due to OS limitations.
Manual scanning of any system involves three basic steps.
1. Copy the agent executable to the asset you need to scan
Agents are located in TNI's installation folder (e.g. ). The filenames are as follows:"C:\Program Files (x86)\Total Network Inventory 3"
Windows agent: tniwinagent.exe
Linux agents: tnilinagent tnilinagent_x64
OS X agent: tnimacagent
FreeBSD agent: tnibsdagent
VMware ESX agent: tniesxagent
The Windows agent can also be copied to a specified folder by using the option from .Export standalone scanner Options – Logon script
2. Perform the scan
Launch the agent o . When the scanning is complete, a data file will be generated and,n the remote system by default, placed into thedirectory the agent is run from.
When scanning a asset, you can use these command line parameters for :Windows tniwinagent.exe
/path:"\\server\share" allows to set a path to a folder where the data file will be placed;/delay:XX specifies the gap in seconds between the agent's launch time and the start of the scan;/overwrite overwrites the data file in case the target folder already contains its older version (otherwise, new files appended with(2), (3), etc. will be created after each scan);/scripted is required for running the logon script scan;/debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will becreated, which can be sent to the developers in order for them to search for and fix possible scan errors;/driver:{x} controls the :low-level hardware scan mode. Set tox
0 — to disable low-level hardware scan completely; — to always skip disk drive scan (in order to avoid BSOD);1 — to skip disk drive scan automatically if the faulty driver is present ;2 (default value) — to enable full low-level hardware scan.3
/admin runs the agent with administrator rights;/noadmin runs the agent without administrator rights;/keepdriver keeps the driver installed;low-level hardware scan /removedriver removes the driver (if it's installed);low-level hardware scan/nodriver disables low-level hardware scan (same as );driver:0/logoff logs the current user off (post-scan);/reboot restarts the computer ;(post-scan)/poweroff powers off the computer ( same as );post-scan; /shutdown/shutdown shuts the computer ( same as ). down post-scan; /poweroff
Linux, OS X, FreeBSD and agents are run from the console. For example, you can run the Linux agent using the following command:ESX
chmod 755 tnilinagent./tnilinagent
When scanning Linux, OS X, FreeBSD and ESX systems, the following command line parameters can be used:
-silent allows to scan an asset without user interaction. Only the scan progress percentage will be displayed;-log allows to scan an asset while logging the scanning process;-debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will becreated, which can be sent to the developers in order for them to search for and fix possible scan errors.
Locate the generated data file and send it back to the system that runs your copy of TNI (or any other place TNI has access to).
3. Import the data into your Storage
You can do this in several ways: by placing the file directly into the Storage folder, by using the menu, or by enabling the automaticImport import if the manual scanning should be performed regularly. See the section for details.Data import
Logon script scanSetting up the logon script scanningAutomatically importing new data files
This type of scan uses TNI's Windows agent to automatically scan any Windows computer as it logs on to the domain. This is achieved byadding a specific command line (with a call to a previously exported agent executable) to the user's domain logon script. Whenever the scriptis run, the agent is run on the remote asset as well. It generates a data file and places it into the specified directory. The resulting set of datafiles can then be imported to the TNI Storage either manually or automatically.
Setting up the logon script scanning
Go to the tab and click the button on the Sidebar (or open the window and go to the pScanner Set up logon script scan Options Logon scriptage).
Use the button to place a copy of the Windows agent ( ) into the shared folder of yourExport standalone agent... tniwinagent.exechoice. Make sure that the scanned assets have rights to the folder you choose.readPath to agent: contains the path to the agent's executable.In the Save path field, specify a separate folder that will contain the data files generated by agents. This folder should be accessiblefor writing from the remote assets.You can add a in order to prevent performance issues caused by the scan process starting simultaneously delay before scan start with autorun programs.Overwrite existing files: when enabled, the previous versions of data files will be replaced with the new ones when the assets arescanned repeatedly.
Any modification of the above parameters generates a command line for the logon script. You may and paste it into thecopy the commandlogon script manually, or let the program do it for you by clicking the button.Add the command to a script
A detailed step-by-step guide is available in the .FAQ
Automatically importing new data files
To automatically import the data generated by the logon script scan, go to options and specify the path to the folder containingAuto-import the data files (from the field in settings) into the field. This way, your Storage will always containSave path Logon script Import data paththe most recent configuration information from each computer in your domain. See the section to find out more about theData importautomatic import feature and its parameters.
Resident agent scanSetting up the resident agent
Resident agent settingsAgent activity schedule
Automatic resident agent deployment and uninstallationManual resident agent installation and uninstallationUpdating the resident agent
This type of scan uses TNI's Windows agent to automatically scan any Windows computer without the main unit's direct participation. It canbe arranged by installing the resident agent as a service on the remote computer. The service then performs scheduled scans and can sendthe data file – generated after each scan – via e-mail or FTP, or save it to a network share. The data files can then be imported to the TNIStorage either manually or automatically. The advantage of this scanning type is in the ability to collect information from computers that themain TNI unit has no or limited access to.
Setting up the resident agent
Go to the tab and click the button on the Sidebar (or open the window and go to the pScanner Set up resident agent Options Resident agentage).
Resident agent settings
Show resident agent deployment controls in the Scanner: allows to make the buttons and on theDeploy Remove resident agentSidebar in the Scanner tab visible or hide them. See .Automatic resident agent deployment and uninstallationAuto-update the agent or settings from a network resource (HTTP or SMB): allows to set the path to the folder on a web or fileserver that the resident agent can self-update or obtain new settings from. See .Updating the resident agentData transfer method: allows to select one of the 3 available protocols using which the scan results are to be sent. If the Do not sent
option is set, the files will be saved to the current folder where the agent is installed (for the automatically deployed agent, it'sdata ).C:\Windows\TNIRESIDENTAGENT\
Keep sent data in the 'Sent' folder: allows to disable automatic deletion of inventory files after they're sent. Files can be found in subfinside the current folder where the agent is installed (for the automatically deployed agent, it's older Sent C:\Windows\TNIRESIDENT
).AGENT\Sent\Use the button to place the agent's files into the folder of your choice for further onExport resident agent… manual deploymentremote computers. The files exported include a copy of the Windows agent the settings file and (tniwinagent.exe), (tniwinagent.ini) if required by the agent according to the settings (see below) 2 libraries and– – (libeay32.dll ssleay32.dll).
The two libraries will be exported along with the agent and necessary for its correct operation when any of the following combinations ofsettings are used:
Data transfer method is set to , is disabled, and either or is selected as the SMTP Send to MX server STARTTLS TLS/SSL Security level;Data transfer method is set to , is disabled, and an FTPS address is specified as the ;FTP FTP proxy URLAuto-updates from a network resource are enabled via HTTPS.
Agent activity schedule
Configured similarly to the .Scan scheduler
Automatic resident agent deployment and uninstallation
Automatic deployment is initiated from the Sidebar in the Scanner tab.
