Documente Academic
Documente Profesional
Documente Cultură
2
1.1 Techpaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Scanning Microsoft Windows assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.2 Scanning Unix-based assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.3 Scanning other network assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Collected information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.1 Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.2 OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.2.3 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2.4 FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2.5 ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.2.6 Generic devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.3 FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.4 Feedback and support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.5 Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.6 Trial version limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.7 Installation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.8 User manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.8.1 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.8.1.1 Data import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.8.2 Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.8.3 Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
1.8.3.1 Selecting a node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
1.8.3.2 Altering the Storage structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.8.3.3 Information display settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.8.3.4 Searching in the Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
1.8.3.5 Storage assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.8.3.5.1 Working with assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1.8.3.5.2 Description of assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
1.8.3.6 Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
1.8.3.7 Custom assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.8.3.8 Synchronization with Aсtive Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
1.8.4 Network scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.8.4.1 Adding scan tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
1.8.4.2 Managing added tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
1.8.4.3 Scan process and scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
1.8.4.4 Saving, importing and exporting tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
1.8.4.5 Scan scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.8.5 Scanning using agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.8.5.1 Manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
1.8.5.2 Logon script scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
1.8.5.3 Resident agent scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.8.6 Common reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
1.8.6.1 Building reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
1.8.6.2 Viewing information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
1.8.6.3 Printable reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
1.8.6.4 Additional features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
1.8.7 Table reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
1.8.7.1 Creating a template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
1.8.7.2 Template management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
1.8.8 Software asset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
1.8.8.1 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
1.8.8.2 Software management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
1.8.8.2.1 Browsing, searching and filtering software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
1.8.8.2.2 Inspecting a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
1.8.8.3 License management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
1.8.8.3.1 Creating a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
1.8.8.3.2 Sorting out auto-detected license keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
1.8.8.3.3 Licensing software installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
1.8.8.3.4 Editing a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
1.8.8.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
1.8.8.4.1 Report builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
1.8.9 Change log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
1.8.10 Storage properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
1.8.11 Network node properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
1.8.12 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
1.8.13 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
1.8.14 Custom fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
1.8.15 Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
1.8.16 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
1.8.17 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Getting started 6
Software
6
management
Printable reports 4
Alerts 4
Snapshots 4
License
4
management
Change log 4
Viewing information 3
Storage properties 3
Selecting a node 3
Techpaper
List of terms
Minimum system requirements for the admin unit
Database mechanism
Scan technology
List of terms
TNI 3: stands for Total Network Inventory 3 and represents its name and trademark.
Admin unit (main unit): a GUI application operated by the user. It's installed on a workstation or a server computer and is used for gathering
inventory information, viewing it and including into reports.
Scanning: a process of obtaining information on hardware and software from computers and other devices.
RAM 512 MB
Network TCP/IP
Screen 1280x1024
Database mechanism
The TNI 3 database (a.k.a the Storage) is a folder created by the user on a hard drive. Each inventoried asset is represented in it as a
separate file of specific format. Auxiliary data is stored separately from the asset files and includes user information, logins and passwords for
remote access, etc. All data is compressed and encrypted.
It's possible to create several separate storages and switch between them at any time. Asset-related data can be copied to another storage
by copying the corresponding file.
Scan technology
Scanning Microsoft Windows assets
Scanning Unix-based assets
Scanning other network assets
Scanning Microsoft Windows assets
Technology
Remote scanning via the SMB protocol
How it works
Requirements for the target machine
Remote scanning via the RPC protocol
How it works
Disadvantages
Requirements for the target machine
Manual scanning
How it works
Additionally
Requirements for the target machine
Scanning overhead
Low-level hardware scan
Technology
Windows Management Instrumentation (WMI) is Microsoft's implementation of Web-Based Enterprise Management (WBEM) standard for
Windows operating systems.
Using WMI technology, TNI 3 obtains software and hardware information, as well as computer registry data.
WMI service is pre-installed on Windows 2000 and higher. For Windows NT, Windows 95 and Windows 98 it is available for
download from the Microsoft website.
Manual scanning is the only way to collect information from computers running Windows XP Home Edition. This OS cannot be
accessed remotely due to its limitations. Any connection attempt will result in the Access denied error.
How it works
1. Executable tniwinagent.exe (an agent) is uploaded to the administrator's shared folder admin$ on a remote computer.
2. TNI's main unit connects to the Service manager on the target PC, installs the agent as a service and starts it.
3. The agent collects information and saves it into a compressed file. Then it stops.
4. The main unit imports the resulting file into the storage.
5. The agent service is uninstalled, and the executable is deleted.
No traces of scanning will remain on the target PC after the scan is complete.
RAM 64 MB
HDD space 10 MB
Services Server
Windows Management Instrumentation (WMI)
Remote Procedure Call (RPC)
Remote Registry
Resources ipc$
admin$
Protocols SMB
NetBIOS (for Windows NT4)
TCP/IP
How it works
TNI's main unit connects directly to the WMI service on the target PC via the RPC protocol and collects information remotely.
Disadvantages
This method has no advantage over the scanning via SMB. It is recommended for use only when, for whatever reason, the SMB
protocol can't be used.
RAM 64 MB
HDD space 10 MB
Protocols RPC
TCP/IP
Windows version 2000, XP Pro, Vista, 7, 8, 8.1, 10, Server 2000/2003/2008/2012(incl R2)/2016
Manual scanning
How it works
1. Executable tniwinagent.exe (an agent) is manually copied to the target computer and launched. When the scanning is complete, the
agent creates a file containing the collected information.
2. The resulting file must be moved to the TNI 3 storage.
Additionally
The agent can be run by a domain logon script, by the task scheduler or on Windows startup.
/path:"\\server\share" allows to set a path to a folder where the data file will be placed;
/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;
/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;
/overwrite overwrites the data file in case the target folder already contains its older version.
RAM 64 MB
HDD space 10 MB
Scanning overhead
All scanning methods require CPU time and execution of a variety of disk operations, which is why an insignificant loss of efficiency may occur
while scanning a computer. Scanning usually takes 1-2 minutes.
RPC 10 MB 18 MB
Numbers in the table represent average values including service data size (i.e. packet headers, etc.).
High traffic during RPC scanning is a result of WMI's collection of data from the registry, and it depends on the number of applications and
services installed on the remote computer.
There's a known issue with the Intel storage driver (iastor.sys). A bug in this driver causes a BSOD during low-level disk subsystem scanning.
