Top Banner
1. Total Network Inventory Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1 Techpaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1.1 Scanning Microsoft Windows assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.2 Scanning Unix-based assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.1.3 Scanning other network assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.2 Collected information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.2.1 Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.2.2 OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.2.3 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.2.4 FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2.5 ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.2.6 Generic devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.3 FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 1.4 Feedback and support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 1.5 Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 1.6 Trial version limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 1.7 Installation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 1.8 User manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 1.8.1 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 1.8.1.1 Data import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 1.8.2 Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 1.8.3 Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 1.8.3.1 Selecting a node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 1.8.3.2 Altering the Storage structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 1.8.3.3 Information display settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 1.8.3.4 Searching in the Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 1.8.3.5 Storage assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 1.8.3.5.1 Working with assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 1.8.3.5.2 Description of assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 1.8.3.6 Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 1.8.3.7 Custom assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 1.8.3.8 Synchronization with Aсtive Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 1.8.4 Network scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 1.8.4.1 Adding scan tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 1.8.4.2 Managing added tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 1.8.4.3 Scan process and scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 1.8.4.4 Saving, importing and exporting tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 1.8.4.5 Scan scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 1.8.5 Scanning using agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 1.8.5.1 Manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 1.8.5.2 Logon script scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 1.8.5.3 Resident agent scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 1.8.6 Common reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 1.8.6.1 Building reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 1.8.6.2 Viewing information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 1.8.6.3 Printable reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 1.8.6.4 Additional features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 1.8.7 Table reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 1.8.7.1 Creating a template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 1.8.7.2 Template management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 1.8.8 Software asset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 1.8.8.1 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 1.8.8.2 Software management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 1.8.8.2.1 Browsing, searching and filtering software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 1.8.8.2.2 Inspecting a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 1.8.8.3 License management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 1.8.8.3.1 Creating a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 1.8.8.3.2 Sorting out auto-detected license keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 1.8.8.3.3 Licensing software installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 1.8.8.3.4 Editing a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 1.8.8.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 1.8.8.4.1 Report builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 1.8.9 Change log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 1.8.10 Storage properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 1.8.11 Network node properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 1.8.12 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 1.8.13 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 1.8.14 Custom fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 1.8.15 Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 1.8.16 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 1.8.17 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
131

Total Network Inventory Documentation - Total Software · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Mar 14, 2018

Download

Documents

Dang Thu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. Total Network Inventory Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.1 Techpaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.1 Scanning Microsoft Windows assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.1.2 Scanning Unix-based assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.1.3 Scanning other network assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.2 Collected information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.2.1 Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.2.2 OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121.2.3 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.2.4 FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141.2.5 ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151.2.6 Generic devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

1.3 FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171.4 Feedback and support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221.5 Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231.6 Trial version limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241.7 Installation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251.8 User manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

1.8.1 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301.8.1.1 Data import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

1.8.2 Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331.8.3 Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

1.8.3.1 Selecting a node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371.8.3.2 Altering the Storage structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391.8.3.3 Information display settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401.8.3.4 Searching in the Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411.8.3.5 Storage assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

1.8.3.5.1 Working with assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431.8.3.5.2 Description of assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

1.8.3.6 Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481.8.3.7 Custom assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511.8.3.8 Synchronization with Aсtive Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

1.8.4 Network scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571.8.4.1 Adding scan tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581.8.4.2 Managing added tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601.8.4.3 Scan process and scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641.8.4.4 Saving, importing and exporting tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661.8.4.5 Scan scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

1.8.5 Scanning using agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691.8.5.1 Manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701.8.5.2 Logon script scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721.8.5.3 Resident agent scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

1.8.6 Common reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761.8.6.1 Building reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771.8.6.2 Viewing information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791.8.6.3 Printable reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811.8.6.4 Additional features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

1.8.7 Table reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861.8.7.1 Creating a template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881.8.7.2 Template management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

1.8.8 Software asset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 941.8.8.1 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951.8.8.2 Software management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

1.8.8.2.1 Browsing, searching and filtering software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971.8.8.2.2 Inspecting a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

1.8.8.3 License management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041.8.8.3.1 Creating a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1061.8.8.3.2 Sorting out auto-detected license keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081.8.8.3.3 Licensing software installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091.8.8.3.4 Editing a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

1.8.8.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1131.8.8.4.1 Report builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

1.8.9 Change log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151.8.10 Storage properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1181.8.11 Network node properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191.8.12 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1211.8.13 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1231.8.14 Custom fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1251.8.15 Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1261.8.16 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281.8.17 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Total Network Inventory Documentation

Page 2: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Total Network Inventory DocumentationSearch this documentation Popular topics

Getting started 6

Softwaremanagement 6

Printable reports 4

Alerts 4

Snapshots 4

Licensemanagement 4

Change log 4

Viewing information 3

Storage properties 3

Selecting a node 3

Page 3: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

TechpaperList of termsMinimum system requirements for the admin unitDatabase mechanismScan technology

List of terms

TNI 3: stands for and represents its name and trademark.Total Network Inventory 3

Admin unit (main unit): a GUI application operated by the user. It's installed on a workstation or a server computer and is used for gatheringinventory information, viewing it and including into reports.

Scanning: a process of obtaining information on hardware and software from computers and other devices.

Storage: application's database.

Minimum system requirements for the admin unit

CPU 1000 MHz

RAM 512 MB

HDD space 30 MB + 0,35 MB per stored asset

Network TCP/IP

OS Windows XP Professional SP3 / Windows Server 2003 SP2

Screen 1280x1024

Database mechanism

The TNI 3 database (a.k.a the ) is a folder created by the user on a hard drive. Each inventoried asset is represented in it as aStorageseparate file of specific format. Auxiliary data is stored separately from the asset files and includes , logins and passwords foruser informationremote access, etc. All data is compressed and encrypted.

It's possible to create several separate storages and switch between them at any time. Asset-related data can be copied to another storageby copying the corresponding file.

Scan technology

Scanning Microsoft Windows assetsScanning Unix-based assetsScanning other network assets

Page 4: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3. 4. 5.

Scanning Microsoft Windows assetsTechnologyRemote scanning via the SMB protocol

How it worksRequirements for the target machine

Remote scanning via the RPC protocolHow it worksDisadvantagesRequirements for the target machine

Manual scanningHow it worksAdditionallyRequirements for the target machine

Scanning overheadLow-level hardware scan

Technology

Windows Management Instrumentation (WMI) is Microsoft's implementation of (WBEM) standard forWeb-Based Enterprise ManagementWindows operating systems.

Using WMI technology, TNI 3 obtains software and hardware information, as well as computer registry data.

There are three methods for scanning Windows-based computers.

Remote scanning via the SMB protocol

How it worksExecutable (an agent) is uploaded to the administrator's shared folder on a remote computer.tniwinagent.exe admin$TNI's main unit connects to the Service manager on the target PC, installs the agent as a service and starts it.The agent collects information and saves it into a compressed file. Then it stops.The main unit imports the resulting file into the storage.The agent service is uninstalled, and the executable is deleted.

Requirements for the target machine

CPU 500 MHz

RAM 64 MB

HDD space 10 MB

TCP ports 445, 139

Services ServerWindows Management Instrumentation (WMI)Remote Procedure Call (RPC)Remote Registry

WMI service is pre-installed on Windows 2000 and higher. For Windows NT, Windows 95 and Windows 98 it is available fordownload from the Microsoft website.

Manual scanning is the only way to collect information from computers running Windows XP Home Edition. This OS cannot beaccessed remotely due to its limitations. Any connection attempt will result in the Access denied error.

No traces of scanning will remain on the target PC after the scan is complete.

Page 5: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

1.

2.

Resources ipc$admin$

Protocols SMBNetBIOS (for Windows NT4)TCP/IP

Windows versions XP Pro, Vista, 7, 8, 8.1, 10, Server 2003/2008/2012(incl R2)/2016

Remote scanning via the RPC protocol

How it works

TNI's main unit connects directly to the WMI service on the target PC via the RPC protocol and collects information remotely.

Disadvantages

Significant traffic is generated.The scanning speed depends on the connection quality.All data processing is performed by the main unit. This considerably increases the consumption of system resources when scanninglarge networks.

Requirements for the target machine

CPU 500 MHz

RAM 64 MB

HDD space 10 MB

TCP ports 135 and random ports above 1024

Services Windows Management Instrumentation (WMI)Remote procedure call (RPC)

Protocols RPCTCP/IP

Windows version 2000, XP Pro, Vista, 7, 8, 8.1, 10, Server 2000/2003/2008/2012(incl R2)/2016

Manual scanning

How it works

Executable (an agent) is copied to the target computer and launched. , tniwinagent.exe manually When the scanning is complete theagent creates a file containing the collected information.The resulting file must be moved to the TNI 3 storage.

Additionally

The agent can be run by a domain logon script, by the task scheduler or on Windows startup.

Command line parameters of the agent tniwinagent.exe:

/path:"\\server\share" allows to set a path to a folder where the data file will be placed;/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;

This method has no advantage over the scanning via SMB. It is recommended for use only when, for whatever reason, the SMBprotocol can't be used.

Page 6: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;/overwrite overwrites the data file in case the target folder already contains its older version.

See the Manual scan section for details.

Requirements for the target machine

CPU 500 MHz

RAM 64 MB

HDD space 10 MB

Services Windows Management Instrumentation (WMI)

Windows version XP Home/Pro, Vista, 7, 8, 8.1, 10, Server 2003/2008/2012(incl R2)/2016

Scanning overhead

All scanning methods require CPU time and execution of a variety of disk operations, which is why an insignificant loss of efficiency may occurwhile scanning a computer. Scanning usually takes 1-2 minutes.

Online scanning methods (on demand) generate network traffic:

Method To remote computer(upload)

From remote computer(download)

SMB 1.8 MB 0.05-0.1 MB

RPC 10 MB 18 MB

Numbers in the table represent average values including service data size (i.e. packet headers, etc.).

High traffic during RPC scanning is a result of WMI's collection of data from the registry, and it depends on the number of applications andservices installed on the remote computer.

Low-level hardware scan

In the manual scan mode, as well as during remote scanning via the SMB protocol, TNI installs a third-party driver to collect low level hardware details, such as memory SPD data, HDD S.M.A.R.T. data, etc. In the normal mode, the driver is installed and uninstalled each time thescan is run, which only takes a fraction of a second.

There's a known issue with the Intel storage driver ( ). A bug in this driver causes a BSOD during low-level disk subsystem scanning.iastor.sysA workaround has been implemented for this: TNI skips low-level disk scanning when the driver is detected. This behaviour can be changedin the program settings or using command-line switches in the standalone agent.

Page 7: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2.

3. 4.

5.

1.

2.

Scanning Unix-based assetsTechnologyRemote scanning via the SSH protocolManual scanning

Technology

Computers based on operating systems are scanned by . An agent is an executable uploaded viaOS X, Linux, FreeBSD, and ESX/ESXi agentsthe SSH and SCP/SFTP protocols to a remote computer and gathers information about its hardware and software using the operating systemutilities.

The SSH protocol enables exchanging data between two hosts using a secure channel. Currently, there are 2 versions of this protocol: SSH-1and SSH-2. TNI 3 uses SSH-2 for scanning. Most modern UNIX systems allow use of this protocol.

The and protocols are used for file transfers through a secure channel between two hosts. They are components of most modernSCP SFTP SSH servers. TNI 3 supports both of these protocols.

Remote scanning via the SSH protocol

How it works:

TNI 3 connects to the remote computer via the SSH protocol.A temporary folder is created in the remote user's home folder. The agent is uploaded there using either the SFTP or the SCPthenprotocol.The scanning agent is run and creates a file with gathered information upon completion of its work.A file containing computer information is then transferred via the SFTP or SCP protocol back to TNI 3 and added to the openedstorage.The temporary folder containing the agent and the created file is deleted.

Before starting a scan one should make sure that:

the remote computer runs an SSH-2 server (on TCP port 22) that supports SFTP or SCP, and firewall allows access to it;the remote user is allowed to access the SSH-server (the option). If scanning is done under the user, the AllowUsers root PermitRoot

option should be set to ;Login yesthe remote user must have administrative privileges (for Linux: be in the list if the user is other than ).sudoers root

The operating system should provide the agent with a number of utilities so it can collect all needed data from the computer. The list ofutilities depends on the operating system configuration. If one of the utilities is not installed on the scanned computer, a message will bedisplayed in the appropriate category of the Common reports view.

Furthermore, the operating system should be able to provide standard C++ library .libstdc++.so.6

Manual scanning

How it works:

Executable tniwinagent.exe (an agent) is copied to the target computer and launched. When the scanning is complete, manually the.agent creates a file containing the collected information

The resulting file must be moved to the TNI 3 storage.

See the Manual scan section for details.

An approximate list of utilities needed to collect the data on a Linux-based computer: arch, cd-info, df, dmidecode, dpkg-query /emerge / pacman / pkgtool / rpm, get-edid, hdparm, head, ifconfig, iptables, iptables-save, ls, lspci (pciconf for FreeBSD), lsusb,ps, pvdisplay, pvscan, route, rpm, swapon, uname.

Page 8: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Scanning other network assetsTechnologyScanning SNMP devicesScanning Telnet devices

Technology

Many network assets are not covered by the SMB/RPC/SSH protocols. These are the assets that either don't run Windows or Unix-basedoperating systems, or run unsupported systems, or run simple Unix-based systems without the SSH interface. These could include networkprinters, managed switches, routers, xDSL modems, IP phones, wireless access points, etc. Most often these devices support either or SNMP

or sometimes both, and in such cases they can be scanned by TNI using these protocols.Telnet

Scanning SNMP devices

TNI considers any devices that could not been scanned via other protocols as potentially SNMP-compatible, therefore, it tries to scan themusing SNMP, if it's allowed by the scanner settings. By default, when the community is specified, it tries several well-knownpubliccommunities until it succeeds:

adminciscomngtprivatepublicsnmpd

Scanning Telnet devices

If a Telnet login is specified, TNI checks if TCP port 23 is open. If positive, TNI will try to scan the device using the Telnet protocol.

Currently TNI supports Telnet scanning for the following systems: BusyBox.

Page 9: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Collected informationThis section contains an overview of information collected by TNI 3 from various types of assets:

WindowsOS XLinuxFreeBSDESXiGeneric devices

Page 10: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

WindowsHardwareSoftwareOther

Here you can see an overview of data collected from OS assets.Windows

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Hardware

SystemComputer parameters, chassis, motherboard (including chipset), BIOS.System slots, memory slots, ports.

CPUName and manufacturer, clock speed, socket designation, code name, TDP, number of cores, cache memory, etc.

System memoryGeneral information on physical memory, virtual memory and paging files. Number and availability of memory slots. Memody modules: capacity, manufacturer, type, speed, form-factor, serial number, manufacture date, etc.

Video systemVideo adapters: name and manufacturer, chipset, video memory, current video mode, drivers.Monitors: name/model, manufacturer, manufacture date, serial number, image size and diagonal, picture aspect ratio,video input, etc.

Audio systemName and manufacturer of the sound device, driver version and date.

Storage detailsHard disk drives and removable media: model and manufacturer, interface, media type (HDD/SSD/removable), size,serial number, S.M.A.R.T. data (where available).CD drives: model and manufacturer, device type, read/write support.Floppy-disk drivesLogical partitions: disk letter, drive and media type, file system, size, free/used, serial number, etc.

NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, type, connection status, DHCP,host name, etc.Modem: name, provider, port, type, etc..

Peripheral devicesPrinters (including virtual printers): name and manufacturer, paper size, driver, status, resolution, port, attributes, etc.Network printers: source name, server, user account.Keyboards: manufacturer, layout, number of keys.Mice and other pointing devices: manufacturer, interface, number of buttons.USB devices: all USB devices with USB version, driver manufacturer and version, serial number (where available).

DevicesThe full list of devices divided into classes. It duplicates the data structure of Windows device manager.

Software

Operating systemName, version, architecture, registered user, install date, country code, locale.OS type, product key, suite, SKU, supply channel.Internet Explorer version, DirectX version, etc.

Installed softwareName, publisher, version, install date and source, uninstall string.For Microsoft Office products (including Project and Visio): service pack, product ID, product key, supply channel.

System updatesID, description, comments, Service pack version, install date and user name.

SecurityAntivirus, firewall, antispyware status.Auto-updates status.Antivirus, , : name, publisher, version, status. firewall antispyware

Directory list in the Program files folderDatabases

Detected database servers (if any): MS SQL Server (including edition), MySQL, PostgreSQL, Oracle Database, Firebird.Audio and video codecs

Name, manufacturer, version, description.Virtual machines

For discovered VMware Workstation virtual machines: ID, guest OS type, total size, storage size, state, config file,hardware compatibility, memory, processors, HDD details, CD/DVD details, network adapter details.

Other

Page 11: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

System and user environment variablesShared resources: disk drives, print queue, IPC admin, etc.

Name, type, path, comments.Autorun applications

Application name, startup string, user account, location.Services: file system drivers, kernel drivers, own and shared processes

Name, service name, executable, startup type, status, logon as...Processes

Name, command line, executable path, started on, threads number.User accounts

Name, full name, domain, description, activity, attributes.

Page 12: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

OS XHardwareSoftwareOther

Here you can see an overview of data from collected OS X assets.

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Hardware

SystemComputer p and chassis, memory slots.arametersPower supply settings.

CPUName, clock speed, number of cores, cache memory, etc.

System memoryPhysical memory size.RAM units: capacity, manufacturer, type, speed, etc.

Video systemVideo adapters: name, video memory.Monitors: name and manufacturer, size and image size, picture aspect ratio, video input, etc.