If is enabled, encryption will not be used even if an FTPS address is specified in the field.FTP proxy URL
When using FTPS, the agent will attempt to encrypt both the command channel and the data channel. If the server does notsupport this (and some servers won't), only the during further transfers.command channel will be encrypted
For both the SMTP and FTP transfer methods, TLS is not enforced. If the server does not support TLS, the transfer will beperformed over an unencrypted connection.
Scheduling the agent launch is essential. If the schedule is not created, no scans or data transfers will be performed.
1.
2.
3.
1.
2.
Automatic deployment is initiated from the Sidebar in the Scanner tab.
Before deployment, the Resident agent. Then add computers to the task list, select logins and click on theset up Deploy resident agentSidebar.
Deploy resident agent. The main TNI unit uploads and, depending on the data transfer andtniwinagent.exe, tniwinagent.iniauto-update settings, 2 files to remote computer folder and then connects to the Service.dll C:\Windows\TNIRESIDENTAGENTControl Manager to install and start the agent as a service.Remove resident agent. The main TNI unit connects to the Service Control Manager to stop and uninstall the resident agent service.Folder is deleted.TNIRESIDENTAGENT
Manual resident agent installation and uninstallation
Manual deployment can be used when the computer that needs to be inventoried is not connected to your network or cannot for whateverreason be deployed to automatically.
For manual deployment, the following steps have to be taken:
Set up the resident agent and use to place , and, if required by the settings, 2Export resident agent… tniwinagent.exe tniwinagent.ini files to an empty folder..dll
Move this folder containing the files to the remote computer where the agent has to be installed. Make sure that the resident agentfolder will not be deleted by accident.Start the resident agent service from the resident agent folder using the following command:tniwinagent.exe /installThe following switches can also be used during installation:/start will start the service right after the installation;/testrun will run a test scan when the service is started for the first time, and the resulting data will afterwards be transferred viathe selected protocol.
To remove the service, use the following command:tniwinagent.exe /uninstall
Updating the resident agent
The resident agent can be updated on the remote computers using one of the following methods:
Re-deploy the agent from the in TNI.Scanner
Configure . For this, enable this option from and specify the path toauto-updates from a network resource Resident agent optionsthe directory where the updated versions of the agent and the settings file will be placed. If only the settings need to be updated,then the settings file (tniwinagent.ini) alone may be copied into the specified directory, without the agent file.The resident agent automatically checks for updates 5 minutes before the scheduled scan and updates itself if necessary.
Example path for updating via HTTP:http://websiteaddress/folder/
Example path for updating via SMB:\\computername\folder\
Buttons Deploy and Remove resident agent will be displayed only if enabled in options, and if tasks have been Resident agent added to the task list.
When the resident agent is removed, all content from , including inventory files and logs, is deletedTNIRESIDENTAGENTpermanently.
A message will notify you when the service is successfully installed or uninstalled.
In this case, the resident agent doesn't need to be removed first because the contents of the agent's folder – including anysaved scan results – will be deleted.
It's not possible to update the agent without the settings file.
Common reportsThe mode is activated by clicking the Common reports Viewer & reports tab above the main area or by pressing Ctrl + 2.
In this mode, you can study each asset's configuration in detail by browsing the information collected during scanning. Information is sorted intocategories: Processor, System memory, Operating system, Installed software, Shared resources, etc.
This is also the right place to build full and brief reports for printing or exporting to popular formats. Reports can cover several assets andinformation categories at once.
Related topics:
Building reports: report types and information categories.Viewing information: searching , copying and exporting values.informationPrintable reports: preparing reports that can be printed or exported to PDF, HTML, RTF, ODT.Additional features: user information , adding custom notes to assets.overview
Building reportsGroup summaryReport on selected assets
1. Select one or several assets2. Select the report categories
To build a report on one or several assets in the Storage, you must first select them in the Network tree.
Group summary
To build a group summary, choose a group while in the mode.Single selection
The resulting report will provide an overview of the group contents:
The number of online and offline ; assetsThe list of assets that were scanned recently;The list of assets that were not scanned;The number of physical devices of each type;The list of virtual devices including the virtualization platform names;The list of computer models;The list of operating systems discovered in the group and the number of copies of each;The list of in the group.alerts
Clicking on the button to the right of the item in the Sidebar will open its settings, where unwanted overview items cangear Group summarybe disabled.
Report on selected assets
1. Select one or several assets
The Sidebar will display the list of information categories that can be used to build a report. Contents of this list depend on the number andtype of selected network nodes.If a single asset is chosen, a list of its snapshots will be displayed at the top of the main area:
In certain cases, the report will be rebuilt automatically in response to your actions. But whenever report customization takesseveral steps ( when selecting several assets one by one), no auto-updating will occur; press e.g. F5 or click the blue hint bar toupdate the report manually.
The gear button to the right of the Alerts item in the Sidebar opens the alert settings window.
Remember: to include only one asset in the report, it's enough to click it (when the Multiple selection mode is disabled); to includeseveral assets, you need to first enable the Multiple selection mode by ticking the Several assets checkbox.
To switch between snapshots, use the Earlier snapshot and Later snapshot arrow buttons or select a date from the drop-down list. When thesnapshot is selected, the current report will be automatically rebuilt.
2. Select the report categories
Click one of the categories to see a report on it for the selected assets.To include several categories in a report, tick the Several categories checkbox. As a result, a checkbox for every category will be displayed.Tick the categories of interest and refresh your report.
The main categories are sorted into groups: Hardware, Software, Other.The contents of the main categories are described in the Collected information section.
Additional categories:
General information: an overview of network attributes, operating system and hardware;Alerts: detailed description of problems found on the asset;See the section for more information on how alerts work.Alerts The number to the right of the category title is the total number of alerts for the selected assets.Hover your mouse over the category to display a that takes you to the screen.Alerts gear icon Alert optionsCustom information: additional user-created fields;See for more info.Custom fieldsUsers: information about the user assigned to the asset.
When several assets have been included in a report, only the latest snapshots are used.
1.
2.
3.
Viewing informationSelectionCopyingExportSearching and filtering
After one or several assets in the Network tree and the report categories have been selected, information about the assets will be displayedin the main area.
Selection
You can select lines in the report in a normal way, use the mouse or keyboard keys Shift and Ctrl.To easily select a group of fields, click its header.
To select the whole report, press or use the option from the context menu.Ctrl + A Select all
When using the context menu options, only the selected lines are affected.
When using the and buttons in the upper right part of the main area, all displayed information is copied or saved whether it'sCopy Export selected or not.
Copying
Information can be copied in several ways:
Copy as textGroup titles, field names and values are copied. Nesting levels will be indicated by tabulation characters in the beginning of each line.The same character separates field titles from values.This method is used for copying by default. This is also the way information is copied when you press .Ctrl + C
Copy as CSVCSV (Comma-separated Values) is a text format that is convenient for storing structured information.
Copy values onlyField names and group titles will not be copied.
Export
You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.
You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.
Searching and filtering
To initiate a search, click the field at the top of the main area or press . The search will be performed instantly as you type.search Ctrl + F
When the checkboxFilter below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.
