Systems for the inventory of the PC park windows. Order, terms and rules of computer inventory. With the manual method, the label indicates

An accurate PC inventory is something you cannot do without in a company or organization. Managing the inventory of hardware updates and software of the entire computer park on paper or even in Excel spreadsheets requires significant labor and time even for small enterprises, not to mention large corporations with hundreds and thousands of computers. Not surprisingly, system administrators are often overwhelmed with these chores and perceive the work of maintaining records and statistics as a burden that prevents such valuable time and resources from being used for more important projects.

AIDA64's fully automated network inventory takes that burden off the shoulders of IT professionals. AIDA64 Business and AIDA64 Network Audit, designed for business users, allow you to perform a detailed inventory of hardware and software of computers on Windows base connected to the same corporate network. The amount of information collected by the program can be fully customized to the needs of the user, and administrators can choose between several templates (report profiles).

Configuration flexibility

The program does not require installation, therefore, it can be run from a shared central folder on any client in a domain environment. Of course, AIDA64 allows you to set the frequency of reporting (inventory) of computers: reports can be collected once a month, once a week, once a day, or after each user logon. Since AIDA64 supports parameters command line, the process can be fully automated.

Reports can be saved in open formats ready for further processing, as well as in the database SQL data. AIDA64 Network Audit and AIDA64 Business versions support the following report formats:

  • plain text format (.txt)
  • MHTML
  • ADO (for database insertion)

Integrated Audit Administrator

The Audit Administrator allows you to view and analyze the inventory of software and hardware computer park. Here you can also filter the data and create graphs. For example, system administrators can easily identify clients that do not meet minimum system requirements a new program being used, or for which the latest service packs are not installed operating systems and security systems. In the statistical report (which can be filtered by several criteria) provided by the program, you can immediately see the percentage of corporate computers with a certain type of processor, memory size, or installed version Windows.

You can also track changes between network audit snapshots taken at different times and detect changes in the hardware or software environment of computers. You can learn more about the AIDA64 Change Manager feature.

What are the clients saying?

"Replacing manual work, the program allows you to keep records and perform statistical tasks that were just a burden for IT professionals, and also frees up staff time for other work.

Josef Szabo, system administrator
Budapest Baths and Hot Springs Co.

If you are interested in the opinion of other customers about the AIDA64 program,


With the growth of the computer fleet in organizations, the danger of forgetting which peripheral device is inside a particular workstation, or even losing one of them, increases. The loss may occur due to the negligence of an employee of the technical support department or through the malicious intent of an employee who decided to improve the performance of his home computer at the expense of the firm. At the boss technical service or a system administrator, there are several ways to prevent this kind of incident. For example, you can seal the cases of system units and regularly inspect the integrity of the seals. You can make an inventory of components every morning (or evening). It may also be effective to install means of visual observation. All of these methods have their pros and cons. The main disadvantage of these tools is their increased labor intensity, as well as a very serious costly part (visual observation tools, seals, increased working time for control). There are no such disadvantages for another accounting option - software.

The Total Network Inventory system from Softinventive allows you to keep a complete inventory of the software installed on your computer, as well as control the hardware of computers in offices, small and large corporate local networks. Without leaving his seat, the administrator can scan the network and get comprehensive information about each computer. No pre-installed modules are required - they are installed automatically. The program allows you to scan the network both in real time (immediately) and, using a script, at the moment the client connects to the domain.

Total Network Inventory has both a wizard that is obligatory in our time, giving the user a very impressive result with a minimum of brain strain, and a manual scan mode that allows the user to configure all the parameters on their own. The capabilities of the scanner are impressive. Scanning is based on three types of information: hardware, installed software, and real-time system information (processes running in the system, services, shared resources, environment variables).