A workaround has been implemented for this: TNI skips low-level disk scanning when the driver is detected. This behaviour can be changed
in the program settings or using command-line switches in the standalone agent.
Scanning Unix-based assets
Technology
Remote scanning via the SSH protocol
Manual scanning
Technology
Computers based on OS X, Linux, FreeBSD, and ESX/ESXi operating systems are scanned by agents. An agent is an executable uploaded via
the SSH and SCP/SFTP protocols to a remote computer and gathers information about its hardware and software using the operating system
utilities.
The SSH protocol enables exchanging data between two hosts using a secure channel. Currently, there are 2 versions of this protocol: SSH-1
and SSH-2. TNI 3 uses SSH-2 for scanning. Most modern UNIX systems allow use of this protocol.
The SCP and SFTP protocols are used for file transfers through a secure channel between two hosts. They are components of most modern
SSH servers. TNI 3 supports both of these protocols.
How it works:
the remote computer runs an SSH-2 server (on TCP port 22) that supports SFTP or SCP, and firewall allows access to it;
the remote user is allowed to access the SSH-server (the AllowUsers option). If scanning is done under the root user, the PermitRoot
Login option should be set to yes;
the remote user must have administrative privileges (for Linux: be in the sudoers list if the user is other than root).
The operating system should provide the agent with a number of utilities so it can collect all needed data from the computer. The list of
utilities depends on the operating system configuration. If one of the utilities is not installed on the scanned computer, a message will be
displayed in the appropriate category of the Common reports view.
Furthermore, the operating system should be able to provide standard C++ library libstdc++.so.6.
An approximate list of utilities needed to collect the data on a Linux-based computer: arch, cd-info, df, dmidecode, dpkg-query /
emerge / pacman / pkgtool / rpm, get-edid, hdparm, head, ifconfig, iptables, iptables-save, ls, lspci (pciconf for FreeBSD), lsusb,
ps, pvdisplay, pvscan, route, rpm, swapon, uname.
Manual scanning
How it works:
1. Executable tniwinagent.exe (an agent) is manually copied to the target computer and launched. When the scanning is complete, the
agent creates a file containing the collected information.
2. The resulting file must be moved to the TNI 3 storage.
Technology
Many network assets are not covered by the SMB/RPC/SSH protocols. These are the assets that either don't run Windows or Unix-based
operating systems, or run unsupported systems, or run simple Unix-based systems without the SSH interface. These could include network
printers, managed switches, routers, xDSL modems, IP phones, wireless access points, etc. Most often these devices support either SNMP or
Telnet or sometimes both, and in such cases they can be scanned by TNI using these protocols.
TNI considers any devices that could not been scanned via other protocols as potentially SNMP-compatible, therefore, it tries to scan them
using SNMP, if it's allowed by the scanner settings. By default, when the public community is specified, it tries several well-known
communities until it succeeds:
admin
cisco
mngt
private
public
snmpd
If a Telnet login is specified, TNI checks if TCP port 23 is open. If positive, TNI will try to scan the device using the Telnet protocol.
Currently TNI supports Telnet scanning for the following systems: BusyBox.
Collected information
This section contains an overview of information collected by TNI 3 from various types of assets:
Windows
OS X
Linux
FreeBSD
ESXi
Generic devices
Windows
Hardware
Software
Other
Here you can see an overview of data collected from Windows OS assets.
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Hardware
System
Computer parameters, chassis, motherboard (including chipset), BIOS.
System slots, memory slots, ports.
CPU
Name and manufacturer, clock speed, socket designation, code name, TDP, number of cores, cache memory, etc.
System memory
General information on physical memory, virtual memory and paging files. Number and availability of memory slots.
Memody modules: capacity, manufacturer, type, speed, form-factor, serial number, manufacture date, etc.
Video system
Video adapters: name and manufacturer, chipset, video memory, current video mode, drivers.
Monitors: name/model, manufacturer, manufacture date, serial number, image size and diagonal, picture aspect ratio,
video input, etc.
Audio system
Name and manufacturer of the sound device, driver version and date.
Storage details
Hard disk drives and removable media: model and manufacturer, interface, media type (HDD/SSD/removable), size,
serial number, S.M.A.R.T. data (where available).
CD drives: model and manufacturer, device type, read/write support.
Floppy-disk drives
Logical partitions: disk letter, drive and media type, file system, size, free/used, serial number, etc.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, type, connection status, DHCP,
host name, etc.
Modem: name, provider, port, type, etc..
Peripheral devices
Printers (including virtual printers): name and manufacturer, paper size, driver, status, resolution, port, attributes, etc.
Network printers: source name, server, user account.
Keyboards: manufacturer, layout, number of keys.
Mice and other pointing devices: manufacturer, interface, number of buttons.
USB devices: all USB devices with USB version, driver manufacturer and version, serial number (where available).
Devices
The full list of devices divided into classes. It duplicates the data structure of Windows device manager.
Software
Operating system
Name, version, architecture, registered user, install date, country code, locale.
OS type, product key, suite, SKU, supply channel.
Internet Explorer version, DirectX version, etc.
Installed software
Name, publisher, version, install date and source, uninstall string.
For Microsoft Office products (including Project and Visio): service pack, product ID, product key, supply channel.
System updates
ID, description, comments, Service pack version, install date and user name.
Security
Antivirus, firewall, antispyware status.
Auto-updates status.
Antivirus, firewall, antispyware: name, publisher, version, status.
Directory list in the Program files folder
Databases
Detected database servers (if any): MS SQL Server (including edition), MySQL, PostgreSQL, Oracle Database, Firebird.
Audio and video codecs
Name, manufacturer, version, description.
Virtual machines
For discovered VMware Workstation virtual machines: ID, guest OS type, total size, storage size, state, config file,
hardware compatibility, memory, processors, HDD details, CD/DVD details, network adapter details.
Other
System and user environment variables
Shared resources: disk drives, print queue, IPC admin, etc.
Name, type, path, comments.
Autorun applications
Application name, startup string, user account, location.
Services: file system drivers, kernel drivers, own and shared processes
Name, service name, executable, startup type, status, logon as...
Processes
Name, command line, executable path, started on, threads number.
User accounts
Name, full name, domain, description, activity, attributes.
OS X
Hardware
Software
Other
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Hardware
System
Computer parameters and chassis, memory slots.
Power supply settings.
CPU
Name, clock speed, number of cores, cache memory, etc.