Storage detailsHard disk drives and removable media: model and manufacturer, interface, size, number of partitions, serial number.CD drives: model.Logical partitions: label, file system, size, free/used, mount point.

NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.

Peripheral devicesPrinters: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.USB devices: name and manufacturer, version, speed.

Software

Operating systemVersion, architecture, update, kernel, run time.

SoftwareVersion, install date, location, execution environment, properties.

SecurityFirewall status.

Other

Environment variablesProcesses

Name, command line, process and parent process ID, user account.User accounts

Name, full name, ID, home directory, shell.

Page 13: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

LinuxHardwareSoftwareOther

Here you can see an overview of data collected from OS assets.Linux

This list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describingwhich data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.

Hardware

SystemComputer p , motherboard and BIOS, memory slots, ports.arameters

CPUName and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.

System memoryPhysical memory size and swap partition.RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.

Video systemVideo adapters: name and manufacturer, video memory.Monitors: name and manufacturer, image size and diagonal, picture aspect ratio, video input, etc.

Storage detailsHard disk drives and removable media: model, interface, number of partitions, size, serial number.CD drives: model and manufacturer, location, availability, media support, features.Logical partitions: label, file system, size, free/used, mount point.

NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.List of DNS-servers.

Peripheral devicesPrinters: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.USB devices: name and manufacturer, speed.

DevicesDevices divided into types; their names and flags.

Software

Operating systemName, architecture, code name, description, kernel, run time.

SoftwareSoftware divided into groups.Name, package name, version, source, URL.

SecurityFirewall rules presented as a h .ierarchy

Virtual machinesFor discovered VMware Workstation for Linux, VMware ESX, and KVM (only partial information is collected): ID,s KVMguest OS type, total size, storage size, state, config file, hardware compatibility, memory, processors, HDD details,CD/DVD details, network adapter details.

Other

Environment variablesProcesses

Name, command line, process ID and parent process ID, user account.User accounts

Name, full name, ID, group, home directory, shell.

Page 14: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

FreeBSDHardwareSoftwareOther

Here you can see an overview of data collected from OS assets.FreeBSD

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describingwhich data could not be collected and ways to fix the problem will be included into the report in the mode.Common reports

Hardware

SystemComputer parameters, motherboard and BIOS, memory slots, ports.

CPUName and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.

System memoryPhysical memory size and swap partition.RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.

Storage detailsHard disk drives and removable media: model, interface, number of partitions, size, serial number.CD drives: model and manufacturer, location, availability, media support, features.Logical partitions: label, file system, size, free/used, mount point.

NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.List of DNS-servers.

DevicesDevices divided into types; their names, vendors and classes.

Software

Operating systemName, architecture, kernel, uptime.

SoftwareSoftware divided into groups.Name, version, description (properties).

Other

Environment variablesProcesses

Name, command line, process ID and parent process ID, user account.User accounts

Name, full name, ID, group, home directory, shell.

Page 15: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

ESXiHardwareSoftwareOther

Here you can see an overview of data collected from VMware ESXi assets.

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describingwhich data could not be collected and ways to fix the problem will be included into the report in the mode.Common reports

Hardware

SystemComputer parameters, motherboard and BIOS, memory slots.

CPUName and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.

System memoryPhysical memory size.RAM units: capacity, type, form-factor, bank label, locator.

Storage detailsHard disk drives: model, interface, number of partitions, size, firmware revision.Logical partitions: label, file system, size, free/used, mount point.

NetworkNetwork adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.

Peripheral devicesUSB devices: name and manufacturer, speed.

DevicesDevices divided into types; their names and flags.

Software

Operating systemName, architecture, description, uptime.

SoftwareName, publisher, version, install date.

SecurityFirewall rules.

Virtual machinesID, guest OS type, total size, storage size, state, config file, hardware compatibility, description, memory, processors,HDD details, CD/DVD details, network adapter details.

Other

Environment variablesProcesses

Name, command line, process ID.User accounts

Name, full name, ID, group, home directory, shell.

ESX is a far more generic Linux system compared to ESXi, and it's scanned by the same Linux agent as other Linux systems. That'swhy you can find the list of data collected from ESX systems in the Linux section.

Page 16: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Generic devicesSNMPTelnet

Here you can see an overview of data collected from generic assets via the SNMP and Telnet protocols.

SNMP

General informationIP address, MAC address, network name.

SystemAsset name, description, object ID, uptime, contact, location, service list.

Network interfacesName, manufacturer, MAC address, interface type, speed, MTU, administrative state, operational state.

Telnet

General informationIP address, MAC address, network name.

SystemUptime.

ProcessorName, system type.

System memoryTotal/free memory, swap partition size.

NetworkNetwork interfaces: name, manufacturer, MAC address, IP address, IP subnet, BSD device name, type.List of DNS servers.ARP table.

SecurityFirewall rules presented as a hierarchy.

Page 17: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

FAQGeneral questions

InstallationBackup and restore

Scan questionsAccess is deniedRPC server is unavailablePort numbersTCP/IP security limitNo network provider accepted the given network pathCall was canceled by the message filterDomain logon scanWindows 95/98/NT scan

Program usage questionsNetwork tree selectionList of computers with particular softwareNo antivirus installed

General questions

Installation

Q: Should I install the program on a server or on a workstation?

A: Both a server and a workstation can run Total Network Inventory 3. It’s just a matter of usage convenience, because it's not aclient-server application, and you need to have access to the graphical console of the computer it's installed on, either directly or by using aremote desktop utility. , if you run it under the domain admin account, you’ll be able to scan all computers as "current user" –Howeverotherwise you’d need to explicitly.specify domain admin credentials

However, take note that if you install the program on Windows XP SP2/SP3 or Vista SP0/SP1 and there are a lot of scan threads launchingsimultaneously, there may be issues with connections to remote computers. This is caused by a restriction on the maximum number of TCPhalf-open connections (connection attempts, socket state) existing in the aforementioned Windows versions, which doesn't allowSYN_SENTfor more than 10 outbound connections to be in this state at a time. After reaching this limit, all other connections in the system (includingthose executed by this program) are queued and may reach their timeout, thus producing inconsistent results. This issue is also known as the

issue, because reaching the limitation produces a record in the System Event Log with EventID . Windows Vista SP2,Event 4226 4226Windows 7 and newer, and all Windows Server systems don't have this limitation. Thus, in the general case, we recommend to install theprogram on server systems or modern desktops.

Backup and restore

Q: How to backup/restore the Storage or move the program to another computer?

A: The is located in a separate folder (file system directory). It can be located by right-clicking the storage root group and selecting Storage S. Then go up how in Explorer one level and copy/archive the whole storage folder.

Program settings can be backed up by copying/archiving a folder entitled in your account's folderTotal Network Inventory 3 Application Data(referred to by environment variable), if you chose during the program installation. If you chose ,%APPDATA% Install for me Install for allthe settings are stored in " " (Windows 2000/XP/2003) or "С:\Documents and Settings\All Users\Application Data\Total Network Inventory 3 C:

" (Windows Vista/7/8/10/2008/2012). You can also find this folder by clicking in\ProgramData\Total Network Inventory 3 Open tasks folderthe tab or in the tab and then going up one level.Scanner Open templates folder Table reports

To restore the program, install it on another computer (but don't run it) and extract your backed-up settings to the Total Network Inventory 3 folder in the folder for your profile or all users, depending on your choice during the installation (after the installation, thisApplication Datafolder is locally: for instance,automatically created and contains one file: config.ini). Also, extract the storage folder to . ThenMy Documentsrun the program and browse to the storage folder when prompted (if its location differs from the path stored in previous settings).

Scan questions

Access is denied

Q: How do I deal with the errors "Access is denied" or "Unknown user name or bad password"?

A: These errors can occur for several reasons:

Username or password are specified incorrectly.

Check your username and password.

The specified user account does not have administrator rights on the remote machine.

Page 18: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

You need to have administrator access to remote computers to be able to scan them (local administrator or domain administratorrights). If you have logged on as domain administrator or remote computers have the same name and password for the localadministrator account as your account, you can use the scan option. Otherwise specify the user name in full format: Current user DO

.MAIN\Administrator

Blank password.

Remote administrator access with blank password is not allowed starting with Windows XP.

The scanned computer has Windows XP Home Edition installed.

This version of Windows cannot be scanned remotely. It’s an OS limitation, and the error will be displayed at all times.Access deniedHowever, it’s possible to scan XP Home locally by running the standalone audit tool (located in the program'stniwinagent.exeinstallation folder) on that machine. It’ll generate an file with scan results, which should be copied to the program's storage (it.invwill be imported upon TNI’s next launch or immediately, if TNI is running) or imported by using the main menu or anyStoragegroup's context menu.

Computers are not in domain and have default settings.

Workstations running Windows XP, Vista or later client versions and not connected to a domain don't allow the local administrator toauthenticate as himself by default. Instead, the ForceGuest policy is used, which means that all remote connections are mapped tothe Guest account. But again, the administrator rights are required for running the scan. Thus, you need to update the securitypolicy on each computer using one of the following ways:

Run , expand , locate the secpol.msc Local policies / Security options Network access: Sharing and security model for local policy and change its value from to .accounts Guest Classic

Disable the option in File Explorer’s Folder Options.Use simple file sharingModify the registry: set the value, located in the "forceguest HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa" key, to zero.

For Windows an additional step should be taken: it concerns the (UAC). Itclient versions starting with Vista, User Account Controlrestricts administrator rights for remote logons in certain cases. You should either disable UAC or make changes to the registry:create a parameter (name: ; value: ) in the "DWORD LocalAccountTokenFilterPolicy 1 HKLM\SOFTWARE\Microsoft\Windows\CurrentV

" key A reboot may be required.ersion\Policies\system (source).

You can modify both settings easily by running a file with the following contents on such computers (omit the last two lines for.regWindows XP):

Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]"forceguest"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system]"LocalAccountTokenFilterPolicy"=dword:00000001

RPC server is unavailable

Q: How do I deal with the error "RPC server is unavailable"?

A: This error may be caused by one of the following reasons:

onnection is blocked by a firewall (Windows Firewall or third party firewall).The c

Try temporarily disabling the firewall on the remote computer. If the target computer runs on Windows XP SP2/SP3, Vista or 7, seethe .question regarding the Windows Firewall setup

The target computer does not have the Windows Management Instrumentation service installed.

According to the Microsoft documentation:

"WMI is preinstalled in Windows 7, Windows Vista, Windows Server 2008, Windows Server 2003, Windows XP, Windows Me, andWindows 2000. Windows NT Workstation 4.0 SP4 and later: WMI is available through "Add/Remove Windows components" in Control Panel, asWBEM option install. A later, more comprehensive, version is available as an Internet download from http://www.microsoft.com/downloads. See "WMI CORE 1.5 (Windows 95/98/NT 4.0)".Windows 98/95: WMI CORE 1.5 (Windows 95/98/NT 4.0) is available as an Internet download from http://www.microsoft.com/downloads. This download requires Microsoft Internet Explorer version 5 or later."

Additional information about scanning the Windows computers using WMI

The target computer is offline or the IP address may not be occupied at all (when scanning by IP's and if the ICMP ping option is

disabled).

Remote interrogation of Windows 98/95 computers is supported partially, because problems with DCOM authentication may occur.The solution is to run a local scan (manual or autostart) with the help of the standalone audit tool ( ).tniwinagent.exe

Page 19: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2.

3.

disabled).

The Windows Browser service updates the computer list every 12 minutes, so a computer can go offline, but remain visible in MyNetwork Places. However, in this case you are more likely to get the status. But if the ICMP protocol (ping, echo) is notPing failedallowed in your network, you might want to disable pinging in . After this, you will be able to scanOptions Scanner Use ICMP ping– –online hosts which don't respond to pings, but all offline hosts (and also unoccupied IP addresses) will show the status,RPC errorand thus it will slow down the scanning of large IP groups or ranges.

Wrong DNS record.

If you scan the computer by name, it could be resolved to an invalid or not existing (unoccupied) IP address due to problems withDNS or WINS. If you scan the computer by IP address, you are likely to receive Ping failed, but if pinging before scanning isdisabled, you will receive the RPC error when scanning an offline or unoccupied address (see the previous point). A TNI user hasencountered this problem and described it on our forum: http://www.softinventive.com/forum/index.php?showtopic=428

The target host is not a computer, or it runs an operating system other than Windows when scanning via the RPC protocol.

If the scanned name or IP address belongs to a network device which can be pinged, but is not a Windows computer (NIX-computer,network printer, router, managed switch, type library, IP phone, firewall, thin client, etc.), it cannot be scanned via the RPC protocoland shows this error. However, the program tries to scan this host via other protocols (SMB, SSH and SNMP), and the scan resultmay vary depending on the settings for these protocols and the nature of the scanned network host.

Port numbers

Q: How can I find out which port numbers are used by TNI, so I can configure the firewall?

A: By default, TNI uses the SMB protocol to scan Windows computers. It can be allowed by enabling the exception inFile and Printer Sharingthe Windows Firewall or in other firewalls. You could also enable (NetBIOS) for older systems.TCP port 445 TCP port 139

Also, TNI uses the RPC protocol to scan Windows computers (direct WMI connection) if SMB fails. To allow remote RPC connections, youshould either disable Windows Firewall or set it up in the following way:

Use the following netsh firewall command in the command prompt: for Windows XPnetsh firewall set service RemoteAdmin enable or for Windows Vista/7 or newer;netsh advfirewall firewall set rule group="remote admin" new enable=YesUse the Group Policy editor: Group Policy editor (gpedit.msc) -> Local Computer Policy -> Computer Configuration -> AdministrativeTemplates -> Network -> Network Connections -> Windows Firewall -> Domain Profile or Standard Profile -> Windows Firewall:

.Allow remote administration exception -> Action -> Properties -> Enable

TCP/IP security limit

Q: How do I deal with the following warning "TCP/IP has reached the security limit imposed on the number of concurrent TCP connectattempts"?

A: This warning may appear when you run the network scan under Windows XP SP2/SP3 or Windows Vista SP0/SP1 with port scan enabled.In these operating systems a controversial limitation of not more than 10 concurrent TCP connect attempts ("half-open connections") hasbeen introduced by Microsoft to reduce the speed with which malicious software spreads over the networks. You can find more information in

. When you see this message in the scanner log, it means that the program detects that some computers have no openthis Microsoft articleports and there is an event with (source: ) in the system Event Log with the same message. As a consequence of reaching theID 4226 Tcpipaforementioned limitation, the program cannot reliably detect whether ports on computers are open or not. That's why the program starts toignore the port scan results and connects to all computers using all selected protocols to provide successful scans. This policy remains activeduring the current session, that is, until the next program restart. To avoid this warning you can do the following:

Disable the option in the Scanner settings. Note that this will decrease the network scan performance;Scan portsPatch your system using the widely known or (based on the former). However, note that this is illegalpatch by LvlLord this patchaccording to the Windows EULA;Run TNI on the system which is not affected by this limitation: Windows Server 2000/2003/2008, Windows 2000, Vista SP2 orWindows 7.

No network provider accepted the given network path

Q: How to fix the error "No network provider accepted the given network path"?

A: Take the following steps:

Make sure that you can ping the remote computer by network name;Make sure that the exception is enabled in the Windows Firewall (or that NetBIOS is allowed in any other File and Printer Sharing firewall), or the firewall is disabled;Make sure that both and are enabled in the propertiesClient for Microsoft Networks File and Printer Sharing For Microsoft Networks

of the network connection on the remote computer;

Windows Firewall in Vista, 7 or newer has a special exception entitled which can "Windows Management Instrumentation (WMI)",be enabled and thus save you from the necessity of setting up the policies manually.

Page 20: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

3.

4.

5.

6.

1.

2.

3. 4. 5.

1.

2.

3.

4. 5.

6.

of the network connection on the remote computer;Make sure that the setting in the properties of the network connection ( NetBIOS over TCP/IP Internet Protocol Version 4 Properties–

) is set to Default or and that the is set to and started; Advanced WINS– – Enabled TCP/IP NetBIOS Helper service Automatic Make sure that the security policy ( )Network security: LAN Manager authentication level secpol.msc–Local Policies Security Options–is set to (option #1) or (optionSend LM & NTLM responses Send LM & NTLM responses use NTLMv2 session security if negotiated–#2);Run .sfc /scannow

Call was canceled by the message filter

Q: How to fix the error "Call was canceled by the message filter"?

A: Take the following steps:

Run on the remote computer and make sure that the service is set to services.msc Windows Management Instrumentation Automaticand started;

Make sure that is enabled: run , select , right-click, choose DCOM dcomcnfg Component Services Computers My Computer– – Properti, open the tab and make sure that is on;es Default Properties Enable Distributed COM on this computer

Restart the remote computer;Run from Microsoft;WMI diagnosis utilityFollow to repair WMI on the remote computer.these tips

Domain logon scan

Q: How do I set up the program to scan computers when users log on to a domain?

A: This is a shortened guide. The full version of this guide is available .here

Copy the standalone scan agent located in the program’s installation directory to a shared folder on your file servertniwinagent.exeaccessible to all users with read-only access. For this, open the window, then open the page, press the Options Logon script Export

button and specify the folder to export to. This action will also fill the field. It should be a UNCstandalone scanner Path to agentpath (a network path starting with double backslash).Create and share a folder on your file server. This will be the folder where the scan agent will save thewith write access for all users scan results. Note: instead of creating a separate folder (most secure), you can share an empty folder inside the TNI 3 storage(secure) or the storage root folder (least secure) with write access for all users.In specify a path to the folder where the agent should save the files (the folder from step 2).Options – Logon script – Save pathThis should also be a UNC path. Specify other options if necessary (such as and ).Delay before scan start Overwrite existing filesCopy the auto-generated command using the button.Copy the commandIf you already have a logon script for your domain, a particular Organizational Unit or a single user, paste the command you’vecopied earlier to this script and save it. Otherwise, refer to the full version of this guide.In the main window of Total Network Inventory 3 press , open the page and specify the path to the folder withOptions Auto-importthe inventory files in the field. You can import new data right now or set the settings to import on startup or setImport data paththe timer. Each time you want to update the information manually, open and click . Also, you canOptions – Auto-import Import nowdelete files after importing or import from subfolders (in case each OU has its own logon script which runs the scanner with differentparameters to save results in different folders). If you chose to share a folder in the storage or the whole storage folder, you don’tneed to set up Auto-import. The scan results will be automatically imported as you run the program and it opens the storage, orimmediately, if the program is already running.