The appearance of the program resembles "Explorer", visually displaying the tree of the local network in the left panel, broken down into groups. The name of the group corresponds to the position of the workstation in the network hierarchy or is selected manually by the user. When a computer is selected, information about it is displayed in the central part of the main program window. Detailing about a particular subsystem is selected based on the marked category in the corresponding panel displayed on the right. The interface of the program is scalable and can be easily customized to your taste. A large number of visual themes, customizable panels, tools, as well as saturation with keyboard shortcuts will allow even the most fastidious user to adapt the program interface for themselves.

When the program is launched for the first time, the user will be offered options for further work: launching the network scan wizard, scanning the current computer, or opening the main window and further work. The main mode of operation for the system administrator will most likely be the work in the main window. However, in order not to manually enter computers, you can use the Network Scan Wizard in the first step.

The wizard offers two options for working: online scanning and logon script. Each option is accompanied by a detailed description, indicating which permissions and security policies should be enabled. Which path to choose depends on the specific situation.

When scanning computers using a logon script, the administrator can add the scanner program call string to the domain logon script, allowing collecting information about each computer that connects to the domain using this script (when the WMI service is installed and running). The wizard allows you to select shared folder, where the scanner program files are placed, and a folder for saving the scan results. Further, by modifying the logon script, the administrator can only wait for users to start connecting to the domain and from time to time control the information received using the program.

Online scanning has more steps to achieve the result. This type of scan includes two options for finding computers: "Network Neighborhood" and "IP Address Range". In the first case, the program looks through the tree of computers visible through the network environment. This option allows the administrator to see the structure of their network Microsoft Windows(workgroups, domains) and visually select nodes to scan. If the network environment is displayed slowly, or the administrator has several subnets to scan, or there is no NetBIOS connection to them, you should select the second path - "IP Address Range". This path will allow you to specify one or more address ranges that will be scanned. In each of the options, you need to specify a username with the appropriate privileges (having the rights to work with administrative resources).

Two options for searching computers - "IP address range" and "Network Neighborhood"

The result of the wizard will be a list of groups, domains, nodes, as well as detailed information about them. Additionally, an account card is created for each computer, which contains information about the owner and the computer:

  • computer name;
  • inventory number;
  • registered user;
  • computer cost;
  • Name of the organization;
  • date of payment and installation;
  • workgroup or computer domain;
  • IP address;
  • personal data;
  • additional information fields.

The program can automatically generate inventory numbers for any newly found computer, and also allows you to create additional information fields containing information about the peripherals connected to the computer (for example, source uninterruptible power supply, scanner, camera).

The completeness of the information collected by Total Network Inventory allows you to monitor any hardware or software component of the system, tracking any changes and responding to them in a timely manner. For effective work with data, the program provides a category panel, duplicated by buttons on the toolbar. The user, choosing a category, receives comprehensive information about it. For example, when you select the "processor" subcategory from the "hardware" category, the program will display everything about the processor, starting from its name and ending with the core voltage and the frequency of the L2 cache.

To organize all this ocean of information, the system provides a report builder. Using the "Reports" menu or by clicking the appropriate button on the toolbar, the user gets access to the tools associated with reports. The builder is able to summarize data in a convenient form based on user-selected criteria. The selection criteria in the program are conditionally divided into four main groups: general information, equipment, programs, and others. When switching to the reporting mode, the administrator has access to reporting tools, as well as multiple selection of criteria in the corresponding panel. Thanks to this, the operator of the Total Network Inventory program has many opportunities to control the current situation with the technical and software base of an office or corporate network. Depending on the realities of a particular company, the program provides an opportunity to use either pre-installed report schemes, or create your own, which most fully displays the required picture with equipment. The "Reports" menu contains schemes for displaying reports. They (reports) are divided into two groups: complete and brief. For example, a report on the criterion "Computer and motherboard" takes up a full page and contains detailed information. This is information about the system unit, motherboard(manufacturer, name, serial number, version), BIOS information (name, manufacturer, release date, SMBIOS version). In short form, this report takes up a third of the page and summarizes the same information, but without specifying dates, serial numbers, and so on.