The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result isachieved by pressing the on the keyboard.up and down arrow keys
To save to and formats, build a PDF, HTML, RTF ODT printable report and export it.
Printable reportsTypes of printable reportsZooming and changing paper formatSearchCustomizing printable reportsPrinting and exporting
To switch to the click in the upper-right corner of the main area. Print preview, Printable reports
The will appear. Printable pages of the report on currently selected assets and categories will be displayed in the mainPrint preview toolbararea.
Close print preview (the on the right edge of the X toolbar) to return to the normal mode.
Types of printable reports
There are two types of printable reports:
Full printable reportThis report contains all the information displayed in the viewer. All titles, values and structure of fields remain the same.
You don't have to close the print preview to build another printable report. Simply work in this mode as you would in the normalmode. Selecting assets and categories will update the printable version automatically.
Brief printable reportThis report contains the most significant information on each of the selected categories. It's presented as a table, which makesonlyit more space-efficient compared to the full report. This report is great for making short overviews that will fit on a few pages.
To switch type, use toolbar buttons Brief and Full.
Zooming and changing paper format
The drop-down menu is used to set paper size and text orientation.Paper format
Scale controls are used to zoom the preview in or out.
Search
To initiate a search, click the field at the top of the main area or press . The search will be performed instantly as you type.search Ctrl + F
To highlight the next match, click the arrow button or press the on the keyboard. Next result down arrow key
To highlight the next match, click the arrow button or press the on the keyboard. Next result down arrow key
The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result isachieved by pressing the on the keyboard.up and down arrow keys
Customizing printable reports
Click to open the TNI 3 options window on the page.Reports options Reports
The company title and logo, printed in the header, can be set as well. See .Storage properties
Printing and exporting
Click the button on the right side of the toolbar.Print
To save the report to a file, use the button. You can choose from and formats in its drop-down menu.Export PDF, TXT, HTML, RTF ODTClicking the button itself initiates an export to .PDF
1. 2. 3. 4.
Additional featuresUser information overviewViewing and adding notes
User information overview
If a single network node is selected, the name of the user assigned to the node will appear in place of the category in the Sidebar.Users Expand it via the button to the right and the user's image, full name and contacts will be displayed:[+]
Clicking on one of the contacts will copy it to clipboard (if it's an email address, the email client will be opened).
The button activates the mode, where you can edit user information or assign another user to the computer. For moreEdit user Edit / Usersdetails on this mode, see .Users
Viewing and adding notes
A text note can be added to each asset.
To do this:
Select a single asset;Click the button;Add noteEnter text;Press or click the button under the input field.Ctrl + Enter Save
To edit, delete or copy the contents of a note to the clipboard, use the corresponding buttons. You can also initiate note editing bydouble-clicking it. An alternative way of deleting a note is by clearing its contents.
Another way to add a note is via the screen.Network node properties
Learn to use notes more efficiently, display them next to assets in the Network tree and filter computers by the note contents: abo.ut Storage assistants
Another way to add a note is via the screen.Network node properties
1. 2.
Table reportsWorking with a built report
Multi-column sortingChanging the column order and visibilitySearching and filteringExporting and copyingPrinting
The mode is activated by clicking the corresponding tab above the main area or by pressing . In this mode, you canTable reports Ctrl + 3build a table report that contains only the information you need.
To build a report:
Select one or several assets in the Network tree;Pick one of the from the Sidebar.report templates
TNI 3 has a number of standard report templates, but you can create your own template by clicking the button on the Sidebar.New template
A separate editor is used for creating and modifying templates. To learn how to use this tool, see the section.Creating a template
Working with a built report
Multi-column sorting
Beside the regular sorting by way of clicking on a column header, the tables in TNI 3 can be sorted bymany columns at once. Just sort by one column, then click another column header while holding Ctrl. Thearrows in column headers show their sorting directions. The numbers appearing beside the arrows showthe sequence in which the columns sort the report. You can sort by up to nine columns simultaneously.
Changing the column order and visibility
You can change the order of columns by dragging their headers.
You can hide and show columns using the context menu of the column headers.
Searching and filtering
To initiate a search, click the field at the top of the main area or press . The search will be performed instantly as you type.search Ctrl + F
When the checkbox below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.Filter
Use to be forwarded to next and previous results of the search.up and down arrow keys
Exporting and copying
To export or copy the table, use the context menu or buttons to the right of the search field. The report can be exported to text, CSV, HTML,XLSX.
Printing
To build a printable table report, click in the Printable reports upper right corner of the main area. Printable reports can be exported to text,PDF, RTF, HTML, ODT.
Related topics:
To build a report on all computers in the Storage, select the root node of the Network tree.
It's better to export or copy the report in the format if you're planning to import it into the spreadsheet processor.CSV
Printable reports preserve the arrangement, visibility and sorting by columns, as well as line filtering.
Related topics:
Creating a templateTemplate management
1. 2. 3. 4.
Creating a templateSelecting the object for your reportSelecting fields for the report
Fields of the Asset objectFields of other objectsFiltering fields by asset typesComplex fieldsSearching fields
Modifying selected fieldsAdding conditions
Creating expressionsCreating complex expressions
To create a table report template, click the button on the Sidebar. The template editor will be opened.New template
Object of reportThe list of available fieldsThe list of selected fieldsCondition builder
Every value retrieved by TNI 3 from remote assets can be displayed in a table report.
Selecting the object for your report
Start building the template by selecting one of the report object types.
Each single row of the resulting table report will correspond to a single object of the specified type.
A report can only be built for a single type of object. Selecting a new object will clear the list of selected fields. If you need todisplay fields from different types of objects (e.g. operating systems and RAM units), select Asset as the object, since it containsthe fields of all the other objects.
Selecting fields for the report
When you've selected an object of report, its properties will be listed as Available fields.
Click one of the fields to select it. The circle next to its name will turn green, and the field will be added to the list.Selected fieldsTo delete a field from the template, click the next to the field's name in the list of X Selected fields or click the field in the list of Availablefields once again. The circle will revert to gray.
Fields of the Asset object
This is the main object type, containing all the fields known to the program:
Network node properties: network attributes, date of the latest update, asset type, identification number, etc.;Data from the main categories: hardware, operating system, installed software, user accounts, etc.;Other data: , , .custom fields alert messages user information
Fields of other objects
All types of objects except for the belong to a hypothetical asset. Therefore, Asset attributes of the asset containing the object can beincluded in the report along with the fields of the object itself. Thus, the list of available fields is divided into two parts.
For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.
For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.
Filtering fields by asset types
Different types of assets have different sets of fields.the object for Windows-assets contains such specific fields as , , For example: Operating system Service pack Path to Windows directory Direct
, . Linux operating systems don't have these attributes, but they have and e instead.X version etc Core version Code nam
By default, the list of displays all fields of the chosen object, and icons of all types are highlighted in blue in the filter pane:Available fields
Click one of the icons to hide the fields specific to the corresponding type. Another click will display them again.