Resources to read:Logon script scanStandalone agent's command-line parametersData importLogon scripts FAQCreating logon scripts

Windows 95/98/NT scan

Q: Is it possible to scan Windows 95/98/NT machines?

A: It's possible, however these systems can only be scanned remotely (via the RPC protocol). First of all, you should install corMicrosoft WMIe components for Windows 95/98/NT. (Windows 95/98/NT 4.0) is available as an Internet download from WMI CORE 1.5 http://www.micros

. oft.com/downloads

Then place a link to into the startup folder and reboot, or run the file manually. \WINDOWS\SYSTEM\WBEM\WinMgmt.exe

Additionaly, in order to perform the remote online scan, you need to run a registry file ( ) with the following content on a Windows 95/98*.regmachine:

REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\OLE]"EnableDCOM"="Y""EnableRemoteConnect"="Y" 

Page 21: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

[HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM]"SetupForDCOM"="1""AutostartWin9X"="2""EnableAnonConnections"="1"

Alternatively, you may change these values manually. Rebooting is advised. After this, you should be able to connect remotely using anycredentials or as current user.

Program usage questions

Network tree selection

Q: I have selected several assets in a network tree, but the report shows only one. Why?

A: In TNI 3 the Network tree has two node selection modes: and . To build a report for several nodes, either select a groupsingle multiple(the report will be built for all assets in this group and all subgroups) or enable multiple selection by ticking the Multiple selection checkbox over the tree — checkboxes will appear in front of each node. Rectangular selection (as well as selection using or ) is not used forCtrl Shiftbuilding reports and is used for working with the nodes in the tree (drag'n'drop moving, deleting, etc). For more details, see Selecting a node.

List of computers with particular software

Q: How to get a list of computers which have particular software installed?

A: Go to the tab, use the bar and filters to find the necessary software and select it to display a list of computersSoftware accounting Searchit's installed on (in the details area on the page). You can select the items in the list and copy or export them, or click the Installations Install

link to get a printable report.ations summary

No antivirus installed

Q: Why does the program show that no antivirus (or firewall, or antispyware) is installed?

A: TNI 3 can recognize all antiviruses and firewalls (in Windows XP SP2/SP3, Windows Vista, 7, and 8) and antispyware (only in WindowsVista, 7, and 8) that support (previously known as Windows Security Center), that is, if they are displayed by theWindows Action CenterAction Center. The vendors of antivirus (firewall and antispyware) software should provide this support from their side, because they have topublish the product information and status to the system in a special way. Otherwise neither our product, nor Windows itself can recognizesuch software (in this case Windows Action Center should usually generate a message from time to time that the computer is not protectedby antivirus/firewall/antispyware).Unfortunately, even with the support from the side of the security products, this does not work on Windows 2000 and earlier and also on allWindows Server systems, because they don't have Action Center, that is they don't provide an interface for these products to publish theirstatus to the system and thus to other applications.We are going to add support for direct detection of the most popular products without dependency on the Action Center interface in thefuture versions of our program.

Please note that support for Windows 95/98/NT is provided "AS IS", because Microsoft has officially stopped supporting theseoperating systems.

Page 22: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Feedback and supportSending feedback from the softwareSupport page on the Softinventive Lab websiteE-mail supportOnline supportSocial networks

Please contact us if:

You've found a bug in our program — we'll fix it!You'd like to see new functions added — describe the situations they can help you in.You dislike something about our program — tell us how to improve it.You like something about our program — it's important for us to know, what exactly!You have any technical or financial questions — our answer will be fast, polite and clear.

Your feedback is very important to us, your comments define the ways we improve our software. We'd be grateful for any message!

Sending feedback from the software

The button in the top right corner of TNI's window opens the quick feedback form. Feedback

Don’t forget to include your name and email address otherwise we won’t be able to reply to you.—

Support page on the Softinventive Lab website

Welcome: www.softinventive.com/support/

E-mail support

Technical support: [email protected] questions: [email protected] questions: [email protected]

Online support

You can rely on our assistance whenever you need it. Our technicians can be contacted via instant messengers.

softinventive

Social networks

Follow us online!

softinventive.lab

@Softinventive

Page 23: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

UpdatesTNI 3 updates regularly. To make sure that you have the latest version, use the / option from the main menu.Help Check for updatesFurthermore, the program automatically checks for updates on launch, but no more than once a day.

If an update is found, you'll see a list of changes in the new version. Click , and after the download is complete. TheStart download Install updateprogram will be closed and restarted after the update has been applied.

Page 24: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

Trial version limitationsTotal Network Inventory is distributed as .shareware

The evaluation version of has Total Network Inventory 3 limitations:

The program only works for after its first launch on a computer.60 daysThe maximum number of computers (network nodes) allowed to scan and manage is limited by 50 nodes.Reports created by the program can be exported and printed, but certain fields are randomly substituted with the phrase TRIAL VERSION.

Page 25: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Installation instructionsRun the Total Network Inventory installer

After clicking the download link, save the file and run it.tni-setup.exe

In Google Chrome

Once the download is finished, click the file at the bottom of the browser.

In Mozilla Firefox

In MS Internet Explorer

Install the software

Tell Windows it's OK to run the file:

Page 26: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

And once again:

Then follow the instructions as the installer guides you through the process:

Page 27: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Begin working with Total Network Inventory

To get familiar with the software, see .our documentation

Uninstallation instructions

Total Network Inventory can be uninstalled using standard Windows tools.

For example, from its start menu group:

Page 28: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

User manual

StorageData import

Workspace

Network treeSelecting a nodeAltering the Storage structureInformation display settingsSearching in the Network treeStorage assistants

Working with assistantsDescription of assistants

ActionsCustom assetsSynchronization with Aсtive Directory

Network scanningAdding scan tasksManaging added tasksScan process and scan resultsSaving, importing and exporting tasksScan scheduler

Scanning using agentsManual scanLogon script scanResident agent scan

Common reportsBuilding reportsViewing informationPrintable reportsAdditional features

Table reportsCreating a templateTemplate management

Software asset managementGetting startedSoftware management

Browsing, searching and filtering softwareInspecting a software item

Tracking software installationsMerging software items

License managementCreating a licenseSorting out auto-detected license keysLicensing software installationsEditing a license

ReportsReport builder

Page 29: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Change log

Storage properties

Network node properties

Alerts

Snapshots

Custom fields

Logins

Users

Options

Page 30: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3. 4.

1. 2. 3. 4. 5. 6. 7.

StorageStorage conceptStorage contents

Contents of auxiliary filesContents of an asset file (*.inv)

Storage managementData import

Storage concept

TNI 3 Storage is a folder on a hard drive selected by user.

Each asset is represented by an file..inv

The folder structure inside the Storage replicates the structure of the groups created by user in the . Any direct changes to theNetwork treeStorage contents shall be registered by the program.

It means that you can create, delete and rename groups, move and delete asset files either using TNI's tools or via any file manager.Furthermore, its design makes it possible to back-up and share data with other TNI 3 users, etc.

Storage contents

Contents of auxiliary files

Logins to access the assets (encrypted);User information (manually created and domain users);Software accounting data;Storage properties (storage name, company name and logo, inventory numbers template).

Contents of an asset file ( )*.inv

Asset network identifiers (network name, IP address, MAC address);Properties (alias, type, description, inventory number, etc.)Asset configuration snapshots, collected as a result of scanning (see );Collected informationAn alias of the login assigned to the asset;ID of user assigned to the asset;The asset's local user information;Special field values.

Storage management

A copy of TNI 3 is not . when the program is running.linked to any particular storage This means that you can switch between storages

Storage management is carried out from the menu:Storage

Create: select an empty folder on a computer and create an empty Storage there;Open: select a folder containing a previously created Storage to work with;Recent: contains a list of recently opened Storages that allows to quickly switch between them;Reload: reads the data from the computer again, if the changes made to the currently opened Storage have not been automaticallyregistered by TNI 3;Close: closes the Storage.

For the program to function correctly, do not delete, move or rename auxiliary hidden files in the Storage root folder. This maylead to data loss or corruption.

Do not rename asset files (*.inv). See here to learn how to change displayed names.

Asset files can be moved between storages. However, various storage data will not be moved. For instance, the remote accesslogin will be lost, but it could be restored manually.

To quickly locate the folder containing the current storage or a file representing one of the devices, you can use the Show inExplorer option in the context menu of the Network tree.

Page 31: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Data import

Learn about importing possibilities in the section.Data import

It's possible to create a Storage in a shared folder and have several copies of TNI connected to it from different computers. Keep inmind that simultaneous access of the same Storage by different copies of TNI is not supported and could lead to irrelevantinformation being displayed. This happens when changes made by one user are not yet reflected in the program of another.

Page 32: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Data importImporting by moving or copying data filesImporting files and foldersAutomatic importConverting the Storage from TNI 1.x

Importing by moving or copying data files

To import assets that were scanned by any version of TNI, simply copy the files of these assets into the storage folder. If TNI 3 is .invrunning and connected to that storage at the moment, the new files will be converted to the new format if necessary and importedimmediately. Otherwise, the files will be imported next time TNI 3 is started and the Storage opened.

Importing files and folders

To import one or several assets, right-click a group or the root node of the Network tree and click , then select theImport / Import files...data files for import. This will place the specified assets into the group that you initially right-clicked.

To import the contents of a folder including subfolders, do the same, but click instead. After you specify the sourceImport / Import folder...folder, you'll be prompted to choose whether to import the folder structure. If you choose to do so, groups will be created in your storage tomatch the contents of the source folder. Otherwise, all the assets found in the source folder and its subfolders will be placed in the group youinitially right-clicked.

These commands are also available from the main menu Storage / Import when the Storage is opened.

Automatic import

You can set up TNI to automatically refresh asset files from a certain folder on program launch or at regular intervals. This is done from the A section of the window. Additional options are:uto-import Options

Press the button to perform the importing without having to restart TNI or waiting for the timer;Import nowImport from subfolders is optional;Import folder structure: if enabled, TNI creates groups in your Storage root to match the folders found inside the source folder whenthe importing is being performed. Groups are only created for the folders that contain asset files. If disabled, all the discoveredassets will be placed into the root group of your storage;It is possible to ;Delete files after importYou can enable or disable and and specify a custom .Import at startup Import on timer Import period

Converting the Storage from TNI 1.x

To convert the whole Storage from the old format, use the option from the main menu and select the root folder of the targetStorage / Open Storage. The Storage contents will be wrapped into a ZIP archive first, and then converted to the new format. This process also preservesyour group structure.

To locate the storage folder, right-click the Storage root group in the Network tree and select Show in Explorer.

When importing an asset that is already present in the Storage, configuration snapshots from the new file will be moved to theexisting one. If the new file was placed into the Storage manually, it will be deleted. This ensures that a single asset in TNI 3always has one file corresponding to it. This is true for import of any kind.

Converting an asset file from the TNI 1.x format to that of TNI 3.0 reduces its size from ~1,5 MB to ~35 KB. Thus, completeconversion of the old Storage shrinks it about 40 times without losing any useful data.

Page 33: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

WorkspaceIntroducing the main windowBasic operations with the Network treeTNI 3 view modes

Introducing the main window

The Network treeThe Main areaThe Sidebar

The right side of the contains:Main menu

The menu;FeedbackThe button;OptionsThe switcher;languageThe menu, which contains tools that allow to check for updates, register your copy of TNI 3 and upgrade your license.Help

The and the can be temporarily hidden in order to increase the main area. This can be done by clicking the small Network tree Sidebar Hide/ and buttons located on both sides of the tab bar.Show network tree Hide/Show sidebar

You can alter the widths of the and the by dragging their edges.Network tree Sidebar

Basic operations with the Network tree

The displays the contents of the currently opened .Network tree Storage

To select an asset to display in the main area, left-click its node.

In order to choose several assets at once, tick the checkbox on the toolbar above the Network tree. A checkbox will beMultiple selectiondisplayed next to every node for you to select the necessary assets. To return to the normal selection mode, untick . Multiple selection

To create a new group, right-click the parent group or Storage root and select . To move some assets into a new group, firstCreate groupselect them using your mouse's or keyboard Rectangle selection keys Shift and Ctrl and then drag them onto the group node. Alternatively,you can use the Move to group option from the context menu of a node.

Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. The

Page 34: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

See the Network tree section for information on searching the Network tree, displaying additional text and graphic information in it andfiltering assets according to various criteria.

TNI 3 view modes

There's a separate view mode in TNI 3 for each specific task. View modes can be switched by clicking on tabs above the main area. The Side is automatically adjusted to always display an appropriate set of controls.bar

ScannerCtrl + 1

Before any of the information on remote assets becomes available for viewing and building reports, these assets have to bescanned. The view makes collecting asset information a breeze.Scanner

TNI 3 can collect information from Windows, Mac OS X and Linux computers or scan any other devices via the SNMP protocol.See the section on how to ensure that all the conditions for successful scanning are met.Whitepaper

Read more: .Network scanning

Viewer &reportsCtrl + 2

This mode displays the first thing you'll want to see after you've scanned your network: common reports. These reportscontain detailed information on hardware and software of each scanned asset sorted into convenient categories and availablefor instant search. It's possible to build descriptive and accurate reports, print them or export them to , etc.PDF, RTF, HTML

Read more: .Common reports

TablereportsCtrl + 3

Here it's possible to create a table that contains only the necessary information. Rows can represent individual devices or anydevice components such as HDDs, monitors, RAM units, software items, etc. Columns represent properties of the selectedobject. When the table has been built, it can be sorted, filtered, printed or exported for further analysis.

Read more: .Table reports

SoftwareaccountingCtrl + 4

Here you're able to see the list of software found on Windows and Mac assets in the Storage. For each software item you candisplay the full list of computers that it's installed on. Software can be organized, searched and filtered in a multitude of ways.

If you have the license, you'll find at your disposal a variety of tools that will help with keeping track ofTNI 3 Professionalyour software licenses, individual licensed installations, license keys, compliance problems, etc.

Read more: .Software asset management

ChangelogCtrl + 5

After scanning an asset several times over a period of time, you may want to know what has changed in terms of hardwareor software installed on the asset, system parameters, disk space usage, connected peripherals, etc. In this mode, you'll finda precise list of all changes. Also at your disposal are: advanced search, filtering and reporting tools.

Read more: .Change log

EditCtrl + 6

This view mode allows to change properties of individual assets or the Storage itself, manage user records, custom fields,snapshots and logins.

Read more:

Storage properties: storage name, company name and logo, inventory number generator;Network node properties: network identifiers, alias, description, etc;Snapshots: viewing and deleting configuration snapshots;Custom fields: adding or changing user information;Logins: managing logins and linking them to assets;Users: viewing and editing information on network asset users.

Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. Theformer is only used for operations with several nodes (e.g. moving and deleting) and does not influence the contents of the mainarea.

There's a way to start working with normally selected assets in the main area. To do that, use the Choose option after right-clickingone of the selected assets. The assets will become selected with Multiple selection.

Groups in the Network tree replicate the structure of directories on the hard drive as described in the Storage section. Thus,operations such as creating, deleting or renaming groups and moving assets between them can be performed in any file manager.

Pressing provides quick access to the desired view.Ctrl + <tab number>

Page 35: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots
Page 36: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3. 4. 5. 6.

Network treeThe reflects the contents of the opened .Network tree Storage

Main elements:

The ;Network tree toolbarThe list of added assistants;The main area;The icon marking the computer TNI 3 is currently running on;Additional text output;Assistants' indicator icons.

Below the tree is the status bar where several indicators can be found:

The first of them shows the license usage. It displays how many licensed spots are occupied by scanned assets, the total number of nodesthat your license allows, and the usage percentage.The second indicator shows the number of unscanned assets, and the third one shows the number of custom assets. These types of assetsdon't occupy license spots, so they are displayed separately. These indicators may be missing if there are no assets of the corresponding typein your Storage.

Related topics:

Selecting a nodeAltering the Storage structureInformation display settingsSearching in the Network treeStorage assistantsActionsCustom assetsSynchronization with Aсtive Directory

Page 37: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Selecting a nodeSimple selectionSelection for processing

Single selectionMultiple selection

There are two ways of selecting nodes in the Network tree.

Simple selection

It's used for performing such operations as deletion and moving between groups containing one or multiple nodes.

It's done in the same manner as in Windows Explorer: using your mouse's or keyboard keys and and Rectangle selection Shift Ctrl arrow keys.

The selected nodes are highlighted with the blue background:

This type of selection doesn't affect other workspace areas in any way.

Selection for processing

This selection type is used for selecting nodes to work with in the , , Common reports Table reports Software accounting and Edit modes.

The has two selection modes: and . Press the button located to the right ofNetwork tree Single selection Multiple selection Multiple selectionthe root node to switch between modes.