The builder allows you to generate reports both for the entire network and for computers or groups selected in the "Network Overview" panel. You can include any number of computers and categories in the report in any combination, i.e. select multiple computers from different networks or groups, combining it with any combination of information categories. The administrator can save the received report in the internal format, as well as in the format text file ASCII, HTML, CSV and RTF file. If necessary, the report can be printed.

And finally, the program settings. Depending on the network security settings, as well as the network configuration, the program allows you to configure options for connecting to remote stations. This can either be using named administrative pipes over the SMB protocol, or connecting to the WMI service over the RPC protocol, or a combination of the two. The settings also allow the administrator to take into account the presence or absence of a DNS server on the network and determine whether to allow IP addresses during scanning or not. Many other settings allow you to very flexibly manage certain program parameters, depending on the current need of the administrator or the configuration of the local network.

So, in the matter of remote monitoring, ordering and saving information about the technical and software component of the organization's computer park, this product has been very successful. It has a reasonable price, good performance, an excellent processor of the collected information, as well as all the necessary tools for working in networks of varying complexity. We are confident that Total Network Inventory will save a lot of effort and nerves for a system administrator.








PROGRAM FEATURES

Create reports on the presence of certain programs and their number on computers. Control the correct use of programs and license keys, find prohibited and unlicensed software. Control startup folders, installation of OS updates and patches on computers.

Create reports on installed hardware on network computers. Track changes in PC configurations. For example, find out where there is less memory, where external drives or USB flash drives were connected. Print labels for PC cases with barcodes, their configuration and serial numbers accessories.

The program keeps track of all changes in the configurations of remote PCs. If someone removed or installed new program, connected or disconnected the device, the program will enter this information into the Change Log and you can analyze it. You can also receive email notifications of new changes.

Create a report containing computers with insufficient memory (for example, all PCs with less than 2 GB of RAM), small monitors, and old processors. A timely upgrade will save money and improve the productivity of the company's employees.

All data contained in the program can be uploaded to external DBMS for more detailed analysis. The program contains more than 100 ready-made reports, a filtering system and a report designer for selecting data by conditions and preparing almost any report. If you don't find what you need - contact us. :)

BENEFITS

Background collection of information according to the schedule.

Monitor software and hardware changes on computers.

Diagnosing problems on network computers and notifying the administrator.

More than 100 ready-made reports, export to PDF, Word, Excel, HTML.

Accounting for computer equipment and office equipment, spare parts warehouse, maintenance history of computers.

Supports several ways to collect information (for domains, workgroups and PCs without a network).

Web interface for remote access to the inventory database.

We have been working in the software market since 1998 (22 years). The development of the inventory program has been underway for 14 years since 2006!

SCREENSHOTS

VERSIONS: REGULAR AND PRO

Table of differences between versions:

If you already have a license for the regular version, you can upgrade to Pro by paying the difference in price between the license you have and the required Pro license.

When you purchase a license, you will receive a subscription to free software updates and technical updates. support for one year. We do not abandon our project and have been constantly developing it for more than 12 years (since 2006).

The program works in Windows environment XP/Vista/7/8.1/10; Server 2003/2008/2012/2016/2019. You can download and try 30 days trial version is free.

ACHIEVEMENTS

Winner of the "Russian Software 2014: Innovations and Achievements" award from PC Magazine.

14.12.2014: "PCs are interrogated in background, providing the administrator with up-to-date reports on components and programs installed on computers. The package allows you to download information from a PC behind routers and NAT, extract data from laptops and Android gadgets of mobile workers."


Winner of PC Magazine/RE. Best Software 2013"

12.12.2013: "A convenient system for inventorying IT infrastructure, which is especially useful in SMB companies with their "zoo" of equipment. The system fixes equipment brands, PC configuration, software versions and licenses. One of the most useful features is tracking changes in equipment, which makes it possible to detect exit from building, missing or replacing components."