System memory
Physical memory size.
RAM units: capacity, manufacturer, type, speed, etc.
Video system
Video adapters: name, video memory.
Monitors: name and manufacturer, size and image size, picture aspect ratio, video input, etc.
Storage details
Hard disk drives and removable media: model and manufacturer, interface, size, number of partitions, serial number.
CD drives: model.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
Peripheral devices
Printers: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.
USB devices: name and manufacturer, version, speed.
Software
Operating system
Version, architecture, update, kernel, run time.
Software
Version, install date, location, execution environment, properties.
Security
Firewall status.
Other
Environment variables
Processes
Name, command line, process and parent process ID, user account.
User accounts
Name, full name, ID, home directory, shell.
Linux
Hardware
Software
Other
Here you can see an overview of data collected from Linux OS assets.
This list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describing
which data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.
Hardware
System
Computer parameters, motherboard and BIOS, memory slots, ports.
CPU
Name and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memory
Physical memory size and swap partition.
RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.
Video system
Video adapters: name and manufacturer, video memory.
Monitors: name and manufacturer, image size and diagonal, picture aspect ratio, video input, etc.
Storage details
Hard disk drives and removable media: model, interface, number of partitions, size, serial number.
CD drives: model and manufacturer, location, availability, media support, features.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
List of DNS-servers.
Peripheral devices
Printers: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.
USB devices: name and manufacturer, speed.
Devices
Devices divided into types; their names and flags.
Software
Operating system
Name, architecture, code name, description, kernel, run time.
Software
Software divided into groups.
Name, package name, version, source, URL.
Security
Firewall rules presented as a hierarchy.
Virtual machines
For discovered VMware Workstations for Linux, VMware ESX, and KVM (only partial KVM information is collected): ID,
guest OS type, total size, storage size, state, config file, hardware compatibility, memory, processors, HDD details,
CD/DVD details, network adapter details.
Other
Environment variables
Processes
Name, command line, process ID and parent process ID, user account.
User accounts
Name, full name, ID, group, home directory, shell.
FreeBSD
Hardware
Software
Other
Here you can see an overview of data collected from FreeBSD OS assets.
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describing
which data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.
Hardware
System
Computer parameters, motherboard and BIOS, memory slots, ports.
CPU
Name and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memory
Physical memory size and swap partition.
RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.
Storage details
Hard disk drives and removable media: model, interface, number of partitions, size, serial number.
CD drives: model and manufacturer, location, availability, media support, features.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
List of DNS-servers.
Devices
Devices divided into types; their names, vendors and classes.
Software
Operating system
Name, architecture, kernel, uptime.
Software
Software divided into groups.
Name, version, description (properties).
Other
Environment variables
Processes
Name, command line, process ID and parent process ID, user account.
User accounts
Name, full name, ID, group, home directory, shell.
ESXi
Hardware
Software
Other
Here you can see an overview of data collected from VMware ESXi assets.
ESX is a far more generic Linux system compared to ESXi, and it's scanned by the same Linux agent as other Linux systems. That's
why you can find the list of data collected from ESX systems in the Linux section.
The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.
Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describing
which data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.
Hardware
System
Computer parameters, motherboard and BIOS, memory slots.
CPU
Name and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memory
Physical memory size.
RAM units: capacity, type, form-factor, bank label, locator.
Storage details
Hard disk drives: model, interface, number of partitions, size, firmware revision.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
Peripheral devices
USB devices: name and manufacturer, speed.
Devices
Devices divided into types; their names and flags.
Software
Operating system
Name, architecture, description, uptime.
Software
Name, publisher, version, install date.
Security
Firewall rules.
Virtual machines
ID, guest OS type, total size, storage size, state, config file, hardware compatibility, description, memory, processors,
HDD details, CD/DVD details, network adapter details.
Other
Environment variables
Processes
Name, command line, process ID.
User accounts
Name, full name, ID, group, home directory, shell.
Generic devices
SNMP
Telnet
Here you can see an overview of data collected from generic assets via the SNMP and Telnet protocols.
SNMP
General information
IP address, MAC address, network name.
System
Asset name, description, object ID, uptime, contact, location, service list.
Network interfaces
Name, manufacturer, MAC address, interface type, speed, MTU, administrative state, operational state.
Telnet
General information
IP address, MAC address, network name.
System
Uptime.
Processor
Name, system type.
System memory
Total/free memory, swap partition size.
Network
Network interfaces: name, manufacturer, MAC address, IP address, IP subnet, BSD device name, type.
List of DNS servers.
ARP table.
Security
Firewall rules presented as a hierarchy.
FAQ
General questions
Installation
Backup and restore
Scan questions
Access is denied
RPC server is unavailable
Port numbers
TCP/IP security limit
No network provider accepted the given network path
Call was canceled by the message filter
Domain logon scan
Windows 95/98/NT scan
Program usage questions
Network tree selection
List of computers with particular software
No antivirus installed
General questions
Installation
Q: Should I install the program on a server or on a workstation?
A: Both a server and a workstation can run Total Network Inventory 3. It’s just a matter of usage convenience, because it's not a
client-server application, and you need to have access to the graphical console of the computer it's installed on, either directly or by using a
remote desktop utility. However, if you run it under the domain admin account, you’ll be able to scan all computers as "current user" –
otherwise you’d need to specify domain admin credentials explicitly.
However, take note that if you install the program on Windows XP SP2/SP3 or Vista SP0/SP1 and there are a lot of scan threads launching
simultaneously, there may be issues with connections to remote computers. This is caused by a restriction on the maximum number of TCP
half-open connections (connection attempts, SYN_SENT socket state) existing in the aforementioned Windows versions, which doesn't allow
for more than 10 outbound connections to be in this state at a time. After reaching this limit, all other connections in the system (including
those executed by this program) are queued and may reach their timeout, thus producing inconsistent results. This issue is also known as the
Event 4226 issue, because reaching the limitation produces a record in the System Event Log with EventID 4226. Windows Vista SP2,
Windows 7 and newer, and all Windows Server systems don't have this limitation. Thus, in the general case, we recommend to install the
program on server systems or modern desktops.
A: The Storage is located in a separate folder (file system directory). It can be located by right-clicking the storage root group and selecting S
how in Explorer. Then go up one level and copy/archive the whole storage folder.