Single selection

Active when the button is released.Multiple selection

Only one network node or one group can be selected. To select it, simply click the node. The selected node is highlighted with the bluerectangle:

While staying in the single selection mode, you can quickly select the next or previous node in the tree: .Alt + arrow up/down

Multiple selection

Active when the box is checked.Multiple selection

Each node will receive a checkbox, and the nodes are selected when their checkboxes are ticked:

Page 38: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

You can check or uncheck the box either with the mouse or by selecting the nodes using and pressing the .Single selection space bar

Nodes selected using Simple selection can be by using the selected for processing Choose option from the context menu.

Selecting a group in the Single selection mode is the same as selecting all assets in this group and its subgroups in the Multipleselection mode. A report will be built for all assets in the single selected group and editing will affect all assets in it, so you don'tneed to enable the Multiple selection mode to build reports for whole groups. The only exception is the Group summary modewhich displays information about the group itself and is not available in the Multiple selection mode.

Page 39: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

1. 2.

a. b.

Altering the Storage structureCreating a groupRenaming a groupMoving nodes into a groupDeleting network nodes and groupsWorking with storage files directly

The Network tree allows to create, rename and delete groups of network nodes.

Creating a group

Right-click the parent group (to create a first-level group, right-click the root node);Click in the context menu;Create groupType the name of the and press .group Enter

Renaming a group

Click in the context menu or select the group and press . Type the desired name and press .Rename F2 Enter

Moving nodes into a group

If you need to move multiple nodes, select them using your mouse's Rectangle Selection or your keyboard's or ;Shift CtrlDo one of the following:

Drag the selection with your mouse and drop it onto the title of the target group;Right-click one of the selected nodes and use the menu item.Move to group

Deleting network nodes and groups

To delete one or several nodes or groups, select them and press on your keyboard or use the option from the context menu.Delete Delete

Working with storage files directly

Right-click any node and choose to quickly locate a directory or file corresponding to the node. This will launch an instanceShow in Explorerof Windows Explorer navigated to the target directory. If the selected node is an asset node, its file will be selected.

You can also use this function when backing up data, copying, transferring to another TNI 3 user, etc.

Renaming the root node will change the Storage name. Another way to do this is via the Storage properties.

Deleting a network node is an irreversible operation. All the data connected to the deleted asset will be permanently lost. Consultthe Contents of an asset file section to find out what exactly is being deleted.

Deleting a group is not the same as "ungrouping". All the assets inside the group will be deleted as well.

The Storage structure fully replicates the structure of files and directories inside the Storage directory, as described in the Storage section. Therefore, it's possible to create, delete or rename groups and move assets between them by performing correspondingoperations over file system objects, which can be done in any file manager. TNI 3 will react to these changes automatically.

Page 40: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Information display settingsNetwork node namesAdditional fieldSorting the nodesNumber of assets in groups

What information is displayed in the Network tree can be chosen in the menu on the .Tree display settings Network tree toolbar

For instance, setting as hostnames node names, selecting for the and enabling theIP addresses additional field Show number of assets ingroups option will result in the Network tree looking like this:

Both node names and the additional field are used when .searching the Network tree

Network node names

A variety of values can be displayed as the node name: , etc.network names, IP addresses, inventory numbers, usernames

Additional field

An additional value can be displayed in the Network tree for every node. This value is selected from the same list as for the node name.

Sorting the nodes

The Sorting section allows to select the sorting criteria: nodes can be sorted either by their names or by the additional field values(configured as shown above), with an option to reverse the sorting order.

Number of assets in groups

When is enabled, the number of assets is displayed Show number of assets in groups in parentheses to the right of the group title.

If Alias is set as the node name, network nodes can be renamed by choosing Rename from the individual context menu or bypressing F2. The asset's alias will be changed. Another way to do this is via the Network node properties.

Page 41: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Searching in the Network treeSaving the search

A case of using a saved search

To start searching the Storage, click the search field on the Network tree toolbar or press .Ctrl + Shift + F

Matching text is instantly highlighted as you type:

Both node names and additional text are searched. See for details.Information display settings

By default, the contents of the Network tree are filtered to only display the nodes which match the query, and the rest is hidden. Thisfunction can be disabled by clicking the button to the left of the search input field. When it's disabled, all nodes will remain visible whileFilter the matching ones will be highlighted.

You can use the when the search field is in focus to navigate the nodes. Pressing opens the selected node in up and down arrow keys Enter the main area.

Saving the search

You can deactivate search without losing its results by pressing the button. You will then be able to toggle filtering on or off, runSave searcha new search in the results of the saved one, etc.

Searching actually uses the . See for more details about what assistants can do.Search node assistant Storage assistants

A case of using a saved search

Let's imagine that inventory numbers of developer workstations in the Storage are prefixed with . We can quickly put together a simple DEV_tool for switching the Storage from to . All it takes is setting the to showing all assets showing only developer workstations Additional field Inv

and saving a search for . Now if we want to see developer workstations, all we have to do is turn the filtering on for theentory numbers DEV_newly-created assistant.

As with all added assistants, saved searches are not deleted when TNI is closed. After saving a search once, you can use it as longas you need, temporarily disable it or remove it at any time.

Page 42: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Storage assistantsStorage assistants is a tool that displays additional graphic and text information in the , and also enables searching and filteringNetwork treeby various criteria.

For example:

The displays the icon and the currently running operating system in front of every asset and can hide theOS Assistant version of thenodes with OSes different from the one displayed.The displays a green or red circle, depending on the asset's online status. When the status changes, theOnline status Assistantindicator is automatically updated. There's an option to hide all offline computers.The displays a red flag and the number of problems in front of each asset where problems have beenAlerts presence Assistantdetected. The hint lists the problems found.

There are many other assistants. This is how the Storage looks when the abovementioned assistants have been added:

Related topics:

Working with assistantsDescription of assistants

Page 43: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

Working with assistantsAdding assistantsManaging the added assistants

Adding assistants

Follow these steps to add an assistant:

Click the button on the toolbar in the Network tree;Add assistant (+) Select the assistant type from the appearing menu;Set a condition if necessary.

Setting up the assistant.Installed RAM

Any number of assistants can be used at the same time.Several assistants of the same type can be added.The assistants are saved when TNI is closed.

Managing the added assistants

Newly added assistants appear in a separate area under the toolbar: the , which isn't displayed when empty. The caAssistant list Assistant list n always be collapsed or expanded by clicking the title area.

This is what the expanded list looks like:

Every added assistant has several controls:

The toggle.Indicator

This enables or disables the corresponding icon on the right of every network node. Hovering the mouse cursor over an icon reveals ahint with additional info.

The toggle.Filter

When enabled, all assets that don't meet the assistant's condition are hidden.

The button.Remove assistant

The number of assistants that currently act as and is shown in the assistant list's header when the list is collapsed.Indicators Filters

Page 44: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

The number of assistants that currently act as and is shown in the assistant list's header when the list is collapsed.Indicators Filters

By default, assistants are added as Indicators.

The Filter and Indicator toggles may be enabled simultaneously. If they are both disabled, the assistant is considered disabled and will notaffect the contents of the Network tree. The illustration above shows the Alerts assistant is disabled and the has bothOnline status assistant toggles enabled.

In case you can't find an asset that exists in the Storage, make sure it has not been filtered out by one of the active assistants.

Double-click the title of any added assistant to edit it (instead of removing it from the list and adding another). When the editing isdone, click Apply.See how editing the Installed RAM assistant looks like:

Page 45: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Description of assistantsHardware

Installed RAMVirtual type

SoftwareOperating systemTracked software

InventoryLast snapshot age

MiscOnline statusNote contentsAlerts presenceSearch node

The purpose of any assistant is to display additional information in the network tree. Assistants are sorted into groups by the nature of thisinformation: , , or .Hardware Software Inventory Miscellaneous

Each assistant has a . When an assistant is active, every network node is matched against its condition.condition

When the mode is active, the nodes that passed the check are marked with an icon.Indicator

Hovering the mouse cursor over this icon will provide additional information in the form of a .hint

In the mode, an assistant will hide all assets that do not satisfy its condition.Filter

Hardware

Installed RAM

Compares the amount of RAM on an asset with the user-defined value.

The Indicator displays an icon with the amount of RAM.

Virtual type

Shows whether a device is physical or virtual.

Software

Operating system

The Indicator displays the icon representing the installed OS and its version. The full title and version of the OS can be found in the hint.

If you've got a suggestion for a new assistant type, feel free to send us a message! Use the main menu option Feedback / Featurerequest and tell us. Perhaps, next update you'll find your assistant in the program.

Example of usage: excluding all virtual devices from a hardware report.

Page 46: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

The hides all assets that run on an OS from a different OS family than the one specified ( ).Filter Windows, Linux, MacOS, FreeBSD or ESXi

Tracked software

This assistant is related to the mode, where it's possible to enable tracking for Software accounting presence or absence of certain softwareon selected assets. It has three modes and can point out the computers with must-have violations, forbidden violations or both. In the must-

mode, the assistant displays an icon for each asset where "must-have" software is not found and the amount of such software. With have for, an icon is displayed for each asset where forbidden software is found. When choose , an icon is displayed when both types ofbidden all

violations exist. The hint lists which software caused the icon to appear and the type of violation.

Inventory

Last snapshot age

Compares the age of the latest snapshot with the user-defined number of days.

The displays the number of days since the asset was last scanned.Indicator

Misc

Online status

TNI 3 pings all the assets in the storage once every several seconds, and this assistant is used to display the result in the Network tree.

In the mode, this assistant only Filter shows the nodes that are online at the moment (or offline, if the user changes the condition).

Note contents

Each asset can have a assigned to it. These are comments added by the user of TNI 3.note

Notes can be easily added in the mode or in .Common reports Network node properties

This assistant's condition contains a search string. When left blank, all the nodes that have a note will satisfy the condition. When text isentered into the assistant's field, only the nodes which have a note containing the entered text as part of it will satisfy the condition.

The displays an icon for each asset that satisfies the condition. The hint contains the full note.Indicator

Example of usage: view all the assets that were not scanned for at least a month.

It's a good idea to include a short keyword in every note along with the actual message (e.g., "TODO" for tasks, "FIX" for faultyassets, "UPGRADE" for assets that need to be upgraded, etc.) In this case, the Note contents assistant becomes very helpful. Forinstance, you can use it to filter all the nodes by the presence of "FIX" in their notes, which will yield the list of malfunctioningassets. Then you hover your mouse over one of them to find out what exactly is wrong:

Page 47: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Alerts presence

The displays a red flag and the number of problems in front of each asset where problems have been detectedIndicator .

The allows you to hide all the devices that don't have any alerts. This can be useful when building an alert report.Filter

See: .Alerts

Search node

The condition contains a search string. Only the nodes that have the string as part of their name or additional text will satisfy the condition.

An alternative way of creating this assistant is by saving the tree search.

See: .Searching in the Network tree

Page 48: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

ActionsStandard actionsCustom actions

Defining a new actionTemplatesConditionsActions for multiple nodesAccidental run protectionSending keystrokes

Actions is a tool for performing operations on the network nodes in your Storage right from the Network tree.

Actions can be accessed via the network node and group context menus:

Standard actions

TNI comes with three standard actions:

Reboot;Power off;Wake-on-LAN.

These actions don't need to be configured. To execute one of them, simply select it from the action list of the desired node or group ofnodes.

Custom actions

Custom actions allow you to use any system routines or third-party utilities in order to accomplish a desired task involving a remote networkdevice.

Custom actions are defined in the using a simple syntax. To access the file, right-click any asset, choose from the action text file Edit actions sub-menu and, when the window opens, click the button in Actions Options Edit commands in Notepad Options / Actions.

Defining a new action

To add a new action, add a line to the action text file:

By default, only the actions that are applicable to the selected nodes are visible in the menu. This can be changed from the Options.

A convenient, brief summary for the action definition syntax, with examples and a complete list of keywords and templates, can befound in the Actions section of the Options window, with one-click copy capability included. The list is also available on thisdocumentation page.

Page 49: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Action name=command

Action name is the name that will appear in the menu.Actions

Command is the command for the operating system to execute.

Templates

Inside the command's definition, certain string templates are used to pass the parameters of a targeted network node into the command.These are the supported templates:

%HOST% FQDN, hostname or IP, depending on the flag of the asset Static IP

%HOSTNAME% Hostname of the asset

%ALIAS% Alias of the asset

%IP% IP-address of the asset

%MAC-% Hyphen-separated MAC-address

%MAC:% Colon-separated MAC-address

%MAC% MAC-address without delimiters

%SSHPORT% Custom SSH port as specified in the scanner options

%USERNAME% Username from the login record used for asset scanning

%PASSWORD% Password from the login record used for asset scanning

%DATE% Current date (YYYYMMDD)

%TIME% Current time (HHMM)

%TIMES% Current time (HHMMSS)

An example of using a template in a command:

Ping asset=ping.exe %HOST%

Conditions

Conditional directives may be added to the action's definition, thus rendering the action inapplicable to certain assets. This is useful in avariety of cases, i.e. to prevent attempts to execute a command that are certain to fail.

A condition is specified when is added before the action's definition in this way:{$IF condition}

{$IF condition}Action name=command

These are the supported conditions:

OPEN00 The specified port is open

OPENSSHPORT The SSH port specified in the scanner settings is open

ONLINE The device is online

WIN It's a Windows device

LIN It's a Linux device

MAC It's an OS X device

SSH The device was scanned via SSH (a Linux, OS X, FreeBSD, or an ESX/ESXi device)

SNMP The device was scanned via SNMP

LAN The device and the PC running TNI 3 share the same subnet

EXISTS(filename.exe) The specified executable exists on the paths specified in the PATH environment variable

Several conditions separated by commas result in a treatment.logical AND

Adding an before a condition "!" negates it (logical NOT).

Page 50: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Adding an before a condition "!" negates it (logical NOT).

Example usage with conditions:

{$IF LAN,!ONLINE}Wake-on-LAN=wol.exe %MAC:%

Actions for multiple nodes

By default, any action is considered inapplicable to several devices at once. Thus, it won't appear in the action list when you select severaldevices or a group. To make it available in these cases, multiple targets have to be allowed explicitly by adding the directive in{$MULTI}front of the definition.

Example:

{$MULTI}{$IF LAN,!ONLINE}Wake-on-LAN=wol.exe %MAC:%

When targeted at multiple devices, a condition is considered satisfied if any of the target nodes satisfies it. To make a condition mandatory an should be added after it.for all targets, "!"

Examples:

{$IF LAN} If any of the target nodes share the local subnet

{$IF LAN!} If all of the target nodes share the local subnet

Negation and mandatory-for-all modification can be combined:

{$IF !ONLINE!} If all of the targeted nodes are offline

Accidental run protection

If an action is "unsafe", adding an directive to the definition will display a confirmation dialog before every execution.{$?}

{$?}Shutdown="C:\PSTools\psshutdown.exe" -k \\%HOST%

Sending keystrokes

Sometimes executing a command launches a user interface that requires further user input. In order to automate this task, TNI can sendpredefined keystrokes to the launched application.

To send keystrokes, append /sendkeys: to the action's definition, followed by a string of keys to send. After the /sendkeys: command youmay use:

Arbitrarytext

sent as is

Templates converted to text and sent as they are

{$WAITX}

pauses the execution for X milliseconds (if this directive is omitted, the default pause before sending any keys is one second)

{keyname}

simulate pressing a special key (the following keyboard keys can be used: F1..F10, LEFT, RIGHT, UP, DOWN, ENTER,BACKSPACE, PGUP, PGDN, HOME, END, TAB)

Example of usage:

Remote Desktop with login=mstsc.exe /v:%IP% /sendkeys:%PASSWORD%{ENTER}

When the action is executed, an authorization window will open up. TNI then sends the password to the input box and presses to logEnterin, automatically.

Page 51: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1.

2. 3.

Custom assetsAdding custom assetsCloning custom assetsAdding custom assets from fileConverting non-scanned assets to custom assets

Adding custom assets

Custom assets can be added to your Network tree manually by using the Add custom asset feature. This allows to create new assets in yourStorage, even if they don’t have a network interface (e.g. monitors, tablets, webcams). As a result, viewing and building reports becomespossible for both custom and automatically created assets.

Follow these steps to add a custom asset:

Click the Add custom asset

button above the Network tree (or in the context menus of your Storage root node or any asset group);In the new window, specify the asset’s type and name;If necessary, fill in the values for common fields and add special fields.

A new asset will appear marked with

in the Network tree:

It's possible to save and load special field presets by clicking and buttons in the windoSave preset as… Load preset Adding new custom asset w.

Page 52: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Cloning custom assets

To add a large number of identical assets you can use the button (by right-clicking any custom asset on your network tree).Clone assetEnter the number of copies you need and press OK.

The copies you make will appear in the Network tree as follows:

Page 53: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Adding custom assets from file

The option allows you to perform a quick import of a whole list of assets or IP addresses to your Network tree. Add custom assets from fileTo add custom assets from file, right-click your storage root node or any asset group node, and then click the corresponding button:

It's possible to import from a text file only.(*.txt)The file should contain only one asset name or IP address per line.For example, the following list of names:PC-1PC-2PC-3PC-4...will appear in the Network tree in this way:

Converting non-scanned assets to custom assets

The option allows to transform an asset that couldn't be scanned by any method to a custom asset. As a result, you Convert to custom assetcan avoid scan error alerts.

To convert an asset, right-click any non-scanned asset in the Network tree and choose :Convert to custom asset

Page 54: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

The asset will be displayed and marked with

in the Network tree.

Conversion does not bring any changes to the information fields or properties of assets.

Page 55: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Synchronization with Aсtive Directory

Synchronizing with allows you to automatically transfer the Active Directory OU structure to your network tree. A group will be created for eachOU in the current domain, and each computer in the domain will be moved to its proper place in the structure.