02.10.2007: "A powerful tool for centralized inventory of hardware and software of computers on a local network. Allows you to discover computers on the network and collect information about them in a database... The ability to select computers in the report whose configurations satisfy a given condition simplifies tasks such as planning upgrades ."

Today it is difficult to imagine a company without IT infrastructure. Every organization has computers. And like any property, they need to be inventoried periodically. What are the features of the inventory of computer equipment?

Dear readers! The article talks about typical ways to solve legal issues, but each case is individual. If you want to know how solve exactly your problem- contact a consultant:

APPLICATIONS AND CALLS ARE ACCEPTED 24/7 and 7 days a week.

It's fast and IS FREE!

Absolutely all property of the organization is subject to inventory. But computers are quite different from other property values.

They are often part of the inventory. Often computers are upgraded. How to inventory computer equipment? What are the features of such verification?

What do you need to know?

Computers, office equipment, mobile devices and similar objects are something that almost no company can do without today.

Often, computer equipment is a fairly significant part of the property of the enterprise. And this means that it is necessary to carry out not only constant monitoring, but also periodic checks.

The presence of computers, as well as other property, is checked through an inventory. But how often should you check?

The legislation provides for a mandatory inventory at least once a year, before the preparation of the annual financial report.

All other cases of inventory checks remain entirely at the discretion of management, except for the occurrence of circumstances requiring an indispensable inventory.

In practice, organizations carry out the procedure in late December - early January. In addition, the Accounting Regulations provide for the possibility of inventorying fixed assets once every three years.

Here it is worth considering that a computer is a complex mechanism and it consists of many parts. Often repairs, upgrades, replacements of individual parts are made.

The accountant is aware of all these operations only in general terms, since the prerogative of servicing computers still belongs to representatives of the IT sphere.

Thus, in a year the computer can change beyond recognition and it will be very difficult to restore the accounting support for all transactions carried out.

It is better to inventory computers and similar equipment as often as possible. The order and timing of the inventory are determined by the head.

But it is advisable to check at least once a quarter. Moreover, there are many special computer programs, allowing to make an inventory of computer equipment in a matter of hours.

Basic terms

Inventory of property involves an audit, during which the actual number of objects is checked against the data on their presence in accounting.

Inventorying computers is no different from checking any other property. But we must understand that the concept of "computers" refers to all computer equipment available to the enterprise.

Computer technology is a complex concept. It describes the entire spectrum of computer technology, from a conventional smartphone to a heavy-duty computer.

Refers to computer hardware and software that is installed on a computer to perform certain functions.

In general, computer equipment and the programs running on them constitute a single hardware and software complex.

If we talk specifically about the types of computer technology, then these are:

For what purpose is

An inventory of computer equipment is necessary, first of all, to check the compliance of its quantity. But not only... In the course of check it is possible to find out how effectively this or that equipment is used.

This helps to optimize the cost of computer and software. Perhaps the organization does not have the necessary computer equipment or the necessary programs, which leads to a decrease in labor productivity.

Or, on the contrary, the enterprise has too many unnecessary computers and some programs are not used at all. Also, the inventory of computer equipment allows you to determine how much the cost of individual objects has changed.

It may turn out that some computers have become unusable due to their dilapidation and they need to be completely written off. The cost of other computers may increase due to upgrades.

The result of the inventory may be getting rid of unnecessary computer equipment and acquiring the necessary computers or programs.

The legislative framework

The inventory of computers is regulated by the regulatory framework regarding the general procedure for inventory.

Legislatively, the inventory procedure does not differ from the usual inventory of fixed assets. Inspection is also carried out in mandatory cases and according to the schedule approved by the organization.

The results of the check are drawn up in standard - unified forms established.

Emerging nuances

The nuances of the inventory of computers are that often computer equipment is moved from one office to another, responsible persons change, individual computers are portable portable devices.