Program settings can be backed up by copying/archiving a folder entitled Total Network Inventory 3 in your account's Application Data folder
(referred to by %APPDATA% environment variable), if you chose Install for me during the program installation. If you chose Install for all,
the settings are stored in "С:\Documents and Settings\All Users\Application Data\Total Network Inventory 3" (Windows 2000/XP/2003) or "C:
\ProgramData\Total Network Inventory 3" (Windows Vista/7/8/10/2008/2012). You can also find this folder by clicking Open tasks folder in
the Scanner tab or Open templates folder in the Table reports tab and then going up one level.
To restore the program, install it on another computer (but don't run it) and extract your backed-up settings to the Total Network Inventory 3
folder in the Application Data folder for your profile or all users, depending on your choice during the installation (after the installation, this
folder is automatically created and contains one file: config.ini). Also, extract the storage folder locally: for instance, to My Documents. Then
run the program and browse to the storage folder when prompted (if its location differs from the path stored in previous settings).
Scan questions
Access is denied
Q: How do I deal with the errors "Access is denied" or "Unknown user name or bad password"?
The specified user account does not have administrator rights on the remote machine.
You need to have administrator access to remote computers to be able to scan them (local administrator or domain administrator
rights). If you have logged on as domain administrator or remote computers have the same name and password for the local
administrator account as your account, you can use the Current user scan option. Otherwise specify the user name in full format: DO
MAIN\Administrator.
Blank password.
Remote administrator access with blank password is not allowed starting with Windows XP.
This version of Windows cannot be scanned remotely. It’s an OS limitation, and the Access denied error will be displayed at all times.
However, it’s possible to scan XP Home locally by running the standalone audit tool tniwinagent.exe (located in the program's
installation folder) on that machine. It’ll generate an .inv file with scan results, which should be copied to the program's storage (it
will be imported upon TNI’s next launch or immediately, if TNI is running) or imported by using the Storage main menu or any
group's context menu.
Workstations running Windows XP, Vista or later client versions and not connected to a domain don't allow the local administrator to
authenticate as himself by default. Instead, the ForceGuest policy is used, which means that all remote connections are mapped to
the Guest account. But again, the administrator rights are required for running the scan. Thus, you need to update the security
policy on each computer using one of the following ways:
Run secpol.msc, expand Local policies / Security options, locate the Network access: Sharing and security model for local
accounts policy and change its value from Guest to Classic.
Disable the Use simple file sharing option in File Explorer’s Folder Options.
Modify the registry: set the forceguest value, located in the "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
" key, to zero.
For Windows client versions starting with Vista, an additional step should be taken: it concerns the User Account Control (UAC). It
restricts administrator rights for remote logons in certain cases. You should either disable UAC or make changes to the registry:
create a DWORD parameter (name: LocalAccountTokenFilterPolicy; value: 1) in the "HKLM\SOFTWARE\Microsoft\Windows\CurrentV
ersion\Policies\system" key (source). A reboot may be required.
You can modify both settings easily by running a .reg file with the following contents on such computers (omit the last two lines for
Windows XP):
Try temporarily disabling the firewall on the remote computer. If the target computer runs on Windows XP SP2/SP3, Vista or 7, see
the question regarding the Windows Firewall setup.
The target computer does not have the Windows Management Instrumentation service installed.
"WMI is preinstalled in Windows 7, Windows Vista, Windows Server 2008, Windows Server 2003, Windows XP, Windows Me, and
Windows 2000.
Windows NT Workstation 4.0 SP4 and later: WMI is available through "Add/Remove Windows components" in Control Panel, as
WBEM option install. A later, more comprehensive, version is available as an Internet download from http://www.microsoft.com/dow
nloads. See "WMI CORE 1.5 (Windows 95/98/NT 4.0)".
Windows 98/95: WMI CORE 1.5 (Windows 95/98/NT 4.0) is available as an Internet download from http://www.microsoft.com/down
loads. This download requires Microsoft Internet Explorer version 5 or later."
Remote interrogation of Windows 98/95 computers is supported partially, because problems with DCOM authentication may occur.
The solution is to run a local scan (manual or autostart) with the help of the standalone audit tool ( tniwinagent.exe).
The target computer is offline or the IP address may not be occupied at all (when scanning by IP's and if the ICMP ping option is
disabled).
disabled).
The Windows Browser service updates the computer list every 12 minutes, so a computer can go offline, but remain visible in My
Network Places. However, in this case you are more likely to get the Ping failed status. But if the ICMP protocol (ping, echo) is not
allowed in your network, you might want to disable pinging in Options – Scanner – Use ICMP ping. After this, you will be able to scan
online hosts which don't respond to pings, but all offline hosts (and also unoccupied IP addresses) will show the RPC error status,
and thus it will slow down the scanning of large IP groups or ranges.
If you scan the computer by name, it could be resolved to an invalid or not existing (unoccupied) IP address due to problems with
DNS or WINS. If you scan the computer by IP address, you are likely to receive Ping failed, but if pinging before scanning is
disabled, you will receive the RPC error when scanning an offline or unoccupied address (see the previous point). A TNI user has
encountered this problem and described it on our forum: http://www.softinventive.com/forum/index.php?showtopic=428
The target host is not a computer, or it runs an operating system other than Windows when scanning via the RPC protocol.
If the scanned name or IP address belongs to a network device which can be pinged, but is not a Windows computer (NIX-computer,
network printer, router, managed switch, type library, IP phone, firewall, thin client, etc.), it cannot be scanned via the RPC protocol
and shows this error. However, the program tries to scan this host via other protocols (SMB, SSH and SNMP), and the scan result
may vary depending on the settings for these protocols and the nature of the scanned network host.
Port numbers
Q: How can I find out which port numbers are used by TNI, so I can configure the firewall?
A: By default, TNI uses the SMB protocol to scan Windows computers. It can be allowed by enabling the File and Printer Sharing exception in
the Windows Firewall or TCP port 445 in other firewalls. You could also enable TCP port 139 (NetBIOS) for older systems.
Also, TNI uses the RPC protocol to scan Windows computers (direct WMI connection) if SMB fails. To allow remote RPC connections, you
should either disable Windows Firewall or set it up in the following way:
Use the following netsh firewall command in the command prompt: netsh firewall set service RemoteAdmin enable for Windows XP
or netsh advfirewall firewall set rule group="remote admin" new enable=Yes for Windows Vista/7 or newer;
Use the Group Policy editor: Group Policy editor (gpedit.msc) -> Local Computer Policy -> Computer Configuration -> Administrative
Templates -> Network -> Network Connections -> Windows Firewall -> Domain Profile or Standard Profile -> Windows Firewall:
Allow remote administration exception -> Action -> Properties -> Enable.