Complex fields
Some fields consist of several separate values.For instance, the of a monitor — e.g. " " — is a combination of its , , .Image size 47 cm x 30 cm (22") Width Height Diagonal
A complex field can be added as a whole, but you can add its elements independently as well.To view the elements of a complex field, click the button next to its name:[+]
Searching fields
Type a field name into the search field to only display the matching fields and the groups that contain them.
Modifying selected fields
Each selected field corresponds to a column in the resulting report.
The order of the fields defines the order of the columns. You can them by dragging them with your mouse (reorder first select the field andthen drag it).
To delete a field from the template, click the X next to the field's name in the list of Selected fields or click the field in the list of Availablefields once again.
Click the button to the left of the selected field's name or double-click the field to access its properties:[+]
Title: defines the name of the column. Full names of some fields are too long and inconvenient. You can change them to a moreappropriate and shorter title in this field. Later you can revert the title back to the default by clicking the icon on the right;RestoreSorting: Use this to automatically sort the column in any direction;Fix column: A fixed column remains on the screen when you scroll the table horizontally. You may fix any number of columns;Hide column: hides the column from the report. You may still use values in it for sorting or for filtering using (see below).conditions
Adding conditions
Conditions are used to filter the table rows based on the values from selected columns, or combinations thereof.
To add a condition, you first need to add some fields to the report and then create a simple or complex expression using the Conditionbuilder.
Creating expressions
To create the first expression, click Add condition.
An expression consists of a field, a type of comparison and, in most cases, a value. To build one, specify all the elements when prompted.
Different kinds of fields will provide different types of comparisons and values. Numeric fields can be compared with numeric values; stringscan be matched against masks or other strings; some values can be selected in the list.
Creating complex expressions
A complex expression is a chain of simple expressions and logical operators: .AND, OR, NOT
To create a complex expression, first create a simple expression as described above. Buttons and will appear below. Select"And..." "Or..."one to chain in the second expression. A logical group of expressions will be formed.
When the table report has been built, you can right click its header to hide or reveal columns via the context menu.
To add another expression to the existing group, click the small button below. After, click if you want to make it a part of(+) "And..."/"Or..."a new logical group.
Keep adding expressions until you've built the desired condition.
In the Sidebar, templates with conditions are indicated by a small icon overlay.funnel
Don't forget to name your new template and press . The report will be automatically built and the template will appear in the Sidebar, toOKbe used when needed.
Template managementUsing templates built by the other users
Your table templates appear on the Sidebar in templates.Custom
Three buttons appear when you hover over a user template with your mouse:
Edit: opens the template in the editor;Copy: creates a copy of the template and opens it in the editor;This option is also available for the standard templates. It makes it easy to create your own template based on an existing one.Delete.
Using templates built by the other users
TNI 3 stores table templates as files with the extension in the subfolder of the program's application data folder (".table-template Templates\ \ "). It can be opened automatically by clicking the link{Path to Application Data} Total Network Inventory 3 Templates Open templates folder
on the Sidebar when in the mode.Table reportsTo use a template built by another user, copy its file to the directory. The template will become available in the modTemplates Table reportse.
Software asset managementThe mode is activated by clicking the tab or by pressing Software asset management (SAM) Software accounting Ctrl + 4.
This mode lets you view all the software discovered in your network, browse software installations, track software items, organize them andbuild a variety of software-related reports.
The owners of TNI 3 Professional have the ability to store software license data, manage licenses and see detailed reports on the compliancestatus of licenses, software items, computers or single software installations.
Related topics:
Getting startedSoftware managementLicense managementReports
Getting startedCreating a databaseImporting a database
The software database must be connected to the containing all the hardware assets you plan to involve in the software inventoryStorageprocess. Open your TNI Storage or create a new one and use the to fill it.Scanner
Switch to the tab.Software accounting
The database has not been created yet, so press the button on the Screen selector to switch to the screen.gear Manage database
Creating a database
Click Update software database, and the process of analyzing each asset in your Storage will start. A list of software will be retrieved fromassets along with the discovered license keys. You only need to do this manually once. Subsequent changes to your Storage will be handledautomatically.
Importing a database
If you've used in earlier TNI versions, TNI 3 will detect the old database and prompt you to import data from it.Software asset management
Click the button. The list of available items will appear.Start import
It contains important information ( tags and license keys). Click next to each item that you want imported into the new database.i.e. Import
1. 2. 3. 4.
Software managementTo access the screen, click the tab on the screen selector: Software management Software
This screen has all the tools necessary for browsing, searching, filtering, organizing and inspecting software items and separate softwareinstallations.
The main software listSoftware filtersSoftware publishersThe panelDetails
Related topics:
Browsing, searching and filtering softwareInspecting a software item
Browsing, searching and filtering softwareSearching softwareFiltering softwareThe list of publishersDisabling software filters
The displays every software item installed in your network.Main software list
The following information is displayed in the columns of the list:
Title & version: the name and publisher of each software item, as well as its platform: TNI analyzes both Windows and Mac OS X software. T, and status will also be displayed here.ags comments tracking
Copies: the number of installations of each software item discovered in your network.
Licensing: compliance status for items that have licenses linked to them. Read about licensing in the section.License management
Searching software
Use the search bar on the top-right of the workspace or press to activate . Start entering a software item title or aCtrl + F instant searchpublisher name to narrow down the list.
Filtering software
Available software filters can be found to the left of the list. To apply one of the filters, click it and select its mode from the menu:
OS filter: to display only the software made for a specific platform;Licensing filter: to display only the software with a specific compliance status (see );License managementTracking filter: to bring only the items that are tracked to attention, or only the ones that violate the tracking policy (see );TrackingAsset filter: to display only the software that’s or on one or a group of computers selected in the ;installed not installed Network tree
Tag filter: to display only the software with a specific tag (see the section );Inspecting a software item to learn about tags
Saved searches: to save frequently used search terms and quickly apply them to the software list; to add a search term, choose frAddom the filter menu.
Choose a title for your saved search and enter the desired term. You can also choose to create a regular expression to find items thatsatisfy a complex condition.
Active filters are highlighted in blue. To deactivate a filter, click it and choose No filter from the menu.
The list of publishers
Under the list of filters is the list of publishers. Next to each publisher is the number of software items released by them that are currentlyvisible in the main list.
The list can be used as a Click a publisher title to narrow down the software list. Click to deactivate thepublishers filter. Clear publishers filterfilter.
You can select with your mouse and/or and keys. This could be useful when a single publisher is listed underseveral publishers Ctrl Shiftseveral slightly different titles:
In the Copies column's cells two numbers are displayed: X/Y, where X is the number of installations on selected computersand Y is the overall number of installations.
Use the search bar above the list to quickly find publishers.
You can to the top of the list by hovering over an item and clicking the little icon to the left of it.pin an important publisher pin
You may use all filters described above in any combination.
An indicator next to the screen selector displays the number of at all times. currently visible software items
Disabling software filters
Whenever a filter is applied to the software list, a filter deactivator appears below the list. All filters can be cleared at once as well.