Therefore, it is rather difficult to link with respect to location and accounting to computers. Another nuance in the identification of objects. In accounting, computers are registered according to their model, brand and inventory number.

Video: taking inventory

Only an IT specialist can distinguish a certain model by eye, and comparison with the inventory number will take a lot of time, especially if several identical models are used.

Therefore, to simplify the inventory, each individual object of computer equipment must have a special label. It must contain all the necessary data, including the name and inventory number.

Order of conduct

Conducting an inventory of computers is possible manually or with the help of automated accounting programs.

In both cases, it is necessary to carry out preparatory procedures. In particular, this concerns the simplification of identification. This is achieved by supplying each object with a label.

With the manual method, the label indicates:

  • name of the owner (organization);
  • the name of the object according to accounting (often in accounting, the name is very different from the real name);
  • inventory number of the object;

In an automated process, based on a database of computer technology, labels are printed for each object with the presence of bar codes. These are then glued onto the appropriate technique.

The usual scheme for inventorying computers, in general, looks like this:

Published about the need for an inventory of computers The document indicates the period of verification, its procedure and the composition of the inventory commission
The commission receives in the accounting department forms of statements with credentials Direct verification is carried out. With manual inventory, data on the actual availability is entered into the act. At the same time, it is not advisable to check in the sequence of the accounting inventory, since this way you can lose sight of individual objects. It is better to move around the room (rooms) and mark all available computer equipment along the way. With automated accounting, it is enough to go through the verification area with a scanner and read information from barcode labels. Then the information is transferred to the computer used for inventory, where the verification certificates are filled in automatically.
Verification of actual availability and accounting data is carried out The reasons for the identified discrepancies, the guilt of the responsible persons are determined
If there are inconsistencies Amendments to accounting

As a program that supports inventory through barcoding, you can use the 1C program "Equipment Accounting".

To get acquainted, you can download the demo-base of the program or watch the presentation "Equipment Accounting 1.0".

An equally popular solution is the Hardware Inspector program, which allows you to inventory computers using a barcode scanner.

Inventory of computers over the network

Computers in general are designed to simplify human work. This quality applies to inventory as well.

At this time, to conduct an inventory of computers, it is not at all necessary to move around the enterprise with a piece of paper and a pencil or a scanner.

What’s more, you don’t even have to leave your desk to check it out. Suffice it to use the inventory programs of computers on the network.

To implement such a program, all computers available to the organization must be connected to a single network. The process is more than simple:

An important advantage of the program is the ability to use both ready-made report templates and those developed independently.

It is noteworthy that in this way it is possible to carry out an inventory absolutely imperceptibly. The scan is performed in the background and no action is required from the users of the devices being scanned.

The speed of the inventory by the program and the accuracy of the data collected are especially significant. Even in a very large organization, an inventory of computers on the network is carried out in the shortest possible time.

In this case, the maximum amount of data is collected regarding the hardware and software of the device. That is, using the program, you can inventory not only the computers themselves, but also the software installed on them.

Another feature of the computer inventory program over the network is that in most cases, scanning can be scheduled according to a schedule.

At the indicated moments, the program will scan and provide ready-made reports. This will allow you to always be aware of the state of computer technology in the organization.

What is the program for this

There are many programs for inventorying computers on the network. Each of them has its own characteristics, but the general algorithm of their work is approximately the same.

As an option for the free version of such a program, you can download and apply the program "Inventory of computers on the network."

You can also keep an inventory of computer equipment using the IT Invent program. This product supports network scanning and automatically collects data from computers in the public network.

Using the program, you can inventory any computer equipment in several branches, if the objects are connected to a single database.

In addition, the program has many other functions that facilitate the accounting of computers. If you want to use the full range of functions, you can buy the program.

And if necessary, you can use free version IT Invent. Another program of this type is 10-Strike: Computer Inventory.