Windows Firewall in Vista, 7 or newer has a special exception entitled "Windows Management Instrumentation (WMI)", which can
be enabled and thus save you from the necessity of setting up the policies manually.
A: This warning may appear when you run the network scan under Windows XP SP2/SP3 or Windows Vista SP0/SP1 with port scan enabled.
In these operating systems a controversial limitation of not more than 10 concurrent TCP connect attempts ("half-open connections") has
been introduced by Microsoft to reduce the speed with which malicious software spreads over the networks. You can find more information in
this Microsoft article. When you see this message in the scanner log, it means that the program detects that some computers have no open
ports and there is an event with ID 4226 (source: Tcpip) in the system Event Log with the same message. As a consequence of reaching the
aforementioned limitation, the program cannot reliably detect whether ports on computers are open or not. That's why the program starts to
ignore the port scan results and connects to all computers using all selected protocols to provide successful scans. This policy remains active
during the current session, that is, until the next program restart. To avoid this warning you can do the following:
Disable the Scan ports option in the Scanner settings. Note that this will decrease the network scan performance;
Patch your system using the widely known patch by LvlLord or this patch (based on the former). However, note that this is illegal
according to the Windows EULA;
Run TNI on the system which is not affected by this limitation: Windows Server 2000/2003/2008, Windows 2000, Vista SP2 or
Windows 7.
1. Make sure that you can ping the remote computer by network name;
2. Make sure that the File and Printer Sharing exception is enabled in the Windows Firewall (or that NetBIOS is allowed in any other
firewall), or the firewall is disabled;
3. Make sure that both Client for Microsoft Networks and File and Printer Sharing For Microsoft Networks are enabled in the properties
1. Run services.msc on the remote computer and make sure that the Windows Management Instrumentation service is set to Automatic
and started;
2. Make sure that DCOM is enabled: run dcomcnfg, select Component Services – Computers – My Computer, right-click, choose Properti
es, open the Default Properties tab and make sure that Enable Distributed COM on this computer is on;
3. Restart the remote computer;
4. Run WMI diagnosis utility from Microsoft;
5. Follow these tips to repair WMI on the remote computer.
A: This is a shortened guide. The full version of this guide is available here.
1. Copy the standalone scan agent tniwinagent.exe located in the program’s installation directory to a shared folder on your file server
accessible to all users with read-only access. For this, open the Options window, then open the Logon script page, press the Export
standalone scanner button and specify the folder to export to. This action will also fill the Path to agent field. It should be a UNC
path (a network path starting with double backslash).
2. Create and share a folder with write access for all users on your file server. This will be the folder where the scan agent will save the
scan results. Note: instead of creating a separate folder (most secure), you can share an empty folder inside the TNI 3 storage
(secure) or the storage root folder (least secure) with write access for all users.
3. In Options – Logon script – Save path specify a path to the folder where the agent should save the files (the folder from step 2).
This should also be a UNC path. Specify other options if necessary (such as Delay before scan start and Overwrite existing files).
4. Copy the auto-generated command using the Copy the command button.
5. If you already have a logon script for your domain, a particular Organizational Unit or a single user, paste the command you’ve
copied earlier to this script and save it. Otherwise, refer to the full version of this guide.
6. In the main window of Total Network Inventory 3 press Options, open the Auto-import page and specify the path to the folder with
the inventory files in the Import data path field. You can import new data right now or set the settings to import on startup or set
the timer. Each time you want to update the information manually, open Options – Auto-import and click Import now. Also, you can
delete files after importing or import from subfolders (in case each OU has its own logon script which runs the scanner with different
parameters to save results in different folders). If you chose to share a folder in the storage or the whole storage folder, you don’t
need to set up Auto-import. The scan results will be automatically imported as you run the program and it opens the storage, or
immediately, if the program is already running.
Resources to read:
Logon script scan
Standalone agent's command-line parameters
Data import
Logon scripts FAQ
Creating logon scripts
A: It's possible, however these systems can only be scanned remotely (via the RPC protocol). First of all, you should install Microsoft WMI cor
e components for Windows 95/98/NT. WMI CORE 1.5 (Windows 95/98/NT 4.0) is available as an Internet download from http://www.micros
oft.com/downloads.
Then place a link to \WINDOWS\SYSTEM\WBEM\WinMgmt.exe into the startup folder and reboot, or run the file manually.
Additionaly, in order to perform the remote online scan, you need to run a registry file ( *.reg) with the following content on a Windows 95/98
machine:
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Microsoft\OLE]
"EnableDCOM"="Y"
"EnableRemoteConnect"="Y"
[HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM]
"SetupForDCOM"="1"
"AutostartWin9X"="2"
"EnableAnonConnections"="1"
Alternatively, you may change these values manually. Rebooting is advised. After this, you should be able to connect remotely using any
credentials or as current user.
Please note that support for Windows 95/98/NT is provided "AS IS", because Microsoft has officially stopped supporting these
operating systems.
A: In TNI 3 the Network tree has two node selection modes: single and multiple. To build a report for several nodes, either select a group
(the report will be built for all assets in this group and all subgroups) or enable multiple selection by ticking the Multiple selection checkbox ov
er the tree — checkboxes will appear in front of each node. Rectangular selection (as well as selection using Ctrl or Shift) is not used for
building reports and is used for working with the nodes in the tree (drag'n'drop moving, deleting, etc). For more details, see Selecting a node
.
A: Go to the Software accounting tab, use the Search bar and filters to find the necessary software and select it to display a list of computers
it's installed on (in the details area on the Installations page). You can select the items in the list and copy or export them, or click the Install
ations summary link to get a printable report.
No antivirus installed
Q: Why does the program show that no antivirus (or firewall, or antispyware) is installed?
A: TNI 3 can recognize all antiviruses and firewalls (in Windows XP SP2/SP3, Windows Vista, 7, and 8) and antispyware (only in Windows
Vista, 7, and 8) that support Windows Action Center (previously known as Windows Security Center), that is, if they are displayed by the
Action Center. The vendors of antivirus (firewall and antispyware) software should provide this support from their side, because they have to
publish the product information and status to the system in a special way. Otherwise neither our product, nor Windows itself can recognize
such software (in this case Windows Action Center should usually generate a message from time to time that the computer is not protected
by antivirus/firewall/antispyware).