Filters can also be deactivated from their respective menus.
Inspecting a software itemTagsInstallationsCommentsAdditional features
Select one or several software items in the to inspect them in the Software list Details panel.
Tags
Click in the header of the panel to assign a tag to a software item. From the menu, choose one of the available tags or add aAdd tag Detailsnew one. A corresponding tag icon will appear as an indication that the tag has been assigned (it will appear in the software list as well as inthe panel).Details
You may assign an arbitrary number of tags to a software item. You may also assign a tag to multiple software items at once by firstselecting them in the software list.
To from the software, click the on the tag icon.remove a tag X
To completely, you have to remove it from all software items that have it. An easy way to achieve this is to use the todelete a tag Tag filterselect all such items and then remove the tag from all of them at once.
Installations
The panel opened in the mode displays a complete list of installations of the selected software and contains the followingDetails Installation information:
Computer where a copy was discovered; Installation date; Date of detection by TNI;Comment: you may add an arbitrary comment to any installation of any software.
The search bar allows to find installations by computer or by previously added comment.
The text displayed in the Computer column is the same as in the Network tree. Use the Network tree display menu to change it.
Click and make a selection in the Network tree to narrow down the installations list. Click to clear theOn selected computers All installationsfilter.
You can select any number of rows and press to copy them in plaintext format.Ctrl + C
Click for a quick printable report on all displayed installations.Installations summary
Comments
Select in the list of Details panel modes. A text field will appear on the right. You can type arbitrary text in it and it will be attachedComment to the software item when you switch away.
An icon in the software list indicates the presence of a comment. Hover over it to read the comment. Click it to go to the comment editor.
To delete a comment, simply erase the text.
Additional features
To quickly find out about unfamiliar software, click on the bottom-left.Google this software
If the publisher has specified the , the link will be available on the bottom-left.software website
Related topics:
Tracking software installationsMerging software items
Tracking software installations
Switch to the mode on the panel to access the tracking policy editor.Tracking Details
Tracking is used to mark software as or on all or only specific computers. Computers that violate the policy are easy to spotmust-have forbiddenand build reports on. Also, you can easily see the tracking summary for separate software items you choose to track.
By default, a software item is neither must-have nor forbidden: the corresponding lists in the policy editor are empty.
You may specify tracking rules of either kind (or both) by dragging assets or groups from the Network tree into the lists.
The list contains computers that are obliged to have the software installed on them. If a copy of the software is not found, aMust-haveviolation is registered.The list contains computers that are prohibited from having the software installed on them. If a copy of the software is found,Forbiddena violation is registered.
Immediately after adding computers to a list, you can see all violations at a glance.
You can apply the policy to all computers at once by selecting from the drop-down menu in the header of each list.for all
Click the next to a computer in the list to stop tracking it. In the mode, removing a computer creates an : the computer will notX for all exceptionbe reported as violating the policy regardless of the situation. To cancel the exception, remove the computer from the list.exceptions
Tracked software items are marked with a crosshair icon that appears to the right of its title in the software list and indicates its tracking status.You can limit the software list to at any time by applying the only tracked tracking filter.
To see all computers that violate tracking policy for any software item, use the .Tracked software storage assistant
For a quick printable report on tracking status of single software, click or to the right of the tracking lists.Tracking status Tracking violations
Merging software items
Some software items may represent different versions of the same software. Having duplicate records for the same entity is not alwaysconvenient or acceptable ( you can only link a license to a single software item, whereas in reality it could cover all versions of this software).e.g.In most cases, a publisher will fill the software info in such a way that a single item can be recognized with different versions in differentinstallations. is the tool designed to deal with other situations.Merging
Select all versions of the software in the main list. Use search and filters to find them faster. To make a multiple selection, drag your mouse oruse and Shift-clicking Ctrl-clicking.
In the panel, select Details Merge.
If necessary, enter the title and select the publisher from the drop-down list, check the list of versions again, tick the safety checkbox and clickthe button. This is what a merged software looks like in the main list: Merge selected software
You can later to the merged software in the same way. add new items
To remove an item, switch to the tab and click the next to the item you want to remove. Merged X
Click to break up the merger.Unmerge
This feature is NOT a replacement for groups. Do not merge software by kind, by purpose, by publisher, etc. You can use tags in thesecases. Only use merging for combining different versions of the same software into a single item.
License managementThe licensing model in TNI The License management screen
The licensing model in TNI
License is a separate entity within TNI 3.
To keep track of licensed software, create a license, connect it to a software item and assign it to separate installations. You can also set uprules for each license to use in order to determine compliance status of these installations.
License key is another entity within a license. Creation of license keys allows for easy management, simple visual representation of allconnections and detection of new licensed installations on the fly.
TNI does not provide support for fixed licensing models due to a large variety thereof. What TNI provides instead are the uniform tools thathelp to fit the rules of any specific license to most real-life situations.
The License management screen
To access the License management screen, click the Licenses tab of the Screen selector:
This screen provides the tools for creating and managing software license assets, setting up licensing rules and keeping track of the licensingstatus of your software.
1. 2. 3.
The main list of licensesThe list of licensed softwareThe panelDetails
Related topics:
Creating a licenseSorting out auto-detected license keysLicensing software installationsEditing a license
Creating a license
The most common way to is to use the corresponding button under the Screen selector.create a license
A window will appear:
Name the license and use the search field or the list to find the software item to attach the license to, then click next to its title. In someSelectcases, the software will be selected automatically.
Fill in the license The most important are the switch and the number of .properties. Keys are mandatory/optional activations
When the setting is , the number of copies that a single key activates needs to be specified. The most common scenarios are:Keys are mandatory
Several keys, each activating one installation;One key that activates several installations (a.k.a. Volume License Key, VLK).
However, you're free to create a license with several volume keys or just one single-activation key. Any combination will work.
In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.
In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.
Copy the license keys into the field, each key on a separate line. You will be able to add or remove keys later, either by editing thisLicense keyslist or by manipulating key entities directly.
When the setting is , the total number of activations the license allows needs to be specified. License keys will be ignored. AKeys are optionalsoftware installation is considered non-compliant if the activation limit of the license is exceeded.
In any mode, click the field to see the button. By setting the activation number to infinity, an unlimited capacity license isactivations ∞ (infinity)created.
In any mode, set the to 0 to create a Use these to track unwanted installations. You may also store known pirateactivations pirate license.license keys in them.
You can assign several different licenses to a single software item.
Sorting out auto-detected license keys
TNI will automatically detect licensed installations of certain software along with the corresponding license keys. After switching to the scLicenses reen, you may see the following item at the top of the main area:
Click the item to display all detected licensed copies in the panel, sorted by software title and keys. From here, you can quickly find theDetailsinstallations you're interested in and create licenses for them (or select from the existing ones) by selecting from corresponding action menus.
If the same key is detected in several installations, the corresponding row may be expanded to display the list of computers.
Sometimes, identical license keys are found in installations of different software items. This may be an indicator that those items are differentversions of the same software and should be . A special case hint will appear: click it and all suspected software items will be selected andmergedyou'll be offered to merge them before creating a common license.