To perform AD synchronization right-click the root and choose the corresponding option:Storage

During the synchronization, assets will receive and retrieved from AD (if they are filled), and also the (for assetsLocation Description OS Versionthat have logged into the domain at least once).

Users are also synchronized with AD during every Storage synchronization, and can be synced separately by going to the Edit – Users tab andclicking . This function Synchronize with AD retrieves AD users with their names, positions, contact info, etc. and places them into your Storage forconvenient search and report building.

Placeholders are created for each device that has been discovered in the domain but has not yet been scanned. These placeholders are emptynodes that can be rescanned to retrieve inventory information. They will be displayed as

in the , and the following hint will be displayed in the tab for such assets:Network tree Viewer & reports – General information

Placeholders contain some basic information from AD: Description, Location, OS name, its version and installed Service Pack.

You also get to choose which action to take if a previously scanned PC has not been discovered in the domain during synchronization: move it toa separate group or delete it.

You can configure TNI to perform synchronization on startup. This and several other switches are located in Options – General.

Page 56: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Active Directory synchronization is one-way only: it's only possible to import data from AD to TNI at this time.

Page 57: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Network scanningThe mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing . Scanner Ctrl + 1

Scanning in TNI 3 is a process of data collection from remote assets and saving it to the current Storage.

When the program scans an asset not present in the Storage, a new node is created for it. Assets that are already in the Storage can bescanned repeatedly to update with the collected information.

Related topics:

Adding scan tasksManaging added tasksScan process and scan resultsSaving, importing and exporting tasksScan scheduler

Page 58: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Adding scan tasksQuick AddSidebarRescanning network nodes

Before starting a scan, you'll need to specify a task list for the scanner.

Quick Add

Type what you'd like to scan into the field and press . Quick Add Enter

Here you can type in the following:

Network namePC321host.domain.com

IP-address192.168.0.1

Subnet192.168.0.0/24 (allowed CIDR notation number range: )from 16 to 30192.168.0.0/255.255.255.0 (allowed masks range )from 255.255.0.0 to 255.255.255.252

IP range192.168.0.1-192.168.0.254192.168.0.1-192.168.2.150(the total number of hosts must not exceed , i.e. )65536 X.X.0.0-X.X.255.255

Shortened IP range192.168.0.1-254192.168.0.1,5,7192.168.0.1-50,125,130192.168.0-3,5,7.1-254

Windows workgroup name (prefixed with )WG:WG:MSHOME

Domain controllerHostname or IP address of a controller prefixed with AD:AD:10.0.0.1AD:servernameThis works even when your PC is not in a domain.

LDAP notationLDAP://OU=Seattle,OU=Washington,OU=USA,DC=company,DC=localOnly works when your PC is in a domain.

Shortened LDAP notationThere are several ways of defining an Active Directory object. These notations are converted into LDAP and can only beused from inside a domain.Domain

DC:companyDC:company.local

ContainerCN:Computers

Organizational unitOU:SeattleOU:Seattle.Washington.USA

Exception taskA hostname or an IP address of a node that needs not to be scanned, prefixed with a " "--APACHESERVER-10.0.0.1

Sidebar

The Quick Add field stores the history of commands you typed in, similar to how Windows command prompt does. Browse recentlyused commands using up and down arrow keys.

Page 59: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2.

3. 4.

The group on the sidebar contains these items:Add scan task

This PC: adds a task for scanning the computer running the current instance of TNI 3;All assets: adds tasks for rescanning of each asset in the storage;Selected assets: adds tasks ;for rescanning of the selected assetsIP networks;

This group contains automatically detected networks that your network adapters are set up to use.Windows network;

Here, all visible Windows workgroups are listed.Active Directory.

Your default naming context and root domain naming context are presented here.The option allows to use another domain controller. It has the same effect as typing Connect to domain AD:<hostname or

into the field.IP of a domain controller> Quick Add

Rescanning network nodes

You can create tasks for rescanning the existing nodes in several ways:

Simply type the hostnames or addresses of assets into the field;Quick AddSelect the corresponding nodes in the with your mouse or using or and drag them into the task list area: Network tree Shift Ctrl

Use All assets or Selected assets from the Sidebar;While in any mode (not necessarily the Scanner), select Rescan from the context menu of a node or a group.

Drag and drop a group, and a task will be created for each asset it contains.

Page 60: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Managing added tasksNode discoverySetting logins

Logins for single tasksLogins for complex tasksLogins for assets of various typesAssigning logins to assetsSetting a login for a task created with Quick Add

Setting the destination folderDeleting and disabling tasks; exceptions

Deleting tasksDisabling tasksExceptions

Node discovery

Complex scan tasks (i.e. network scan, IP-address scan or Windows workgroup scan) work with previously discovered nodes. The discoverywill be performed automatically, but it also can be done manually before scanning starts.

To perform the network discovery, just expand a complex task. The subtasks corresponding to discovered nodes will gradually show up.

Searching is accompanied by animation. It can be stopped by pressing the button. Stop search When the search is completed or stopped, two additional buttons appear on the right:

Repeat search deletes all subtasks and performs a new node discovery;The option shows the way the complex task will be saved in .Padlock Saved tasks

When the is , the task will be saved without subtasks, and the search will be performed again padlock opened when the.saved task is added again

To save the task along with the configured subtasks, click the and it'll .padlock close.About saving scan tasks

Setting logins

To access a remote node, the TNI 3 scanner requires a login (username and password, or a community string for the SNMP protocol).

Logins for each task can be specified in columns corresponding to their protocols.

Click on an arrow in any protocol cell, and the login menu will show up.

Page 61: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

This list contains all logins created by the user and the standard login for the protocol (for Windows: the current user of the system wherethe program is run; for SNMP: a public community).

To scan an asset by the selected protocol, select one of the logins or create a new one by using the option.Add

Along with the username and password (or the community string for SNMP), an should also be specified when adding a new login. An alias alis a unique identifier that will be used to address this login in TNI.ias

To change the username and password for previously created logins, use the button (the icon) located in front of every login inEdit pencil the list.

To skip scanning the asset by a particular protocol, select .Ignore

Logins for single tasks

Only one login for one of the protocols can be selected for any single task. If the login is not specified, the task will be ignored duringscanning.

Logins for complex tasks

Complex tasks can have several logins for each protocol. In this case, access to every asset scanned within this task will be sequentiallyrequested using all specified logins until one of them matches.

A in a login cell means that the task uses the logins of a parent task, but another login can be assigned to the task, and it will betilde (~)used for scanning.

Page 62: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Logins for assets of various types

If the asset is not present in the Storage and the scanning has not been started yet, TNI doesn't know its type, therefore the protocol to scanthis asset with is unknown as well. In this case, login for any protocol can be set.

When the asset type is known, it can only be scanned via the appropriate protocol: for Windows-assets, for Mac OS X and LinuxWin SSHassets, etc. The cells of other protocols will be greyed out and inactive.

Assigning logins to assets

Assigning a login to an asset in the Storage means that a new scan task for this asset will be automatically created with the assigned login.

Assigning logins to assets, as well as creating, deleting, editing logins and changing default logins can be performed in the mode. ForEdit more details, see .Logins

Setting a login for a task created with Quick Add

A new task automatically acquires a login entered with additional semicolon-separated login command:

<task creating command>; login <login alias>

For instance:

10.0.0.3; login Homer

You can also enter several logins separated by commas:

10.0.0.0/24; login Homer, Marge

Setting the destination folder

By default, all new assets are placed in the root folder of the Storage.

You can select a folder in the Storage for every task, and the scanned assets will be placed there.

The column serves this purpose. Clicking on an arrow in this column will show a menu with the list of all storage folders.Destination folder

You can use an additional " command when creating a new task with :to" Quick Add

<task creating command>; to <path to folder>

EARTH; to Planets

10.0.0.3; login Homer; to New devices

PLUTO; to Planets\Dwarf planets

Deleting and disabling tasks; exceptions

Deleting tasks

To delete a task, use the Delete button in front of its title in the Task column or select multiple tasks and press Delete on the keyboard.

Disabling tasks

To disable a task without deleting it, tick off the checkbox in front of its title. This can also be done by selecting multiple tasks and pressingthe . To enable or disable all tasks, use the checkbox in the column.Space bar Task

You can create a new task as disabled through by using an additional command:Quick Add disable

On the first scan of a remote asset, the login that successfully provided access is automatically assigned to it.

It's not possible to create a new folder from this menu. If assets should be placed in a new folder, create it manually beforehand.

Page 63: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

<task creating command>; disable

HALLEY; to Comets; disable

Exceptions

You can create an exception task using . Just enter a network name or an IP-address with prefix (minus). If the exception taskQuick Add "-"is enabled, the scanner will ignore the specified asset.

1. 2.

Exceptions are convenient to use for scanning networks and ranges. For instance, if one or several assets in the netwo10.0.0.0/24rk should not be scanned, you can do the following:

Create a task, expand it and wait for all subnodes to be discovered, then delete the unnecessary ones;Create a task and several exception tasks.

Option 2 is sometimes faster and more handy.

Page 64: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Scan process and scan resultsEditing the task listScanningScan results

The scanner control block is located at the top of the Sidebar.

It displays the current status of the scanner and additional command buttons. Certain buttons may appear or disappear depending onsituation.

Editing the task list

When the tasks have been and , click .added configured Start scan

Looped scan: performs current tasks with specified frequency.Set up scanner: opens the options window.Set up logon script scan (see ).Logon script scanSet up scheduler (see ).Scan schedulerSet up resident agent (see ).Resident agent scanSet up logins: opens the subpage in .Logins EditClear all: removes all added tasks.

Scanning

You can't remove, disable or configure scan tasks during scanning. All disabled tasks are hidden.

The column displays the progress of each task and their current states.Status

The overall scanning progress is displayed in the Sidebar.

Click if you want to interrupt the scan process. This operation can take some time.Stop scan

Page 65: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Click if you want to interrupt the scan process. This operation can take some time.Stop scan

Scan results

When the scanning is done, the results of every task are displayed in the main area.

If an error has occurred while processing any of the tasks, you'll see an error message in the column.Status

Names and statuses of tasks can be copied by selecting them and pressing or via the context menu.Ctrl + C

The sidebar displays the overall scan result and some additional commands.

Back to editing: dismisses the scan results and returns to normal mode.Clear finished: only the tasks that have not finished with success for one reason or another. This allows to eliminate theleavescauses of errors and run the scanner again without rescanning the tasks that finished with success.

You don't have to stop the scan process to add new tasks. Simply create new tasks during the scan: from the Quick Add field, bydragging assets into the scanner area or in any other way. They will be processed when in turn.

You don't have to monitor the scan process. You can freely switch to a different mode and work there while the scan is performedin the background. The icon in the Scanner tab displays the scan progress.

Page 66: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Saving, importing and exporting tasksSaving and loadingImporting and exportingManually creating a task list file

Saving and loading

To save a task list, click on the Sidebar. Once saved, a task list can be loaded and used at any time.Save current tasks

To load a previously saved task list, click on its title in the list.Saved tasks

Importing and exporting

Task lists can be exported to a file or imported from it.

To export the current task list click . You can choose between file extensions and .Save tasks to file .task-list .txt

To import a task list file, click . Load tasks from file

Manually creating a task list file

Sometimes it's convenient to manually create a list of nodes that need to be scanned.

Using the command, you can turn such a list into tasks for the TNI 3 scanner. Load tasks from file

In general, the task file in TNI 3 is a simple text file where each line is a command that adds one task.

The simplest example of a valid task file is a list of IP addresses and network names, each in a separate line. However, the options are notlimited to network names and IP addresses. You can find the full list of supported notations .here

When a task list is loaded, its tasks are appended to the tasks already in the scanner. If you want to only load the tasks you saved,clear the tasks in the scanner before loading the list.

If you need to pass a task list on to another TNI 3 user, you can find your saved lists as separate files in the Tasks subfolder of theprogram's application data folder ( ). It can be accessed by{Path to the Application Data folder}\Total Network Inventory 3\Tasksclicking the Open tasks folder link on the Sidebar in the Scanner mode.

Page 67: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1.

2.

Scan schedulerCreating a scheduled scan taskSetting up a scheduled scan taskRun logManaging scheduled scan tasks

Scan tasks can be scheduled to run on a specified day and at specified time, or daily, weekly or monthly using flexible rules.

Creating a scheduled scan task

The scheduler works with saved tasks. For information on how to create them, see:

Adding scan tasks Managing added tasksSaving, importing and exporting tasks

A scan task can be scheduled in two ways:

Move your cursor over a task in the 's sidebar and click ;Scanner Schedule this task

Go to click the dropdown and choose your task from the list.Options / Scan scheduler, Add task

As a result of one of these actions, a will be created.scheduled scan task

Setting up a scheduled scan task

Clicking the button to the left of the task name in reveals its settings. [+] Options / Scan scheduler

The section allows to set up the type of repetition:Run

OnceOn a specified date.

DailyEvery day at specific time, or once every N days.

WeeklyOn specific weekdays every Nth week.

MonthlyOn specific days of chosen months of the year.

Page 68: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

The exact of scanning can be specified using the corresponding field.Time

For repeated tasks, the date can also be specified The task will not be executed before this date.Starting .

Run log

Each scheduled scan task has a separate (accessible from ). Each time a task is run or skipped, TNI adds Run log Options / Scan scheduler anappropriate descriptive entry to the corresponding log. A run log can be cleared or copied to clipboard.

Managing scheduled scan tasks

Toggling the switch to the right of a scheduled scan task in Options / Scan scheduler on or off or enables disables the task. You can temporar the task to stop it from running on scheduled days and re-enable it at any time.ily disable

To a task, click the to the right of the scheduled scan in the Options window.unschedule X

Another way to remove a scheduled scan task is to delete the corresponding scan task itself from the Scanner's Sidebar.

For a task to be executed at the scheduled date and time, TNI must be running, and the scanner must not be busy with othertasks.

The saved task itself will not be deleted, only removed from the scheduler.

Page 69: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Scanning using agentsOne of the ways TNI scans remote devices is by sending an agent to them. The agent then studies the remote system, obtains the inventoryinformation in the form of a data file and sends it back to TNI. When the scanning is complete, the agent is erased from the remote system andno traces of scanning remain. You can learn more about the scanning technology from the .Techpaper

This section describes how TNI's scanner agents can be used as standalone tools.

Manual scan: use standalone scanner tools for inventorying assets locally when they're not accessible remotely.Logon script scan: configure the script that automatically scans computers that show up in a domain.Resident agent scan: automatic scheduled scan of any Windows computer without the main unit's direct participation.

Page 70: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Manual scan1. Copy the agent executable to the asset you need to scan2. Perform the scan3. Import the data into your Storage

Manual scan can be used to inventory assets that are not connected to your network or are inaccessible for regular scanning for one reasonor another. For example, assets running Windows XP Home Edition can only be scanned this way due to OS limitations.

Manual scanning of any system involves three basic steps.

1. Copy the agent executable to the asset you need to scan

Agents are located in TNI's installation folder (e.g. ). The filenames are as follows:"C:\Program Files (x86)\Total Network Inventory 3"

Windows agent: tniwinagent.exe

Linux agents: tnilinagent tnilinagent_x64

OS X agent: tnimacagent

FreeBSD agent: tnibsdagent

VMware ESX agent: tniesxagent

The Windows agent can also be copied to a specified folder by using the option from .Export standalone scanner Options – Logon script

2. Perform the scan

Launch the agent o . When the scanning is complete, a data file will be generated and,n the remote system by default, placed into thedirectory the agent is run from.

When scanning a asset, you can use these command line parameters for :Windows tniwinagent.exe

/path:"\\server\share" allows to set a path to a folder where the data file will be placed;/delay:XX specifies the gap in seconds between the agent's launch time and the start of the scan;/overwrite overwrites the data file in case the target folder already contains its older version (otherwise, new files appended with(2), (3), etc. will be created after each scan);/scripted is required for running the logon script scan;/debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will becreated, which can be sent to the developers in order for them to search for and fix possible scan errors;/driver:{x} controls the :low-level hardware scan mode. Set tox

0 — to disable low-level hardware scan completely; — to always skip disk drive scan (in order to avoid BSOD);1 — to skip disk drive scan automatically if the faulty driver is present ;2 (default value) — to enable full low-level hardware scan.3

/admin runs the agent with administrator rights;/noadmin runs the agent without administrator rights;/keepdriver keeps the driver installed;low-level hardware scan /removedriver removes the driver (if it's installed);low-level hardware scan/nodriver disables low-level hardware scan (same as );driver:0/logoff logs the current user off (post-scan);/reboot restarts the computer ;(post-scan)/poweroff powers off the computer ( same as );post-scan; /shutdown/shutdown shuts the computer ( same as ). down post-scan; /poweroff

Linux, OS X, FreeBSD and agents are run from the console. For example, you can run the Linux agent using the following command:ESX

chmod 755 tnilinagent./tnilinagent

When scanning Linux, OS X, FreeBSD and ESX systems, the following command line parameters can be used:

-silent allows to scan an asset without user interaction. Only the scan progress percentage will be displayed;-log allows to scan an asset while logging the scanning process;-debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will becreated, which can be sent to the developers in order for them to search for and fix possible scan errors.

Locate the generated data file and send it back to the system that runs your copy of TNI (or any other place TNI has access to).

Page 71: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

3. Import the data into your Storage

You can do this in several ways: by placing the file directly into the Storage folder, by using the menu, or by enabling the automaticImport import if the manual scanning should be performed regularly. See the section for details.Data import

Page 72: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Logon script scanSetting up the logon script scanningAutomatically importing new data files

This type of scan uses TNI's Windows agent to automatically scan any Windows computer as it logs on to the domain. This is achieved byadding a specific command line (with a call to a previously exported agent executable) to the user's domain logon script. Whenever the scriptis run, the agent is run on the remote asset as well. It generates a data file and places it into the specified directory. The resulting set of datafiles can then be imported to the TNI Storage either manually or automatically.