Unfortunately, even with the support from the side of the security products, this does not work on Windows 2000 and earlier and also on all
Windows Server systems, because they don't have Action Center, that is they don't provide an interface for these products to publish their
status to the system and thus to other applications.
We are going to add support for direct detection of the most popular products without dependency on the Action Center interface in the
future versions of our program.
Feedback and support
Sending feedback from the software
Support page on the Softinventive Lab website
E-mail support
Online support
Social networks
Your feedback is very important to us, your comments define the ways we improve our software. We'd be grateful for any message!
Don’t forget to include your name and email address — otherwise we won’t be able to reply to you.
E-mail support
Technical support: support@softinventive.com
General questions: info@softinventive.com
Financial questions: sales@softinventive.com
Online support
You can rely on our assistance whenever you need it. Our technicians can be contacted via instant messengers.
softinventive
Social networks
Follow us online!
softinventive.lab
@Softinventive
Updates
TNI 3 updates regularly. To make sure that you have the latest version, use the Help / Check for updates option from the main menu.
Furthermore, the program automatically checks for updates on launch, but no more than once a day.
If an update is found, you'll see a list of changes in the new version. Click Start download, and Install update after the download is complete. The
program will be closed and restarted after the update has been applied.
Trial version limitations
Total Network Inventory is distributed as shareware.
1. The program only works for 60 days after its first launch on a computer.
2. The maximum number of computers (network nodes) allowed to scan and manage is limited by 50 nodes.
3. Reports created by the program can be exported and printed, but certain fields are randomly substituted with the phrase TRIAL VERSION
.
Installation instructions
Run the Total Network Inventory installer
After clicking the download link, save the tni-setup.exe file and run it.
In Google Chrome
Once the download is finished, click the file at the bottom of the browser.
In Mozilla Firefox
In MS Internet Explorer
Then follow the instructions as the installer guides you through the process:
Begin working with Total Network Inventory
Uninstallation instructions
Total Network Inventory can be uninstalled using standard Windows tools.
Storage
Data import
Workspace
Network tree
Selecting a node
Altering the Storage structure
Information display settings
Searching in the Network tree
Storage assistants
Working with assistants
Description of assistants
Actions
Custom assets
Synchronization with Aсtive Directory
Network scanning
Adding scan tasks
Managing added tasks
Scan process and scan results
Saving, importing and exporting tasks
Scan scheduler
Common reports
Building reports
Viewing information
Printable reports
Additional features
Table reports
Creating a template
Template management
Storage properties
Alerts
Snapshots
Custom fields
Logins
Users
Options
Storage
Storage concept
Storage contents
Contents of auxiliary files
Contents of an asset file (*.inv)
Storage management
Data import
Storage concept
TNI 3 Storage is a folder on a hard drive selected by user.
The folder structure inside the Storage replicates the structure of the groups created by user in the Network tree. Any direct changes to the
Storage contents shall be registered by the program.
It means that you can create, delete and rename groups, move and delete asset files either using TNI's tools or via any file manager.
Furthermore, its design makes it possible to back-up and share data with other TNI 3 users, etc.
For the program to function correctly, do not delete, move or rename auxiliary hidden files in the Storage root folder. This may
lead to data loss or corruption.
Do not rename asset files (*.inv). See here to learn how to change displayed names.
Storage contents
Contents of auxiliary files
Asset files can be moved between storages. However, various storage data will not be moved. For instance, the remote access
login will be lost, but it could be restored manually.
Storage management
A copy of TNI 3 is not linked to any particular storage. This means that you can switch between storages when the program is running.
Create: select an empty folder on a computer and create an empty Storage there;
Open: select a folder containing a previously created Storage to work with;
Recent: contains a list of recently opened Storages that allows to quickly switch between them;
Reload: reads the data from the computer again, if the changes made to the currently opened Storage have not been automatically
registered by TNI 3;
Close: closes the Storage.
To quickly locate the folder containing the current storage or a file representing one of the devices, you can use the Show in
Explorer option in the context menu of the Network tree.
It's possible to create a Storage in a shared folder and have several copies of TNI connected to it from different computers. Keep in
mind that simultaneous access of the same Storage by different copies of TNI is not supported and could lead to irrelevant
information being displayed. This happens when changes made by one user are not yet reflected in the program of another.
Data import
Learn about importing possibilities in the Data import section.
Data import
Importing by moving or copying data files
Importing files and folders
Automatic import
Converting the Storage from TNI 1.x
To import assets that were scanned by any version of TNI, simply copy the .inv files of these assets into the storage folder. If TNI 3 is
running and connected to that storage at the moment, the new files will be converted to the new format if necessary and imported
immediately. Otherwise, the files will be imported next time TNI 3 is started and the Storage opened.
To locate the storage folder, right-click the Storage root group in the Network tree and select Show in Explorer.
To import one or several assets, right-click a group or the root node of the Network tree and click Import / Import files..., then select the
data files for import. This will place the specified assets into the group that you initially right-clicked.
To import the contents of a folder including subfolders, do the same, but click Import / Import folder... instead. After you specify the source
folder, you'll be prompted to choose whether to import the folder structure. If you choose to do so, groups will be created in your storage to
match the contents of the source folder. Otherwise, all the assets found in the source folder and its subfolders will be placed in the group you
initially right-clicked.
These commands are also available from the main menu Storage / Import when the Storage is opened.
Automatic import
You can set up TNI to automatically refresh asset files from a certain folder on program launch or at regular intervals. This is done from the A
uto-import section of the Options window. Additional options are:
Press the Import now button to perform the importing without having to restart TNI or waiting for the timer;
Import from subfolders is optional;
Import folder structure: if enabled, TNI creates groups in your Storage root to match the folders found inside the source folder when
the importing is being performed. Groups are only created for the folders that contain asset files. If disabled, all the discovered
assets will be placed into the root group of your storage;
It is possible to Delete files after import;
You can enable or disable Import at startup and Import on timer and specify a custom Import period.
When importing an asset that is already present in the Storage, configuration snapshots from the new file will be moved to the
existing one. If the new file was placed into the Storage manually, it will be deleted. This ensures that a single asset in TNI 3
always has one file corresponding to it. This is true for import of any kind.
To convert the whole Storage from the old format, use the Storage / Open option from the main menu and select the root folder of the target
Storage. The Storage contents will be wrapped into a ZIP archive first, and then converted to the new format. This process also preserves
your group structure.