Pressing will bring up the window.New license for this software license creation
Licensing software installationsAssigning licenses to new installationsManaging installations under a licenseManaging licensed installations for a software item
Assigning licenses to new installations
Select a license in the main list and go to the page of the Details panel.Installations
For a newly-created license, the list of licensed copies is empty. On the left, click to display all unlicensedInstallations without licenseinstallations of the affected software.
Click next to each installation that belongs to this license (or select all needed installations and click once). You may alsoAdd to this licensewant to use the search field to find installations.Computers & keys
Managing installations under a license
Select a license in the main list and go to the Installations page of the Details panel. Click Installations under this license on theleft to view the status of licensed copies.
The information on this page depends on the way you've set up the licensing rules. The illustration shows one of the possible cases. You cansee that the first key was used on four computers while the rules only allow for one activation per key. Thus, the remaining three copies aremarked as being Over limit.
Note that TNI considers the first of the four copies to be If you know that is incorrect, you can use status switches to change it.Compliant.Click the green switch to turn it red: all copies will be and all the red switches will be unlocked. Now click the switch on theNon-compliant,legit installation to turn it green.
If, for any reason, you want a copy to be considered despite the fact that it does not violate the licensing rules, you canNon-compliantsimply switch it to red and leave it that way. Your decision will affect the overall compliance status of the license and of the software item.
Managing licensed installations for a software item
On the screen, select one software item and go to the page in the Details panel. From here, you can create and manageSoftware Licensinglicenses, assign installations to them, etc.
If a software item has a license attached, then, by default, all installations are expected to be assigned to it and to comply with its licensingrules. Any installation not assigned to a license is considered and is displayed as problematic. But there might be instances whereUnlicensed you'd like these to be . In that case, just tick the checkbox in the header of the group.green Consider compliant Unlicensed
you'd like these to be . In that case, just tick the checkbox in the header of the group.green Consider compliant Unlicensed
Editing a licenseEditing the license propertiesCustom fieldsCommentsDeleting a license
Select a license in the main list.
Editing the license properties
Click the button in the panel header to open the window. This window is similar to the winEdit license Details License editor License creationdow and lets you change the affected software item, modify licensing rules, specify the price, purchase and expiration dates for the license oredit assigned license keys in text mode.
Custom fields
You can add any information to a license by creating custom fields. In the panel, switch to the page.Details Custom fields
Among other available field types is the You may attach any number of files to a license; the files will be copied into yourFile attachment.Storage and archived, available later at any moment by accessing the page.Custom fields
Comments
The page of the panel allows you to attach an arbitrary text to a license. This is a convenient place for the EULA in case youComment Details need to store it.
To , erase all the text.remove a comment
Deleting a license
To select it in the main list and click in the panel. delete a license, Delete license Details
Before they're deleted, TNI will ask you if you want to copy the license keys.
License deletion is irreversible. Its rules, license keys, custom fields and attached files will be lost.
ReportsGeneral plain-text/CSV exportQuick reportsAdvanced reports
General plain-text/CSV export
Throughout the Software accounting tab, you can select data in any mode and right-click to access the copy/export menu (or press Ctrl + C):
This results in creating easy-to-process plaintext tables of data. The feature is available in:
the main ;software listthe main ; list of licensesthe ;list of software installationsthe ; list of licensed installationsthe and other sections.list of new licensed installations
Quick (MS Excel) is available from the copy/export buttons next to the main .Export to XLSX search bar
Quick reports
You will find quick report links on most pages in the Details panel:
Use these to build instant reports ready to be printed and exported.
Advanced reports
TNI features a Software report builder for creating advanced customizable reports that cover user-specified items.
See Report builder.
1. 2. 3.
1. 2. 3.
Report builderCreating a report Creating templates
To open the Report builder, click the button in the Sidebar.Report builder
The Report builder will be displayed in place of the panel.Details
Report typeReport description and propertiesReport content
Creating a report
Select a type of report from the list;If a report of the selected type can be customized, do it using the middle panel;In the area, fill each section with items that need to be included in the report by dragging them from the main lists.Report contentYou may switch between the and screens while in the mode.Software Licenses Report builder
Click A print preview will be displayed. You may then or it using the buttons on the top right. Available exportBuild report. print exportformats:
Plain textRich text, RTFPDFHTMLOpen document file, ODFMS Excel file, XLSX
Creating templates
Click in the area to add a link to the reportSave as template Report description and properties to the Sidebar. You can use it later to quicklybuild the report.
Change logThe conceptReading a change logLog summary, searching, filtering and printing
This mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing .Ctrl + 5
In this mode, you can choose an asset or a group of assets in the Network tree to see all the detected by TNI in their hardware,changes software and other parameters over the inventory period.
The concept
Every time an asset is scanned, TNI creates a snapshot of it and places it into the Storage alongside the previous snapshots. You can switchbetween various snapshots in the mode using the date/time box next to the asset name:Viewer & reports
You can manage snapshots from the corresponding section of the tab. The auto-deletion policy can be set up in ByEdit Options / Scanner.default, TNI stores up to 10 snapshots per asset and removes the ones that are more than 90 days old (except for the oldest one).
See .Snapshots
In order to build the change log, TNI compares the existing snapshots. The change log is not saved anywhere and is always built on the flyfrom available snapshots.
Reading a change log
To build a log, select one or several assets or a group thereof in the Network tree.
TNI displays the result of snapshot comparison in the form of a nested list.
The timeline is divided into sorted from the most recent to the least recent. Each interval has a starting and ending date and timeIntervalsfrom adjacent snapshots. It also shows at a glance how many changes have been detected in this period of time.
Intervals contain grouped by object types.Events
Events represent elements that have been:
Added,
Removed or
Changed.
These are examples of Change log events:
Log summary, searching, filtering and printing
Before generating a log, you can change the value to view the changes from a certain number of snapshots, or history depth select specific on the Sidebar to only view the changes for these objects. Decreasing the history depth value or selecting less objects canobjects
significantly increase the speed of generation if you store a large number of snapshots or if a large number of assets is selected.
After the log is generated, the Sidebar displays a full summary of logged changes.
Numbers on the right indicate how many elements of the corresponding type are present in the change log.
To untick its checkbox.hide all events of a certain type,
Almost every piece of data within the snapshots is monitored for changes. Still, some kinds of changes in the actual devices maynot be reflected in the log.
To untick its checkbox.hide all events of a certain type,
To hover your mouse cursor over the corresponding type and click the buttoonly view events of a certain object type, Hide the rest/Show alln on the right. Click it again to quickly reveal the full log.
Use the to narrow the log down: press or click the at the top and enter a search term.instant search Ctrl + F search bar
Click next to the to print the change log. The printable version will respect all active filters.Printable reports search bar
1.
2. 3. 4.
Storage propertiesBasic propertiesInventory number generator
The properties of the current Storage can be edited by switching to the Edit mode (Ctrl + 6 and selecting the) Storage properties page in theSidebar.