Setting up the logon script scanning

Go to the tab and click the button on the Sidebar (or open the window and go to the pScanner Set up logon script scan Options Logon scriptage).

Use the button to place a copy of the Windows agent ( ) into the shared folder of yourExport standalone agent... tniwinagent.exechoice. Make sure that the scanned assets have rights to the folder you choose.readPath to agent: contains the path to the agent's executable.In the Save path field, specify a separate folder that will contain the data files generated by agents. This folder should be accessiblefor writing from the remote assets.You can add a in order to prevent performance issues caused by the scan process starting simultaneously delay before scan start with autorun programs.Overwrite existing files: when enabled, the previous versions of data files will be replaced with the new ones when the assets arescanned repeatedly.

Any modification of the above parameters generates a command line for the logon script. You may and paste it into thecopy the commandlogon script manually, or let the program do it for you by clicking the button.Add the command to a script

A detailed step-by-step guide is available in the .FAQ

Automatically importing new data files

To automatically import the data generated by the logon script scan, go to options and specify the path to the folder containingAuto-import the data files (from the field in settings) into the field. This way, your Storage will always containSave path Logon script Import data paththe most recent configuration information from each computer in your domain. See the section to find out more about theData importautomatic import feature and its parameters.

Page 73: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Resident agent scanSetting up the resident agent

Resident agent settingsAgent activity schedule

Automatic resident agent deployment and uninstallationManual resident agent installation and uninstallationUpdating the resident agent

This type of scan uses TNI's Windows agent to automatically scan any Windows computer without the main unit's direct participation. It canbe arranged by installing the resident agent as a service on the remote computer. The service then performs scheduled scans and can sendthe data file – generated after each scan – via e-mail or FTP, or save it to a network share. The data files can then be imported to the TNIStorage either manually or automatically. The advantage of this scanning type is in the ability to collect information from computers that themain TNI unit has no or limited access to.

Setting up the resident agent

Go to the tab and click the button on the Sidebar (or open the window and go to the pScanner Set up resident agent Options Resident agentage).

Resident agent settings

Show resident agent deployment controls in the Scanner: allows to make the buttons and on theDeploy Remove resident agentSidebar in the Scanner tab visible or hide them. See .Automatic resident agent deployment and uninstallationAuto-update the agent or settings from a network resource (HTTP or SMB): allows to set the path to the folder on a web or fileserver that the resident agent can self-update or obtain new settings from. See .Updating the resident agentData transfer method: allows to select one of the 3 available protocols using which the scan results are to be sent. If the Do not sent

option is set, the files will be saved to the current folder where the agent is installed (for the automatically deployed agent, it'sdata ).C:\Windows\TNIRESIDENTAGENT\

Keep sent data in the 'Sent' folder: allows to disable automatic deletion of inventory files after they're sent. Files can be found in subfinside the current folder where the agent is installed (for the automatically deployed agent, it's older Sent C:\Windows\TNIRESIDENT

).AGENT\Sent\Use the button to place the agent's files into the folder of your choice for further onExport resident agent… manual deploymentremote computers. The files exported include a copy of the Windows agent the settings file and (tniwinagent.exe), (tniwinagent.ini) if required by the agent according to the settings (see below) 2 libraries and– – (libeay32.dll ssleay32.dll).

The two libraries will be exported along with the agent and necessary for its correct operation when any of the following combinations ofsettings are used:

Data transfer method is set to , is disabled, and either or is selected as the SMTP Send to MX server STARTTLS TLS/SSL Security level;Data transfer method is set to , is disabled, and an FTPS address is specified as the ;FTP FTP proxy URLAuto-updates from a network resource are enabled via HTTPS.

Agent activity schedule

Configured similarly to the .Scan scheduler

Automatic resident agent deployment and uninstallation

Automatic deployment is initiated from the Sidebar in the Scanner tab.

If is enabled, encryption will not be used even if an FTPS address is specified in the field.FTP proxy URL

When using FTPS, the agent will attempt to encrypt both the command channel and the data channel. If the server does notsupport this (and some servers won't), only the during further transfers.command channel will be encrypted

For both the SMTP and FTP transfer methods, TLS is not enforced. If the server does not support TLS, the transfer will beperformed over an unencrypted connection.

Scheduling the agent launch is essential. If the schedule is not created, no scans or data transfers will be performed.

Page 74: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1.

2.

3.

1.

2.

Automatic deployment is initiated from the Sidebar in the Scanner tab.

Before deployment, the Resident agent. Then add computers to the task list, select logins and click on theset up Deploy resident agentSidebar.

Deploy resident agent. The main TNI unit uploads and, depending on the data transfer andtniwinagent.exe, tniwinagent.iniauto-update settings, 2 files to remote computer folder and then connects to the Service.dll C:\Windows\TNIRESIDENTAGENTControl Manager to install and start the agent as a service.Remove resident agent. The main TNI unit connects to the Service Control Manager to stop and uninstall the resident agent service.Folder is deleted.TNIRESIDENTAGENT

Manual resident agent installation and uninstallation

Manual deployment can be used when the computer that needs to be inventoried is not connected to your network or cannot for whateverreason be deployed to automatically.

For manual deployment, the following steps have to be taken:

Set up the resident agent and use to place , and, if required by the settings, 2Export resident agent… tniwinagent.exe tniwinagent.ini files to an empty folder..dll

Move this folder containing the files to the remote computer where the agent has to be installed. Make sure that the resident agentfolder will not be deleted by accident.Start the resident agent service from the resident agent folder using the following command:tniwinagent.exe /installThe following switches can also be used during installation:/start will start the service right after the installation;/testrun will run a test scan when the service is started for the first time, and the resulting data will afterwards be transferred viathe selected protocol.

To remove the service, use the following command:tniwinagent.exe /uninstall

Updating the resident agent

The resident agent can be updated on the remote computers using one of the following methods:

Re-deploy the agent from the in TNI.Scanner

Configure . For this, enable this option from and specify the path toauto-updates from a network resource Resident agent optionsthe directory where the updated versions of the agent and the settings file will be placed. If only the settings need to be updated,then the settings file (tniwinagent.ini) alone may be copied into the specified directory, without the agent file.The resident agent automatically checks for updates 5 minutes before the scheduled scan and updates itself if necessary.

Example path for updating via HTTP:http://websiteaddress/folder/

Example path for updating via SMB:\\computername\folder\

Buttons Deploy and Remove resident agent will be displayed only if enabled in options, and if tasks have been Resident agent added to the task list.

When the resident agent is removed, all content from , including inventory files and logs, is deletedTNIRESIDENTAGENTpermanently.

A message will notify you when the service is successfully installed or uninstalled.

In this case, the resident agent doesn't need to be removed first because the contents of the agent's folder – including anysaved scan results – will be deleted.

It's not possible to update the agent without the settings file.

Page 75: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots
Page 76: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Common reportsThe mode is activated by clicking the Common reports Viewer & reports tab above the main area or by pressing Ctrl + 2.

In this mode, you can study each asset's configuration in detail by browsing the information collected during scanning. Information is sorted intocategories: Processor, System memory, Operating system, Installed software, Shared resources, etc.

This is also the right place to build full and brief reports for printing or exporting to popular formats. Reports can cover several assets andinformation categories at once.

Related topics:

Building reports: report types and information categories.Viewing information: searching , copying and exporting values.informationPrintable reports: preparing reports that can be printed or exported to PDF, HTML, RTF, ODT.Additional features: user information , adding custom notes to assets.overview

Page 77: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Building reportsGroup summaryReport on selected assets

1. Select one or several assets2. Select the report categories

To build a report on one or several assets in the Storage, you must first select them in the Network tree.

Group summary

To build a group summary, choose a group while in the mode.Single selection

The resulting report will provide an overview of the group contents:

The number of online and offline ; assetsThe list of assets that were scanned recently;The list of assets that were not scanned;The number of physical devices of each type;The list of virtual devices including the virtualization platform names;The list of computer models;The list of operating systems discovered in the group and the number of copies of each;The list of in the group.alerts

Clicking on the button to the right of the item in the Sidebar will open its settings, where unwanted overview items cangear Group summarybe disabled.

Report on selected assets

1. Select one or several assets

The Sidebar will display the list of information categories that can be used to build a report. Contents of this list depend on the number andtype of selected network nodes.If a single asset is chosen, a list of its snapshots will be displayed at the top of the main area:

In certain cases, the report will be rebuilt automatically in response to your actions. But whenever report customization takesseveral steps ( when selecting several assets one by one), no auto-updating will occur; press e.g. F5 or click the blue hint bar toupdate the report manually.

The gear button to the right of the Alerts item in the Sidebar opens the alert settings window.

Remember: to include only one asset in the report, it's enough to click it (when the Multiple selection mode is disabled); to includeseveral assets, you need to first enable the Multiple selection mode by ticking the Several assets checkbox.

Page 78: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

To switch between snapshots, use the Earlier snapshot and Later snapshot arrow buttons or select a date from the drop-down list. When thesnapshot is selected, the current report will be automatically rebuilt.

2. Select the report categories

Click one of the categories to see a report on it for the selected assets.To include several categories in a report, tick the Several categories checkbox. As a result, a checkbox for every category will be displayed.Tick the categories of interest and refresh your report.

The main categories are sorted into groups: Hardware, Software, Other.The contents of the main categories are described in the Collected information section.

Additional categories:

General information: an overview of network attributes, operating system and hardware;Alerts: detailed description of problems found on the asset;See the section for more information on how alerts work.Alerts The number to the right of the category title is the total number of alerts for the selected assets.Hover your mouse over the category to display a that takes you to the screen.Alerts gear icon Alert optionsCustom information: additional user-created fields;See for more info.Custom fieldsUsers: information about the user assigned to the asset.

When several assets have been included in a report, only the latest snapshots are used.

Page 79: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1.

2.

3.

Viewing informationSelectionCopyingExportSearching and filtering

After one or several assets in the Network tree and the report categories have been selected, information about the assets will be displayedin the main area.

Selection

You can select lines in the report in a normal way, use the mouse or keyboard keys Shift and Ctrl.To easily select a group of fields, click its header.

To select the whole report, press or use the option from the context menu.Ctrl + A Select all

When using the context menu options, only the selected lines are affected.

When using the and buttons in the upper right part of the main area, all displayed information is copied or saved whether it'sCopy Export selected or not.

Copying

Information can be copied in several ways:

Copy as textGroup titles, field names and values are copied. Nesting levels will be indicated by tabulation characters in the beginning of each line.The same character separates field titles from values.This method is used for copying by default. This is also the way information is copied when you press .Ctrl + C

Copy as CSVCSV (Comma-separated Values) is a text format that is convenient for storing structured information.

Copy values onlyField names and group titles will not be copied.

Export

You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.

Page 80: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.

Searching and filtering

To initiate a search, click the field at the top of the main area or press . The search will be performed instantly as you type.search Ctrl + F

When the checkboxFilter below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.

The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result isachieved by pressing the on the keyboard.up and down arrow keys

To save to and formats, build a PDF, HTML, RTF ODT printable report and export it.

Page 81: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Printable reportsTypes of printable reportsZooming and changing paper formatSearchCustomizing printable reportsPrinting and exporting

To switch to the click in the upper-right corner of the main area. Print preview, Printable reports

The will appear. Printable pages of the report on currently selected assets and categories will be displayed in the mainPrint preview toolbararea.

Close print preview (the on the right edge of the X toolbar) to return to the normal mode.

Types of printable reports

There are two types of printable reports:

Full printable reportThis report contains all the information displayed in the viewer. All titles, values and structure of fields remain the same.

You don't have to close the print preview to build another printable report. Simply work in this mode as you would in the normalmode. Selecting assets and categories will update the printable version automatically.

Page 82: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Brief printable reportThis report contains the most significant information on each of the selected categories. It's presented as a table, which makesonlyit more space-efficient compared to the full report. This report is great for making short overviews that will fit on a few pages.

To switch type, use toolbar buttons Brief and Full.

Zooming and changing paper format

The drop-down menu is used to set paper size and text orientation.Paper format

Scale controls are used to zoom the preview in or out.

Search

To initiate a search, click the field at the top of the main area or press . The search will be performed instantly as you type.search Ctrl + F

To highlight the next match, click the arrow button or press the on the keyboard. Next result down arrow key

Page 83: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

To highlight the next match, click the arrow button or press the on the keyboard. Next result down arrow key

The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result isachieved by pressing the on the keyboard.up and down arrow keys

Customizing printable reports

Click to open the TNI 3 options window on the page.Reports options Reports

The company title and logo, printed in the header, can be set as well. See .Storage properties

Printing and exporting

Click the button on the right side of the toolbar.Print

To save the report to a file, use the button. You can choose from and formats in its drop-down menu.Export PDF, TXT, HTML, RTF ODTClicking the button itself initiates an export to .PDF

Page 84: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3. 4.

Additional featuresUser information overviewViewing and adding notes

User information overview

If a single network node is selected, the name of the user assigned to the node will appear in place of the category in the Sidebar.Users Expand it via the button to the right and the user's image, full name and contacts will be displayed:[+]

Clicking on one of the contacts will copy it to clipboard (if it's an email address, the email client will be opened).

The button activates the mode, where you can edit user information or assign another user to the computer. For moreEdit user Edit / Usersdetails on this mode, see .Users

Viewing and adding notes

A text note can be added to each asset.

To do this:

Select a single asset;Click the button;Add noteEnter text;Press or click the button under the input field.Ctrl + Enter Save

To edit, delete or copy the contents of a note to the clipboard, use the corresponding buttons. You can also initiate note editing bydouble-clicking it. An alternative way of deleting a note is by clearing its contents.

Another way to add a note is via the screen.Network node properties

Learn to use notes more efficiently, display them next to assets in the Network tree and filter computers by the note contents: abo.ut Storage assistants

Page 85: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Another way to add a note is via the screen.Network node properties

Page 86: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2.

Table reportsWorking with a built report

Multi-column sortingChanging the column order and visibilitySearching and filteringExporting and copyingPrinting

The mode is activated by clicking the corresponding tab above the main area or by pressing . In this mode, you canTable reports Ctrl + 3build a table report that contains only the information you need.

To build a report:

Select one or several assets in the Network tree;Pick one of the from the Sidebar.report templates

TNI 3 has a number of standard report templates, but you can create your own template by clicking the button on the Sidebar.New template

A separate editor is used for creating and modifying templates. To learn how to use this tool, see the section.Creating a template

Working with a built report

Multi-column sorting

Beside the regular sorting by way of clicking on a column header, the tables in TNI 3 can be sorted bymany columns at once. Just sort by one column, then click another column header while holding Ctrl. Thearrows in column headers show their sorting directions. The numbers appearing beside the arrows showthe sequence in which the columns sort the report. You can sort by up to nine columns simultaneously.

Changing the column order and visibility

You can change the order of columns by dragging their headers.

You can hide and show columns using the context menu of the column headers.

Searching and filtering

To initiate a search, click the field at the top of the main area or press . The search will be performed instantly as you type.search Ctrl + F

When the checkbox below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.Filter

Use to be forwarded to next and previous results of the search.up and down arrow keys

Exporting and copying

To export or copy the table, use the context menu or buttons to the right of the search field. The report can be exported to text, CSV, HTML,XLSX.

Printing

To build a printable table report, click in the Printable reports upper right corner of the main area. Printable reports can be exported to text,PDF, RTF, HTML, ODT.

Related topics:

To build a report on all computers in the Storage, select the root node of the Network tree.

It's better to export or copy the report in the format if you're planning to import it into the spreadsheet processor.CSV

Printable reports preserve the arrangement, visibility and sorting by columns, as well as line filtering.

Page 87: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Related topics:

Creating a templateTemplate management

Page 88: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3. 4.

Creating a templateSelecting the object for your reportSelecting fields for the report

Fields of the Asset objectFields of other objectsFiltering fields by asset typesComplex fieldsSearching fields

Modifying selected fieldsAdding conditions

Creating expressionsCreating complex expressions

To create a table report template, click the button on the Sidebar. The template editor will be opened.New template

Object of reportThe list of available fieldsThe list of selected fieldsCondition builder

Every value retrieved by TNI 3 from remote assets can be displayed in a table report.

Selecting the object for your report

Start building the template by selecting one of the report object types.

Each single row of the resulting table report will correspond to a single object of the specified type.

A report can only be built for a single type of object. Selecting a new object will clear the list of selected fields. If you need todisplay fields from different types of objects (e.g. operating systems and RAM units), select Asset as the object, since it containsthe fields of all the other objects.

Page 89: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Selecting fields for the report

When you've selected an object of report, its properties will be listed as Available fields.

Click one of the fields to select it. The circle next to its name will turn green, and the field will be added to the list.Selected fieldsTo delete a field from the template, click the next to the field's name in the list of X Selected fields or click the field in the list of Availablefields once again. The circle will revert to gray.

Fields of the Asset object

This is the main object type, containing all the fields known to the program:

Network node properties: network attributes, date of the latest update, asset type, identification number, etc.;Data from the main categories: hardware, operating system, installed software, user accounts, etc.;Other data: , , .custom fields alert messages user information

Fields of other objects

All types of objects except for the belong to a hypothetical asset. Therefore, Asset attributes of the asset containing the object can beincluded in the report along with the fields of the object itself. Thus, the list of available fields is divided into two parts.

For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.

Page 90: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.

Filtering fields by asset types

Different types of assets have different sets of fields.the object for Windows-assets contains such specific fields as , , For example: Operating system Service pack Path to Windows directory Direct

, . Linux operating systems don't have these attributes, but they have and e instead.X version etc Core version Code nam

By default, the list of displays all fields of the chosen object, and icons of all types are highlighted in blue in the filter pane:Available fields

Click one of the icons to hide the fields specific to the corresponding type. Another click will display them again.