Converting an asset file from the TNI 1.x format to that of TNI 3.0 reduces its size from ~1,5 MB to ~35 KB. Thus, complete
conversion of the old Storage shrinks it about 40 times without losing any useful data.
Workspace
Introducing the main window
Basic operations with the Network tree
TNI 3 view modes
The Network tree and the Sidebar can be temporarily hidden in order to increase the main area. This can be done by clicking the small Hide/
Show network tree and Hide/Show sidebar buttons located on both sides of the tab bar.
You can alter the widths of the Network tree and the Sidebar by dragging their edges.
In order to choose several assets at once, tick the Multiple selection checkbox on the toolbar above the Network tree. A checkbox will be
displayed next to every node for you to select the necessary assets. To return to the normal selection mode, untick Multiple selection.
To create a new group, right-click the parent group or Storage root and select Create group. To move some assets into a new group, first
select them using your mouse's Rectangle selection or keyboard keys Shift and Ctrl and then drag them onto the group node. Alternatively,
you can use the Move to group option from the context menu of a node.
Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. The
Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. The
former is only used for operations with several nodes (e.g. moving and deleting) and does not influence the contents of the main
area.
There's a way to start working with normally selected assets in the main area. To do that, use the Choose option after right-clicking
one of the selected assets. The assets will become selected with Multiple selection.
Groups in the Network tree replicate the structure of directories on the hard drive as described in the Storage section. Thus,
operations such as creating, deleting or renaming groups and moving assets between them can be performed in any file manager.
See the Network tree section for information on searching the Network tree, displaying additional text and graphic information in it and
filtering assets according to various criteria.
Pressing Ctrl + <tab number> provides quick access to the desired view.
Scanner Before any of the information on remote assets becomes available for viewing and building reports, these assets have to be
Ctrl + 1 scanned. The Scanner view makes collecting asset information a breeze.
TNI 3 can collect information from Windows, Mac OS X and Linux computers or scan any other devices via the SNMP protocol.
See the Whitepaper section on how to ensure that all the conditions for successful scanning are met.
Viewer & This mode displays the first thing you'll want to see after you've scanned your network: common reports. These reports
reports contain detailed information on hardware and software of each scanned asset sorted into convenient categories and available
Ctrl + 2 for instant search. It's possible to build descriptive and accurate reports, print them or export them to PDF, RTF, HTML, etc.
Table Here it's possible to create a table that contains only the necessary information. Rows can represent individual devices or any
reports device components such as HDDs, monitors, RAM units, software items, etc. Columns represent properties of the selected
Ctrl + 3 object. When the table has been built, it can be sorted, filtered, printed or exported for further analysis.
Software Here you're able to see the list of software found on Windows and Mac assets in the Storage. For each software item you can
accounting display the full list of computers that it's installed on. Software can be organized, searched and filtered in a multitude of ways.
Ctrl + 4
If you have the TNI 3 Professional license, you'll find at your disposal a variety of tools that will help with keeping track of
your software licenses, individual licensed installations, license keys, compliance problems, etc.
Change After scanning an asset several times over a period of time, you may want to know what has changed in terms of hardware
log or software installed on the asset, system parameters, disk space usage, connected peripherals, etc. In this mode, you'll find
Ctrl + 5 a precise list of all changes. Also at your disposal are: advanced search, filtering and reporting tools.
Edit This view mode allows to change properties of individual assets or the Storage itself, manage user records, custom fields,
Ctrl + 6 snapshots and logins.
Read more:
Storage properties: storage name, company name and logo, inventory number generator;
Network node properties: network identifiers, alias, description, etc;
Snapshots: viewing and deleting configuration snapshots;
Custom fields: adding or changing user information;
Logins: managing logins and linking them to assets;
Users: viewing and editing information on network asset users.
Network tree
The Network tree reflects the contents of the opened Storage.
Main elements:
Below the tree is the status bar where several indicators can be found:
The first of them shows the license usage. It displays how many licensed spots are occupied by scanned assets, the total number of nodes
that your license allows, and the usage percentage.
The second indicator shows the number of unscanned assets, and the third one shows the number of custom assets. These types of assets
don't occupy license spots, so they are displayed separately. These indicators may be missing if there are no assets of the corresponding type
in your Storage.
Related topics:
Selecting a node
Altering the Storage structure
Information display settings
Searching in the Network tree
Storage assistants
Actions
Custom assets
Synchronization with Aсtive Directory
Selecting a node
Simple selection
Selection for processing
Single selection
Multiple selection
Simple selection
It's used for performing such operations as deletion and moving between groups containing one or multiple nodes.
It's done in the same manner as in Windows Explorer: using your mouse's Rectangle selection or keyboard keys Shift and Ctrl and arrow keys
.
This type of selection doesn't affect other workspace areas in any way.
This selection type is used for selecting nodes to work with in the Common reports, Table reports, Software accounting and Edit modes.
The Network tree has two selection modes: Single selection and Multiple selection. Press the Multiple selection button located to the right of
the root node to switch between modes.
Single selection
Only one network node or one group can be selected. To select it, simply click the node. The selected node is highlighted with the blue
rectangle:
While staying in the single selection mode, you can quickly select the next or previous node in the tree: Alt + arrow up/down.
Multiple selection
Each node will receive a checkbox, and the nodes are selected when their checkboxes are ticked:
You can check or uncheck the box either with the mouse or by selecting the nodes using Single selection and pressing the space bar.
Nodes selected using Simple selection can be selected for processing by using the Choose option from the context menu.
Selecting a group in the Single selection mode is the same as selecting all assets in this group and its subgroups in the Multiple
selection mode. A report will be built for all assets in the single selected group and editing will affect all assets in it, so you don't
need to enable the Multiple selection mode to build reports for whole groups. The only exception is the Group summary mode
which displays information about the group itself and is not available in the Multiple selection mode.
Altering the Storage structure
Creating a group
Renaming a group
Moving nodes into a group
Deleting network nodes and groups
Working with storage files directly
The Network tree allows to create, rename and delete groups of network nodes.
Creating a group
1. Right-click the parent group (to create a first-level group, right-click the root node);
2. Click Create group in the context menu;
3. Type the name of the group and press Enter.
Renaming a group
Click Rename in the context menu or select the group and press F2. Type the desired name and press Enter.
Renaming the root node will change the Storage name. Another way to do this is via the Storage properties.
1. If you need to move multiple nodes, select them using your mouse's Rectangle Selection or your keyboard's Shift or Ctrl;
2. Do one of the following:
a. Drag the selection with your mouse and drop it onto the title of the target group;
b. Right-click one of the selected nodes and use the Move to group menu item.