Basic properties
A is its current title displayed in the Network tree, storage summary report and other places.Storage name
A and a can be displayed in the header of a . Company name Company logo printable report
To add a logo:
Prepare an image (JPEG, BMP or GIF);It's advisable to have a logo of reasonably good quality and with a white background.Click and select the prepared file;AddCrop unnecessary parts of the image in the editor that appears;Click .OK
Use buttons to the right of the logo to load another image or remove the logo.
Inventory number generator
TNI 3 can generate inventory numbers for the network assets automatically.
The inventory number may contain arbitrary text and the following macros:template
# : unique counter. This number will be unique among inventory numbers built with this template only;#* : globally unique counter (unique for the Storage);
To add leading zeroes, put several # symbols in a row.For example, if a template # generates , then ### generates ." " "3" " " "003"
%TYPE% : a short declaration of the device type (WIN, MAC, LINUX etc);%HOSTNAME% : asset's network name;%IP% : asset's IP address;%IP.Х% : values of a particular octet in the IP address ( is a number between 1 and 4).X
You can quickly add macros from the macros menu (the button to the right of the template string).
Generate for all generates new inventory numbers using the specified template for all assets in the Storage.
Automatically generate numbers for new assets: if this box is checked, the inventory numbers will be generated for all assets added to theStorage.
Reset counters: after resetting, the numbers generated and assigned using and templates will start from 1 again.# #*
You can assign arbitrary inventory numbers to assets without using templates or the generator by manually specifying their numbers on the screen.Network node properties
1.
2. 3.
Network node propertiesNetwork propertiesAsset propertiesInventory number
To edit the properties of the selected network node, switch to the mode and select on the Sidebar.Edit (Ctrl + 6) Properties
To save the changes that were made on this page, you can do the following:
Click at the top of the page (you can also discard unsaved changes by clicking );Apply changes Undo
These buttons will only show up if any changes were made.Select other assets in the Network tree;Leave the page (for example, by switching to a different mode).
You can edit the properties of several assets at the same time by several network nodes or a group of nodes in the Network tree.selecting
Network properties
You can change the network node name and IP address here.
Click one of the buttons to get the network name by IP address or vice versa.Resolve
Check the box to access the asset by its IP address. Otherwise, the network name will be used for the access.Static IP address
Asset properties
Device type determines the asset's icon in the Network tree and can be included in the table report.
Virtual type specifies the virtualization platform. Its icon will be included in the reports and displayed next to the node name in the Networktree. Specifying any value other than marks the asset as .Physical device virtual
An is an arbitrary computer name. It can be instead of the actual network name or used in the reports.alias displayed in the Network tree
Description is the computer description obtained from the system properties of the asset.
A is a comment left by user. There's a special assistant that works with notes. Notes can be added or edited in the mo Note Common reportsde.
For more details, see , .Viewing and adding notes Note contents assistant
Inventory number
The items in this section work in the same way as in .Storage properties
The button creates an inventory number using the specified template.Generate
Arbitrary text can be entered into the field without the use of the generator when a single asset is selected.Inventory number
Be careful when editing the properties for several nodes at the same time. It's impossible to revert to the previous stateautomatically after applying the changes. Recovering lost data may take a lot of time.
A handy way of editing several network nodes in succession is by using hotkeys for selecting the next or previous network node: Alt + Up/Down arrow. The changes are applied automatically in this case.
You can hide all the virtual assets in the Network tree or, conversely, display only the virtual assets. There is a special assistant forthis.
Usually, you won't need to set the virtual type manually. TNI 3 automatically detects popular virtualization platforms.
You can set up the template for automatic assignment of inventory numbers to new assets in the Storage properties.
Inventory numbers can be displayed in the Network tree as an additional field or in place of node names. They can be searchedand filtered as well. For more details, see Information display settings and Searching in the Network tree sections.
AlertsList of alerts
Disk space alertAntivirus problemsFirewall problemsAuto-update statusService Pack is out of dateTrack software presence / absence
Using alerts
Alerts in TNI 3 are used to discover problems with the assets.
List of alerts
Disk space alert
One or more logical partitions on the asset are low on free space.
In the alert settings, you can specify the threshold for the disk space alert in gigabytes or as a percentage of the total disk space.
Antivirus problems
Antivirus software is not found or disabled, or its database is out of date.
Firewall problems
Firewall is not found or disabled.
Auto-update status
Auto-update is disabled.
Service Pack is out of date
...or not installed at all.
Track software presence / absence
Shows the list of tracked software.
Software tracking can be managed from the mode.Software accounting
Using alerts
The page in the window allows to disable each of the alert types and specify additional settings for the disk space alert.Alerts Settings
Alerts can be viewed in the mode:Common reports
Group summary contains a complete list of alerts for the computers in the group. All alerts in the Storage can be viewed in thesummary for . the root groupThe category in the displays all alerts for the selected asset or assets. The number of alerts for theAlerts report on selected assetsselected assets is displayed to the right of the category in the Sidebar. The shortcut to the Alert settings becomes available when youhover a mouse cursor over the category.
Alert messages can be included in the when creating a .Table report custom template
The displays Alerts presence assistant the number of alerts in the Network tree and allows to view a list of alerts for each asset in a hint, ashide all the devices that don't have any alertswell as to .
When building a report on alerts, use this assistant to hide assets that don't have any alerts.
SnapshotsViewing snapshot contentsSnapshot auto-deletion policyDeleting snapshots manually
A new configuration snapshot is created following each successful scan. Each snapshot contains information about the state of hardware andsoftware on the asset at the moment of scanning.
Viewing snapshot contents
Information collected at different times can be in the mode. Use the snapshot list at the top of the main area toviewed Common reportsbrowse different snapshots.
The other modes display information from the newest snapshot.
Snapshot auto-deletion policy
Generally, any number of snapshots can be stored for each asset.
In the , you can do the following:Scanner settings
Limit the number of stored snapshots: old snapshots will be deleted when the new ones are created;Specify : all snapshots older than the number of days will be automatically deleted.maximum snapshot age specified
The newest snapshot will never be automatically deleted. You can also make the oldest snapshot exempt from automatic deletion.
Deleting snapshots manually
To manage snapshots, switch to the mode and select the page.Edit (Ctrl + 6) Snapshots
Snapshots in the main area can be grouped in two different ways: or . To switch between them, click one of the buttons atby assets by datethe top of the main area. Click the same button again to reverse the sorting order.
When hovering the mouse cursor over an asset, date or snapshot, a little arrow button appears. Click it to display the pop-up menu for deleting snapshots.
When hovering over the menu commands, the snapshots to be deleted are highlighted red.
Custom fieldsManaging custom fieldsCustom fields in the reports
Custom fields are additional pieces of data that can be attached to individual assets in the Storage. Any custom field consists of a field nameand its value. Values can contain arbitrary information of different type: text, numbers, prices or dates.
