Network scan in progress
- Audit large numbers of networked computers quickly by placing one agent on a network server - and activate it with a simple command in the login script. Each computer runs the agent on login and the resulting audit data collection is centralized
- If you don't have network rights, bulk email users with a link to a single network-located agent -- with a simple instruction to click the link. This activates the agent on the target
- Walk around audit. Place the agent on a zip disk, floppy disk, CD-RW or even the network. Visit each target and run the agent manually. This method is often used by third party auditors as it is also easy to collect administrative information or distribute asset stickers
- Email remote, standalone users with the actual agent -- with instructions to run the agent and return the audit data files which can then be imported into iInventory.
Since 1994, Scott Lowe has been providing technology solutions to a variety of organizations. After spending 10 years in multiple CIO roles, Scott is now an independent consultant, blogger, author, owner of The 1610 Group, and a Senior IT Executive with CampusWorks, Inc. Scott is available for consulting, writing, and speaking engagements and can be reached at firstname.lastname@example.org.