Complex fields

Some fields consist of several separate values.For instance, the of a monitor — e.g. " " — is a combination of its , , .Image size 47 cm x 30 cm (22") Width Height Diagonal

A complex field can be added as a whole, but you can add its elements independently as well.To view the elements of a complex field, click the button next to its name:[+]

Searching fields

Type a field name into the search field to only display the matching fields and the groups that contain them.

Modifying selected fields

Each selected field corresponds to a column in the resulting report.

The order of the fields defines the order of the columns. You can them by dragging them with your mouse (reorder first select the field andthen drag it).

To delete a field from the template, click the X next to the field's name in the list of Selected fields or click the field in the list of Availablefields once again.

Click the button to the left of the selected field's name or double-click the field to access its properties:[+]

Page 91: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Title: defines the name of the column. Full names of some fields are too long and inconvenient. You can change them to a moreappropriate and shorter title in this field. Later you can revert the title back to the default by clicking the icon on the right;RestoreSorting: Use this to automatically sort the column in any direction;Fix column: A fixed column remains on the screen when you scroll the table horizontally. You may fix any number of columns;Hide column: hides the column from the report. You may still use values in it for sorting or for filtering using (see below).conditions

Adding conditions

Conditions are used to filter the table rows based on the values from selected columns, or combinations thereof.

To add a condition, you first need to add some fields to the report and then create a simple or complex expression using the Conditionbuilder.

Creating expressions

To create the first expression, click Add condition.

An expression consists of a field, a type of comparison and, in most cases, a value. To build one, specify all the elements when prompted.

Different kinds of fields will provide different types of comparisons and values. Numeric fields can be compared with numeric values; stringscan be matched against masks or other strings; some values can be selected in the list.

Creating complex expressions

A complex expression is a chain of simple expressions and logical operators: .AND, OR, NOT

To create a complex expression, first create a simple expression as described above. Buttons and will appear below. Select"And..." "Or..."one to chain in the second expression. A logical group of expressions will be formed.

When the table report has been built, you can right click its header to hide or reveal columns via the context menu.

Page 92: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

To add another expression to the existing group, click the small button below. After, click if you want to make it a part of(+) "And..."/"Or..."a new logical group.

Keep adding expressions until you've built the desired condition.

In the Sidebar, templates with conditions are indicated by a small icon overlay.funnel

Don't forget to name your new template and press . The report will be automatically built and the template will appear in the Sidebar, toOKbe used when needed.

Page 93: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Template managementUsing templates built by the other users

Your table templates appear on the Sidebar in templates.Custom

Three buttons appear when you hover over a user template with your mouse:

Edit: opens the template in the editor;Copy: creates a copy of the template and opens it in the editor;This option is also available for the standard templates. It makes it easy to create your own template based on an existing one.Delete.

Using templates built by the other users

TNI 3 stores table templates as files with the extension in the subfolder of the program's application data folder (".table-template Templates\ \ "). It can be opened automatically by clicking the link{Path to Application Data} Total Network Inventory 3 Templates Open templates folder

on the Sidebar when in the mode.Table reportsTo use a template built by another user, copy its file to the directory. The template will become available in the modTemplates Table reportse.

Page 94: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Software asset managementThe mode is activated by clicking the tab or by pressing Software asset management (SAM) Software accounting Ctrl + 4.

This mode lets you view all the software discovered in your network, browse software installations, track software items, organize them andbuild a variety of software-related reports.

The owners of TNI 3 Professional have the ability to store software license data, manage licenses and see detailed reports on the compliancestatus of licenses, software items, computers or single software installations.

Related topics:

Getting startedSoftware managementLicense managementReports

Page 95: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Getting startedCreating a databaseImporting a database

The software database must be connected to the containing all the hardware assets you plan to involve in the software inventoryStorageprocess. Open your TNI Storage or create a new one and use the to fill it.Scanner

Switch to the tab.Software accounting

The database has not been created yet, so press the button on the Screen selector to switch to the screen.gear Manage database

Creating a database

Click Update software database, and the process of analyzing each asset in your Storage will start. A list of software will be retrieved fromassets along with the discovered license keys. You only need to do this manually once. Subsequent changes to your Storage will be handledautomatically.

Importing a database

If you've used in earlier TNI versions, TNI 3 will detect the old database and prompt you to import data from it.Software asset management

Click the button. The list of available items will appear.Start import

It contains important information ( tags and license keys). Click next to each item that you want imported into the new database.i.e. Import

Page 96: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3. 4.

Software managementTo access the screen, click the tab on the screen selector: Software management Software

This screen has all the tools necessary for browsing, searching, filtering, organizing and inspecting software items and separate softwareinstallations.

The main software listSoftware filtersSoftware publishersThe panelDetails

Related topics:

Browsing, searching and filtering softwareInspecting a software item

Page 97: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Browsing, searching and filtering softwareSearching softwareFiltering softwareThe list of publishersDisabling software filters

The displays every software item installed in your network.Main software list

The following information is displayed in the columns of the list:

Title & version: the name and publisher of each software item, as well as its platform: TNI analyzes both Windows and Mac OS X software. T, and status will also be displayed here.ags comments tracking

Copies: the number of installations of each software item discovered in your network.

Licensing: compliance status for items that have licenses linked to them. Read about licensing in the section.License management

Searching software

Use the search bar on the top-right of the workspace or press to activate . Start entering a software item title or aCtrl + F instant searchpublisher name to narrow down the list.

Page 98: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Filtering software

Available software filters can be found to the left of the list. To apply one of the filters, click it and select its mode from the menu:

OS filter: to display only the software made for a specific platform;Licensing filter: to display only the software with a specific compliance status (see );License managementTracking filter: to bring only the items that are tracked to attention, or only the ones that violate the tracking policy (see );TrackingAsset filter: to display only the software that’s or on one or a group of computers selected in the ;installed not installed Network tree

Tag filter: to display only the software with a specific tag (see the section );Inspecting a software item to learn about tags

Saved searches: to save frequently used search terms and quickly apply them to the software list; to add a search term, choose frAddom the filter menu.

Choose a title for your saved search and enter the desired term. You can also choose to create a regular expression to find items thatsatisfy a complex condition.

Active filters are highlighted in blue. To deactivate a filter, click it and choose No filter from the menu.

The list of publishers

Under the list of filters is the list of publishers. Next to each publisher is the number of software items released by them that are currentlyvisible in the main list.

The list can be used as a Click a publisher title to narrow down the software list. Click to deactivate thepublishers filter. Clear publishers filterfilter.

You can select with your mouse and/or and keys. This could be useful when a single publisher is listed underseveral publishers Ctrl Shiftseveral slightly different titles:

In the Copies column's cells two numbers are displayed: X/Y, where X is the number of installations on selected computersand Y is the overall number of installations.

Page 99: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Use the search bar above the list to quickly find publishers.

You can to the top of the list by hovering over an item and clicking the little icon to the left of it.pin an important publisher pin

You may use all filters described above in any combination.

An indicator next to the screen selector displays the number of at all times. currently visible software items

Disabling software filters

Whenever a filter is applied to the software list, a filter deactivator appears below the list. All filters can be cleared at once as well.

Filters can also be deactivated from their respective menus.

Page 100: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Inspecting a software itemTagsInstallationsCommentsAdditional features

Select one or several software items in the to inspect them in the Software list Details panel.

Tags

Click in the header of the panel to assign a tag to a software item. From the menu, choose one of the available tags or add aAdd tag Detailsnew one. A corresponding tag icon will appear as an indication that the tag has been assigned (it will appear in the software list as well as inthe panel).Details

You may assign an arbitrary number of tags to a software item. You may also assign a tag to multiple software items at once by firstselecting them in the software list.

To from the software, click the on the tag icon.remove a tag X

To completely, you have to remove it from all software items that have it. An easy way to achieve this is to use the todelete a tag Tag filterselect all such items and then remove the tag from all of them at once.

Installations

The panel opened in the mode displays a complete list of installations of the selected software and contains the followingDetails Installation information:

Computer where a copy was discovered; Installation date; Date of detection by TNI;Comment: you may add an arbitrary comment to any installation of any software.

The search bar allows to find installations by computer or by previously added comment.

The text displayed in the Computer column is the same as in the Network tree. Use the Network tree display menu to change it.

Page 101: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Click and make a selection in the Network tree to narrow down the installations list. Click to clear theOn selected computers All installationsfilter.

You can select any number of rows and press to copy them in plaintext format.Ctrl + C

Click for a quick printable report on all displayed installations.Installations summary

Comments

Select in the list of Details panel modes. A text field will appear on the right. You can type arbitrary text in it and it will be attachedComment to the software item when you switch away.

An icon in the software list indicates the presence of a comment. Hover over it to read the comment. Click it to go to the comment editor.

To delete a comment, simply erase the text.

Additional features

To quickly find out about unfamiliar software, click on the bottom-left.Google this software

If the publisher has specified the , the link will be available on the bottom-left.software website

Related topics:

Tracking software installationsMerging software items

Page 102: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Tracking software installations

Switch to the mode on the panel to access the tracking policy editor.Tracking Details

Tracking is used to mark software as or on all or only specific computers. Computers that violate the policy are easy to spotmust-have forbiddenand build reports on. Also, you can easily see the tracking summary for separate software items you choose to track.

By default, a software item is neither must-have nor forbidden: the corresponding lists in the policy editor are empty.

You may specify tracking rules of either kind (or both) by dragging assets or groups from the Network tree into the lists.

The list contains computers that are obliged to have the software installed on them. If a copy of the software is not found, aMust-haveviolation is registered.The list contains computers that are prohibited from having the software installed on them. If a copy of the software is found,Forbiddena violation is registered.

Immediately after adding computers to a list, you can see all violations at a glance.

You can apply the policy to all computers at once by selecting from the drop-down menu in the header of each list.for all

Click the next to a computer in the list to stop tracking it. In the mode, removing a computer creates an : the computer will notX for all exceptionbe reported as violating the policy regardless of the situation. To cancel the exception, remove the computer from the list.exceptions

Tracked software items are marked with a crosshair icon that appears to the right of its title in the software list and indicates its tracking status.You can limit the software list to at any time by applying the only tracked tracking filter.

To see all computers that violate tracking policy for any software item, use the .Tracked software storage assistant

For a quick printable report on tracking status of single software, click or to the right of the tracking lists.Tracking status Tracking violations

Page 103: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Merging software items

Some software items may represent different versions of the same software. Having duplicate records for the same entity is not alwaysconvenient or acceptable ( you can only link a license to a single software item, whereas in reality it could cover all versions of this software).e.g.In most cases, a publisher will fill the software info in such a way that a single item can be recognized with different versions in differentinstallations. is the tool designed to deal with other situations.Merging

Select all versions of the software in the main list. Use search and filters to find them faster. To make a multiple selection, drag your mouse oruse and Shift-clicking Ctrl-clicking.

In the panel, select Details Merge.

If necessary, enter the title and select the publisher from the drop-down list, check the list of versions again, tick the safety checkbox and clickthe button. This is what a merged software looks like in the main list: Merge selected software

You can later to the merged software in the same way. add new items

To remove an item, switch to the tab and click the next to the item you want to remove. Merged X

Click to break up the merger.Unmerge

This feature is NOT a replacement for groups. Do not merge software by kind, by purpose, by publisher, etc. You can use tags in thesecases. Only use merging for combining different versions of the same software into a single item.

Page 104: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

License managementThe licensing model in TNI The License management screen

The licensing model in TNI

License is a separate entity within TNI 3.

To keep track of licensed software, create a license, connect it to a software item and assign it to separate installations. You can also set uprules for each license to use in order to determine compliance status of these installations.

License key is another entity within a license. Creation of license keys allows for easy management, simple visual representation of allconnections and detection of new licensed installations on the fly.

TNI does not provide support for fixed licensing models due to a large variety thereof. What TNI provides instead are the uniform tools thathelp to fit the rules of any specific license to most real-life situations.

The License management screen

To access the License management screen, click the Licenses tab of the Screen selector:

This screen provides the tools for creating and managing software license assets, setting up licensing rules and keeping track of the licensingstatus of your software.

Page 105: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

The main list of licensesThe list of licensed softwareThe panelDetails

Related topics:

Creating a licenseSorting out auto-detected license keysLicensing software installationsEditing a license

Page 106: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Creating a license

The most common way to is to use the corresponding button under the Screen selector.create a license

A window will appear:

Name the license and use the search field or the list to find the software item to attach the license to, then click next to its title. In someSelectcases, the software will be selected automatically.

Fill in the license The most important are the switch and the number of .properties. Keys are mandatory/optional activations

When the setting is , the number of copies that a single key activates needs to be specified. The most common scenarios are:Keys are mandatory

Several keys, each activating one installation;One key that activates several installations (a.k.a. Volume License Key, VLK).

However, you're free to create a license with several volume keys or just one single-activation key. Any combination will work.

In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.

Page 107: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.

Copy the license keys into the field, each key on a separate line. You will be able to add or remove keys later, either by editing thisLicense keyslist or by manipulating key entities directly.

When the setting is , the total number of activations the license allows needs to be specified. License keys will be ignored. AKeys are optionalsoftware installation is considered non-compliant if the activation limit of the license is exceeded.

In any mode, click the field to see the button. By setting the activation number to infinity, an unlimited capacity license isactivations ∞ (infinity)created.

In any mode, set the to 0 to create a Use these to track unwanted installations. You may also store known pirateactivations pirate license.license keys in them.

You can assign several different licenses to a single software item.

Page 108: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Sorting out auto-detected license keys

TNI will automatically detect licensed installations of certain software along with the corresponding license keys. After switching to the scLicenses reen, you may see the following item at the top of the main area:

Click the item to display all detected licensed copies in the panel, sorted by software title and keys. From here, you can quickly find theDetailsinstallations you're interested in and create licenses for them (or select from the existing ones) by selecting from corresponding action menus.

If the same key is detected in several installations, the corresponding row may be expanded to display the list of computers.

Sometimes, identical license keys are found in installations of different software items. This may be an indicator that those items are differentversions of the same software and should be . A special case hint will appear: click it and all suspected software items will be selected andmergedyou'll be offered to merge them before creating a common license.

Pressing will bring up the window.New license for this software license creation

Page 109: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Licensing software installationsAssigning licenses to new installationsManaging installations under a licenseManaging licensed installations for a software item

Assigning licenses to new installations

Select a license in the main list and go to the page of the Details panel.Installations

For a newly-created license, the list of licensed copies is empty. On the left, click to display all unlicensedInstallations without licenseinstallations of the affected software.

Click next to each installation that belongs to this license (or select all needed installations and click once). You may alsoAdd to this licensewant to use the search field to find installations.Computers & keys

Managing installations under a license

Select a license in the main list and go to the Installations page of the Details panel. Click Installations under this license on theleft to view the status of licensed copies.

The information on this page depends on the way you've set up the licensing rules. The illustration shows one of the possible cases. You cansee that the first key was used on four computers while the rules only allow for one activation per key. Thus, the remaining three copies aremarked as being Over limit.

Note that TNI considers the first of the four copies to be If you know that is incorrect, you can use status switches to change it.Compliant.Click the green switch to turn it red: all copies will be and all the red switches will be unlocked. Now click the switch on theNon-compliant,legit installation to turn it green.

If, for any reason, you want a copy to be considered despite the fact that it does not violate the licensing rules, you canNon-compliantsimply switch it to red and leave it that way. Your decision will affect the overall compliance status of the license and of the software item.

Managing licensed installations for a software item

On the screen, select one software item and go to the page in the Details panel. From here, you can create and manageSoftware Licensinglicenses, assign installations to them, etc.

If a software item has a license attached, then, by default, all installations are expected to be assigned to it and to comply with its licensingrules. Any installation not assigned to a license is considered and is displayed as problematic. But there might be instances whereUnlicensed you'd like these to be . In that case, just tick the checkbox in the header of the group.green Consider compliant Unlicensed

Page 110: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

you'd like these to be . In that case, just tick the checkbox in the header of the group.green Consider compliant Unlicensed

Page 111: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Editing a licenseEditing the license propertiesCustom fieldsCommentsDeleting a license

Select a license in the main list.

Editing the license properties

Click the button in the panel header to open the window. This window is similar to the winEdit license Details License editor License creationdow and lets you change the affected software item, modify licensing rules, specify the price, purchase and expiration dates for the license oredit assigned license keys in text mode.

Custom fields

You can add any information to a license by creating custom fields. In the panel, switch to the page.Details Custom fields

Among other available field types is the You may attach any number of files to a license; the files will be copied into yourFile attachment.Storage and archived, available later at any moment by accessing the page.Custom fields

Comments

The page of the panel allows you to attach an arbitrary text to a license. This is a convenient place for the EULA in case youComment Details need to store it.

To , erase all the text.remove a comment

Deleting a license

To select it in the main list and click in the panel. delete a license, Delete license Details

Before they're deleted, TNI will ask you if you want to copy the license keys.

License deletion is irreversible. Its rules, license keys, custom fields and attached files will be lost.

Page 112: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots
Page 113: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

ReportsGeneral plain-text/CSV exportQuick reportsAdvanced reports

General plain-text/CSV export

Throughout the Software accounting tab, you can select data in any mode and right-click to access the copy/export menu (or press Ctrl + C):

This results in creating easy-to-process plaintext tables of data. The feature is available in:

the main ;software listthe main ; list of licensesthe ;list of software installationsthe ; list of licensed installationsthe and other sections.list of new licensed installations

Quick (MS Excel) is available from the copy/export buttons next to the main .Export to XLSX search bar

Quick reports

You will find quick report links on most pages in the Details panel:

Use these to build instant reports ready to be printed and exported.