Managing custom fields
To manage custom fields, switch to the mode and select one of the two pages in the category:Edit (Ctrl + 6) Custom fields
Common fields: fields created here will be shared by all the assets in the Storage (each asset has its own value);Special fields: fields for the asset(s) selected in the Network tree.
To create a new field or a folder for fields, click .Add
If you hover the mouse cursor over any field or folder of fields, the button to the item appears on the right.X delete
To a field or folder, double-click its name.rename
You can change the order of fields and folders, as well as move items between groups, by dragging them using the mouse. Folders can benested infinitely, but are available for common fields only.
You can select several nodes in the Network tree to change the values of their common field(s) simultaneously. If multiple nodes are selectedand their values for the same common field are different, a Different values label will appear in place of the value. To replace these valueswith the same value, click this label and set a new, common value. The same is applicable to Special fields if the field name is the same forthe selected assets.
Custom fields in the reports
In , you can include all the custom fields in a report by selecting the category.Common reports Custom information
You can also add any individual common field as a table report column when creating a custom template.
LoginsManagement of Storage loginsAssigning logins to network nodes
A login in TNI is a set containing a username and a password (or a community string for SNMP), which are used to access remote assetsduring scanning.
Management of Storage logins
Each TNI 3 Storage may contain a set of logins for all 5 protocols: .Windows, SSH, SNMP, Telnet, VMWare
To display it, switch to the mode and click on the Sidebar.Edit (Ctrl + 6) All logins
By default, there are only two standard logins in this set:
Current user: login of the Windows user running TNI 3;public: public SNMP community.
The standard logins cannot be changed or deleted.
To create a new login for one of the protocols, click the button below that protocol's list.Add
When adding a new login, an should also be specified alias along with the username and password (or community string for SNMP). An aliasis a unique identifier that will be used when working with a particular login in TNI 3. Aliases enable adding logins with the same usernames.
The added login is displayed in its protocol's list.
To edit a username or password, click on its field in the list. To change an alias, double-click it.
You can specify the for each protocol by clicking the option button to the left of it. This login will be used when scanning assetsdefault loginfor which no logins have been specified explicitly.
Assigning logins to network nodes
If a network node is always scanned with the same login, it can be to it.assigned
To do this, select the asset in the Network tree, switch to the mode and click on the Sidebar.Edit (Ctrl + 6) Logins
All logins for the protocol that can be used to scan the selected asset will be shown. To assign one of them to the asset, click the small chain icon to the left of the alias. The icon and blue highlighting indicate that this login is assigned to the selected asset.linked chain
Any login can be assigned to several network nodes at once. To do this, select the nodes or their group in the Network tree and select theassigned login in the list.
Logins can be added and edited in the Scanner mode right before scanning. For details, see the Managing added tasks - Settinglogins section.
When remote assets are scanned for the first time, logins that successfully provided access are automatically assigned to them.
UsersViewing and editing users
Adding, deleting and renaming usersEditing user informationSearching users
Assigning users to assetsDisplaying information about assigned users
TNI 3 allows to store information about your network users: their photos, names, addresses, contact information etc.
During the network scan, this information can be automatically obtained from Active Directory entities and user account settings on networkcomputers. Furthermore, you can create a new user record manually.
Viewing and editing users
The information about users which has been extracted from a domain or created manually is stored in the currently opened Storage. If a useris created based on a local user account, its information will be stored in the inventory file of the asset where it has been found.
To manage users, switch to the mode and select the page from the Sidebar.Edit (Ctrl + 6) Users
The user list will show up on the left side of the main area, with the information about the selected user on the right side. The user list isdivided into categories by type: , and .Domain users Local users Added manually
The users of the currently selected asset are displayed in the category. This category is hidden if multiple assets are selected.Local users
Adding, deleting and renaming users
To create a new user, click Add (+) over the user list and enter the username.
To a user, click the to the right of the username in the list. To a user, double-click the username in the list.delete X rename
Only manually added users can be deleted or renamed.
Editing user information
After selecting a user in the list, you can see related information to the right: a photo, personal and contact info and addresses. Thisinformation can be edited.
You can upload an avatar or a photo here. To upload an image, click in the Photo group and browse to a or file. InAdd JPEG, BMP, GIF PNGthe next window, select the square area of any size in the image and click .Done
Searching users
To find a user in the list, enter the keyword in the field. The list will be filtered as you type, highlighting the text that matches theFind users
query.
query.
Assigning users to assets
Each asset in the Storage can be assigned to a single user. Each network asset is by default assigned to the local user that was logged intothe system during its first scan.
Any asset can be assigned one of its local users, any domain user, or any manually added user. Assigning a local asset user to another assetis not allowed.
To assign a user to an asset or several assets, select them in the Network tree and click the small icon next to the assigned user.chain
The indicates the assigned user.linked chain
Displaying information about assigned users
Information about the assigned user can be viewed in the mode (category ). Furthermore, the photo, full name andCommon reports Userscontact info of the user assigned to the selected asset can be .displayed in the Sidebar
Any user information field can be added as a column in the Table report (see the Creating a template section).
The search will be performed not only in user names but in all other information fields ( phone numbers, e-mail addresses ande.g.notes). After the search, when one of the users is selected, the matching text will be highlighted in the information area.
OptionsGeneralScannerReportsAlertsAuto-importLogon scriptScan schedulerActionsSNMPResident agent
The Options window can be opened by clicking the corresponding button in the right part of the main menu bar.
General
Check the online status of assets periodically: automatic pinging of network nodes every few seconds can be disabled.
Scanner
Settings that control the scanner's behavior and the .snapshot auto-deletion policy
Reports
Here, the are presented.settings for printable reports
Alerts
On this page, you can enable, disable and set up the individual alerts.
More on alerts.
Auto-import
The settings for automatic data import are available here. It may be used to import logon script scan results or periodically updated results of external network scans in cases where no access to these networks is available from the currentlocation. This page allows you to set up automatic import of data when the program starts or at regular
intervals.More on data import.
Logon script
This page serves as a tool for exporting the standalone scanner and for generating a command line for the .Logon script scan
Scan scheduler
Settings that control the scheduler, a list of scheduled scan tasks and their configuration tools are available here.
See .Scan scheduler
Actions
Choose the way in which the (available from the Action list Network tree context menus) behaves and access the editable custom actions file. Also, here you'll find a summary of all templates and keywords of the action definition syntax: click to copy or hover with your mouse to viewa hint.
See .Actions
The company title and logo printed into the header are part of the Storage properties.
SNMP
Enable or disable the full SNMP scan from this page. This mode allows to collect complete SNMP information from SNMP-enabled devices (i.e. perform an ). When this mode is disabled, only some basic information from the and sections is collected.SNMPWalk system interfaces
Also, you can add MIB files from your equipment vendors on this page. When an appropriate MIB file is added, you will be able to seemeaningful names for values instead of OIDs when viewing the information in the section. TNI supports automatic downloading ofSNMP treemissing dependency MIBs from a couple of online MIB databases.
Resident agent
Configure the resident agent for deployment to remote Windows computers or export it for manual installation from this page..More about the Resident agent here