Advanced reports

TNI features a Software report builder for creating advanced customizable reports that cover user-specified items.

See Report builder.

Page 114: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1. 2. 3.

1. 2. 3.

Report builderCreating a report Creating templates

To open the Report builder, click the button in the Sidebar.Report builder

The Report builder will be displayed in place of the panel.Details

Report typeReport description and propertiesReport content

Creating a report

Select a type of report from the list;If a report of the selected type can be customized, do it using the middle panel;In the area, fill each section with items that need to be included in the report by dragging them from the main lists.Report contentYou may switch between the and screens while in the mode.Software Licenses Report builder

Click A print preview will be displayed. You may then or it using the buttons on the top right. Available exportBuild report. print exportformats:

Plain textRich text, RTFPDFHTMLOpen document file, ODFMS Excel file, XLSX

Creating templates

Click in the area to add a link to the reportSave as template Report description and properties to the Sidebar. You can use it later to quicklybuild the report.

Page 115: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Change logThe conceptReading a change logLog summary, searching, filtering and printing

This mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing .Ctrl + 5

In this mode, you can choose an asset or a group of assets in the Network tree to see all the detected by TNI in their hardware,changes software and other parameters over the inventory period.

The concept

Every time an asset is scanned, TNI creates a snapshot of it and places it into the Storage alongside the previous snapshots. You can switchbetween various snapshots in the mode using the date/time box next to the asset name:Viewer & reports

You can manage snapshots from the corresponding section of the tab. The auto-deletion policy can be set up in ByEdit Options / Scanner.default, TNI stores up to 10 snapshots per asset and removes the ones that are more than 90 days old (except for the oldest one).

See .Snapshots

In order to build the change log, TNI compares the existing snapshots. The change log is not saved anywhere and is always built on the flyfrom available snapshots.

Reading a change log

To build a log, select one or several assets or a group thereof in the Network tree.

TNI displays the result of snapshot comparison in the form of a nested list.

The timeline is divided into sorted from the most recent to the least recent. Each interval has a starting and ending date and timeIntervalsfrom adjacent snapshots. It also shows at a glance how many changes have been detected in this period of time.

Intervals contain grouped by object types.Events

Events represent elements that have been:

Added,

Removed or

Changed.

These are examples of Change log events:

Page 116: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Log summary, searching, filtering and printing

Before generating a log, you can change the value to view the changes from a certain number of snapshots, or history depth select specific on the Sidebar to only view the changes for these objects. Decreasing the history depth value or selecting less objects canobjects

significantly increase the speed of generation if you store a large number of snapshots or if a large number of assets is selected.

After the log is generated, the Sidebar displays a full summary of logged changes.

Numbers on the right indicate how many elements of the corresponding type are present in the change log.

To untick its checkbox.hide all events of a certain type,

Almost every piece of data within the snapshots is monitored for changes. Still, some kinds of changes in the actual devices maynot be reflected in the log.

Page 117: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

To untick its checkbox.hide all events of a certain type,

To hover your mouse cursor over the corresponding type and click the buttoonly view events of a certain object type, Hide the rest/Show alln on the right. Click it again to quickly reveal the full log.

Use the to narrow the log down: press or click the at the top and enter a search term.instant search Ctrl + F search bar

Click next to the to print the change log. The printable version will respect all active filters.Printable reports search bar

Page 118: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1.

2. 3. 4.

Storage propertiesBasic propertiesInventory number generator

The properties of the current Storage can be edited by switching to the Edit mode (Ctrl + 6 and selecting the) Storage properties page in theSidebar.

Basic properties

A is its current title displayed in the Network tree, storage summary report and other places.Storage name

A and a can be displayed in the header of a . Company name Company logo printable report

To add a logo:

Prepare an image (JPEG, BMP or GIF);It's advisable to have a logo of reasonably good quality and with a white background.Click and select the prepared file;AddCrop unnecessary parts of the image in the editor that appears;Click .OK

Use buttons to the right of the logo to load another image or remove the logo.

Inventory number generator

TNI 3 can generate inventory numbers for the network assets automatically.

The inventory number may contain arbitrary text and the following macros:template

# : unique counter. This number will be unique among inventory numbers built with this template only;#* : globally unique counter (unique for the Storage);

To add leading zeroes, put several # symbols in a row.For example, if a template # generates , then ### generates ." " "3" " " "003"

%TYPE% : a short declaration of the device type (WIN, MAC, LINUX etc);%HOSTNAME% : asset's network name;%IP% : asset's IP address;%IP.Х% : values of a particular octet in the IP address ( is a number between 1 and 4).X

You can quickly add macros from the macros menu (the button to the right of the template string).

Generate for all generates new inventory numbers using the specified template for all assets in the Storage.

Automatically generate numbers for new assets: if this box is checked, the inventory numbers will be generated for all assets added to theStorage.

Reset counters: after resetting, the numbers generated and assigned using and templates will start from 1 again.# #*

You can assign arbitrary inventory numbers to assets without using templates or the generator by manually specifying their numbers on the screen.Network node properties

Page 119: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

1.

2. 3.

Network node propertiesNetwork propertiesAsset propertiesInventory number

To edit the properties of the selected network node, switch to the mode and select on the Sidebar.Edit (Ctrl + 6) Properties

To save the changes that were made on this page, you can do the following:

Click at the top of the page (you can also discard unsaved changes by clicking );Apply changes Undo

These buttons will only show up if any changes were made.Select other assets in the Network tree;Leave the page (for example, by switching to a different mode).

You can edit the properties of several assets at the same time by several network nodes or a group of nodes in the Network tree.selecting

Network properties

You can change the network node name and IP address here.

Click one of the buttons to get the network name by IP address or vice versa.Resolve

Check the box to access the asset by its IP address. Otherwise, the network name will be used for the access.Static IP address

Asset properties

Device type determines the asset's icon in the Network tree and can be included in the table report.

Virtual type specifies the virtualization platform. Its icon will be included in the reports and displayed next to the node name in the Networktree. Specifying any value other than marks the asset as .Physical device virtual

An is an arbitrary computer name. It can be instead of the actual network name or used in the reports.alias displayed in the Network tree

Description is the computer description obtained from the system properties of the asset.

A is a comment left by user. There's a special assistant that works with notes. Notes can be added or edited in the mo Note Common reportsde.

For more details, see , .Viewing and adding notes Note contents assistant

Inventory number

The items in this section work in the same way as in .Storage properties

The button creates an inventory number using the specified template.Generate

Arbitrary text can be entered into the field without the use of the generator when a single asset is selected.Inventory number

Be careful when editing the properties for several nodes at the same time. It's impossible to revert to the previous stateautomatically after applying the changes. Recovering lost data may take a lot of time.

A handy way of editing several network nodes in succession is by using hotkeys for selecting the next or previous network node: Alt + Up/Down arrow. The changes are applied automatically in this case.

You can hide all the virtual assets in the Network tree or, conversely, display only the virtual assets. There is a special assistant forthis.

Usually, you won't need to set the virtual type manually. TNI 3 automatically detects popular virtualization platforms.

Page 120: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

You can set up the template for automatic assignment of inventory numbers to new assets in the Storage properties.

Inventory numbers can be displayed in the Network tree as an additional field or in place of node names. They can be searchedand filtered as well. For more details, see Information display settings and Searching in the Network tree sections.

Page 121: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

AlertsList of alerts

Disk space alertAntivirus problemsFirewall problemsAuto-update statusService Pack is out of dateTrack software presence / absence

Using alerts

Alerts in TNI 3 are used to discover problems with the assets.

List of alerts

Disk space alert

One or more logical partitions on the asset are low on free space.

In the alert settings, you can specify the threshold for the disk space alert in gigabytes or as a percentage of the total disk space.

Antivirus problems

Antivirus software is not found or disabled, or its database is out of date.

Firewall problems

Firewall is not found or disabled.

Auto-update status

Auto-update is disabled.

Service Pack is out of date

...or not installed at all.

Track software presence / absence

Shows the list of tracked software.

Software tracking can be managed from the mode.Software accounting

Using alerts

The page in the window allows to disable each of the alert types and specify additional settings for the disk space alert.Alerts Settings

Alerts can be viewed in the mode:Common reports

Group summary contains a complete list of alerts for the computers in the group. All alerts in the Storage can be viewed in thesummary for . the root groupThe category in the displays all alerts for the selected asset or assets. The number of alerts for theAlerts report on selected assetsselected assets is displayed to the right of the category in the Sidebar. The shortcut to the Alert settings becomes available when youhover a mouse cursor over the category.

Alert messages can be included in the when creating a .Table report custom template

The displays Alerts presence assistant the number of alerts in the Network tree and allows to view a list of alerts for each asset in a hint, ashide all the devices that don't have any alertswell as to .

Page 122: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

When building a report on alerts, use this assistant to hide assets that don't have any alerts.

Page 123: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

SnapshotsViewing snapshot contentsSnapshot auto-deletion policyDeleting snapshots manually

A new configuration snapshot is created following each successful scan. Each snapshot contains information about the state of hardware andsoftware on the asset at the moment of scanning.

Viewing snapshot contents

Information collected at different times can be in the mode. Use the snapshot list at the top of the main area toviewed Common reportsbrowse different snapshots.

The other modes display information from the newest snapshot.

Snapshot auto-deletion policy

Generally, any number of snapshots can be stored for each asset.

In the , you can do the following:Scanner settings

Limit the number of stored snapshots: old snapshots will be deleted when the new ones are created;Specify : all snapshots older than the number of days will be automatically deleted.maximum snapshot age specified

The newest snapshot will never be automatically deleted. You can also make the oldest snapshot exempt from automatic deletion.

Deleting snapshots manually

To manage snapshots, switch to the mode and select the page.Edit (Ctrl + 6) Snapshots

Snapshots in the main area can be grouped in two different ways: or . To switch between them, click one of the buttons atby assets by datethe top of the main area. Click the same button again to reverse the sorting order.

When hovering the mouse cursor over an asset, date or snapshot, a little arrow button appears. Click it to display the pop-up menu for deleting snapshots.

When hovering over the menu commands, the snapshots to be deleted are highlighted red.

Page 124: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots
Page 125: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

Custom fieldsManaging custom fieldsCustom fields in the reports

Custom fields are additional pieces of data that can be attached to individual assets in the Storage. Any custom field consists of a field nameand its value. Values can contain arbitrary information of different type: text, numbers, prices or dates.

Managing custom fields

To manage custom fields, switch to the mode and select one of the two pages in the category:Edit (Ctrl + 6) Custom fields

Common fields: fields created here will be shared by all the assets in the Storage (each asset has its own value);Special fields: fields for the asset(s) selected in the Network tree.

To create a new field or a folder for fields, click .Add

If you hover the mouse cursor over any field or folder of fields, the button to the item appears on the right.X delete

To a field or folder, double-click its name.rename

You can change the order of fields and folders, as well as move items between groups, by dragging them using the mouse. Folders can benested infinitely, but are available for common fields only.

You can select several nodes in the Network tree to change the values of their common field(s) simultaneously. If multiple nodes are selectedand their values for the same common field are different, a Different values label will appear in place of the value. To replace these valueswith the same value, click this label and set a new, common value. The same is applicable to Special fields if the field name is the same forthe selected assets.

Custom fields in the reports

In , you can include all the custom fields in a report by selecting the category.Common reports Custom information

You can also add any individual common field as a table report column when creating a custom template.

Page 126: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

LoginsManagement of Storage loginsAssigning logins to network nodes

A login in TNI is a set containing a username and a password (or a community string for SNMP), which are used to access remote assetsduring scanning.

Management of Storage logins

Each TNI 3 Storage may contain a set of logins for all 5 protocols: .Windows, SSH, SNMP, Telnet, VMWare

To display it, switch to the mode and click on the Sidebar.Edit (Ctrl + 6) All logins

By default, there are only two standard logins in this set:

Current user: login of the Windows user running TNI 3;public: public SNMP community.

The standard logins cannot be changed or deleted.

To create a new login for one of the protocols, click the button below that protocol's list.Add

When adding a new login, an should also be specified alias along with the username and password (or community string for SNMP). An aliasis a unique identifier that will be used when working with a particular login in TNI 3. Aliases enable adding logins with the same usernames.

The added login is displayed in its protocol's list.

To edit a username or password, click on its field in the list. To change an alias, double-click it.

Page 127: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

You can specify the for each protocol by clicking the option button to the left of it. This login will be used when scanning assetsdefault loginfor which no logins have been specified explicitly.

Assigning logins to network nodes

If a network node is always scanned with the same login, it can be to it.assigned

To do this, select the asset in the Network tree, switch to the mode and click on the Sidebar.Edit (Ctrl + 6) Logins

All logins for the protocol that can be used to scan the selected asset will be shown. To assign one of them to the asset, click the small chain icon to the left of the alias. The icon and blue highlighting indicate that this login is assigned to the selected asset.linked chain

Any login can be assigned to several network nodes at once. To do this, select the nodes or their group in the Network tree and select theassigned login in the list.

Logins can be added and edited in the Scanner mode right before scanning. For details, see the Managing added tasks - Settinglogins section.

When remote assets are scanned for the first time, logins that successfully provided access are automatically assigned to them.

Page 128: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

UsersViewing and editing users

Adding, deleting and renaming usersEditing user informationSearching users

Assigning users to assetsDisplaying information about assigned users

TNI 3 allows to store information about your network users: their photos, names, addresses, contact information etc.

During the network scan, this information can be automatically obtained from Active Directory entities and user account settings on networkcomputers. Furthermore, you can create a new user record manually.

Viewing and editing users

The information about users which has been extracted from a domain or created manually is stored in the currently opened Storage. If a useris created based on a local user account, its information will be stored in the inventory file of the asset where it has been found.

To manage users, switch to the mode and select the page from the Sidebar.Edit (Ctrl + 6) Users

The user list will show up on the left side of the main area, with the information about the selected user on the right side. The user list isdivided into categories by type: , and .Domain users Local users Added manually

The users of the currently selected asset are displayed in the category. This category is hidden if multiple assets are selected.Local users

Adding, deleting and renaming users

To create a new user, click Add (+) over the user list and enter the username.

To a user, click the to the right of the username in the list. To a user, double-click the username in the list.delete X rename

Only manually added users can be deleted or renamed.

Editing user information

After selecting a user in the list, you can see related information to the right: a photo, personal and contact info and addresses. Thisinformation can be edited.

You can upload an avatar or a photo here. To upload an image, click in the Photo group and browse to a or file. InAdd JPEG, BMP, GIF PNGthe next window, select the square area of any size in the image and click .Done

Searching users

To find a user in the list, enter the keyword in the field. The list will be filtered as you type, highlighting the text that matches theFind users

query.

Page 129: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

query.

Assigning users to assets

Each asset in the Storage can be assigned to a single user. Each network asset is by default assigned to the local user that was logged intothe system during its first scan.

Any asset can be assigned one of its local users, any domain user, or any manually added user. Assigning a local asset user to another assetis not allowed.

To assign a user to an asset or several assets, select them in the Network tree and click the small icon next to the assigned user.chain

The indicates the assigned user.linked chain

Displaying information about assigned users

Information about the assigned user can be viewed in the mode (category ). Furthermore, the photo, full name andCommon reports Userscontact info of the user assigned to the selected asset can be .displayed in the Sidebar

Any user information field can be added as a column in the Table report (see the Creating a template section).

The search will be performed not only in user names but in all other information fields ( phone numbers, e-mail addresses ande.g.notes). After the search, when one of the users is selected, the matching text will be highlighted in the information area.

Page 130: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

OptionsGeneralScannerReportsAlertsAuto-importLogon scriptScan schedulerActionsSNMPResident agent

The Options window can be opened by clicking the corresponding button in the right part of the main menu bar.

General

Check the online status of assets periodically: automatic pinging of network nodes every few seconds can be disabled.

Scanner

Settings that control the scanner's behavior and the .snapshot auto-deletion policy

Reports

Here, the are presented.settings for printable reports

Alerts

On this page, you can enable, disable and set up the individual alerts.

More on alerts.

Auto-import

The settings for automatic data import are available here. It may be used to import logon script scan results or periodically updated results of external network scans in cases where no access to these networks is available from the currentlocation. This page allows you to set up automatic import of data when the program starts or at regular

intervals.More on data import.

Logon script

This page serves as a tool for exporting the standalone scanner and for generating a command line for the .Logon script scan

Scan scheduler

Settings that control the scheduler, a list of scheduled scan tasks and their configuration tools are available here.

See .Scan scheduler

Actions

Choose the way in which the (available from the Action list Network tree context menus) behaves and access the editable custom actions file. Also, here you'll find a summary of all templates and keywords of the action definition syntax: click to copy or hover with your mouse to viewa hint.

See .Actions

The company title and logo printed into the header are part of the Storage properties.

Page 131: Total Network Inventory Documentation - Total Software  · PDF file · 2016-09-129 1.2.1 Windows ... 111 1.8.8.4 Reports ... 121 1.8.13 Snapshots

SNMP

Enable or disable the full SNMP scan from this page. This mode allows to collect complete SNMP information from SNMP-enabled devices (i.e. perform an ). When this mode is disabled, only some basic information from the and sections is collected.SNMPWalk system interfaces

Also, you can add MIB files from your equipment vendors on this page. When an appropriate MIB file is added, you will be able to seemeaningful names for values instead of OIDs when viewing the information in the section. TNI supports automatic downloading ofSNMP treemissing dependency MIBs from a couple of online MIB databases.

Resident agent

Configure the resident agent for deployment to remote Windows computers or export it for manual installation from this page..More about the Resident agent here