To delete one or several nodes or groups, select them and press Delete on your keyboard or use the Delete option from the context menu.
Deleting a network node is an irreversible operation. All the data connected to the deleted asset will be permanently lost. Consult
the Contents of an asset file section to find out what exactly is being deleted.
Deleting a group is not the same as "ungrouping". All the assets inside the group will be deleted as well.
The Storage structure fully replicates the structure of files and directories inside the Storage directory, as described in the Storage s
ection. Therefore, it's possible to create, delete or rename groups and move assets between them by performing corresponding
operations over file system objects, which can be done in any file manager. TNI 3 will react to these changes automatically.
Right-click any node and choose Show in Explorer to quickly locate a directory or file corresponding to the node. This will launch an instance
of Windows Explorer navigated to the target directory. If the selected node is an asset node, its file will be selected.
You can also use this function when backing up data, copying, transferring to another TNI 3 user, etc.
Information display settings
Network node names
Additional field
Sorting the nodes
Number of assets in groups
What information is displayed in the Network tree can be chosen in the Tree display settings menu on the Network tree toolbar.
For instance, setting hostnames as node names, selecting IP addresses for the additional field and enabling the Show number of assets in
groups option will result in the Network tree looking like this:
Both node names and the additional field are used when searching the Network tree.
A variety of values can be displayed as the node name: network names, IP addresses, inventory numbers, usernames, etc.
If Alias is set as the node name, network nodes can be renamed by choosing Rename from the individual context menu or by
pressing F2. The asset's alias will be changed. Another way to do this is via the Network node properties.
Additional field
An additional value can be displayed in the Network tree for every node. This value is selected from the same list as for the node name.
The Sorting section allows to select the sorting criteria: nodes can be sorted either by their names or by the additional field values
(configured as shown above), with an option to reverse the sorting order.
When Show number of assets in groups is enabled, the number of assets is displayed in parentheses to the right of the group title.
Searching in the Network tree
Saving the search
A case of using a saved search
To start searching the Storage, click the search field on the Network tree toolbar or press Ctrl + Shift + F.
Both node names and additional text are searched. See Information display settings for details.
By default, the contents of the Network tree are filtered to only display the nodes which match the query, and the rest is hidden. This
function can be disabled by clicking the Filter button to the left of the search input field. When it's disabled, all nodes will remain visible while
the matching ones will be highlighted.
You can use the up and down arrow keys when the search field is in focus to navigate the nodes. Pressing Enter opens the selected node in
the main area.
You can deactivate search without losing its results by pressing the Save search button. You will then be able to toggle filtering on or off, run
a new search in the results of the saved one, etc.
Searching actually uses the Search node assistant. See Storage assistants for more details about what assistants can do.
Let's imagine that inventory numbers of developer workstations in the Storage are prefixed with DEV_. We can quickly put together a simple
tool for switching the Storage from showing all assets to showing only developer workstations. All it takes is setting the Additional field to Inv
entory numbers and saving a search for DEV_. Now if we want to see developer workstations, all we have to do is turn the filtering on for the
newly-created assistant.
As with all added assistants, saved searches are not deleted when TNI is closed. After saving a search once, you can use it as long
as you need, temporarily disable it or remove it at any time.
Storage assistants
Storage assistants is a tool that displays additional graphic and text information in the Network tree, and also enables searching and filtering
by various criteria.
For example:
The OS Assistant displays the icon and the version of the currently running operating system in front of every asset and can hide the
nodes with OSes different from the one displayed.
The Online status Assistant displays a green or red circle, depending on the asset's online status. When the status changes, the
indicator is automatically updated. There's an option to hide all offline computers.
The Alerts presence Assistant displays a red flag and the number of problems in front of each asset where problems have been
detected. The hint lists the problems found.
There are many other assistants. This is how the Storage looks when the abovementioned assistants have been added:
Related topics:
Adding assistants
1. Click the Add assistant (+) button on the toolbar in the Network tree;
2. Select the assistant type from the appearing menu;
3. Set a condition if necessary.
Newly added assistants appear in a separate area under the toolbar: the Assistant list, which isn't displayed when empty. The Assistant list ca
n always be collapsed or expanded by clicking the title area.
This enables or disables the corresponding icon on the right of every network node. Hovering the mouse cursor over an icon reveals a
hint with additional info.
When enabled, all assets that don't meet the assistant's condition are hidden.
The number of assistants that currently act as Indicators and Filters is shown in the assistant list's header when the list is collapsed.
The number of assistants that currently act as Indicators and Filters is shown in the assistant list's header when the list is collapsed.
In case you can't find an asset that exists in the Storage, make sure it has not been filtered out by one of the active assistants.
The Filter and Indicator toggles may be enabled simultaneously. If they are both disabled, the assistant is considered disabled and will not
affect the contents of the Network tree. The illustration above shows the Alerts assistant is disabled and the Online status assistant has both
toggles enabled.
Double-click the title of any added assistant to edit it (instead of removing it from the list and adding another). When the editing is
done, click Apply.
See how editing the Installed RAM assistant looks like:
Description of assistants
Hardware
Installed RAM
Virtual type
Software
Operating system
Tracked software
Inventory
Last snapshot age
Misc
Online status
Note contents
Alerts presence
Search node
The purpose of any assistant is to display additional information in the network tree. Assistants are sorted into groups by the nature of this
information: Hardware, Software, Inventory or Miscellaneous.
Each assistant has a condition. When an assistant is active, every network node is matched against its condition.
When the Indicator mode is active, the nodes that passed the check are marked with an icon.
Hovering the mouse cursor over this icon will provide additional information in the form of a hint.
In the Filter mode, an assistant will hide all assets that do not satisfy its condition.
If you've got a suggestion for a new assistant type, feel free to send us a message! Use the main menu option Feedback / Feature
request and tell us. Perhaps, next update you'll find your assistant in the program.
Hardware
Installed RAM
Virtual type
Software
Operating system
The Indicator displays the icon representing the installed OS and its version. The full title and version of the OS can be found in the hint.
The Filter hides all assets that run on an OS from a different OS family than the one specified (Windows, Linux, MacOS, FreeBSD or ESXi).
Tracked software
This assistant is related to the Software accounting mode, where it's possible to enable tracking for presence or absence of certain software
on selected assets. It has three modes and can point out the computers with must-have violations, forbidden violations or both. In the must-
have mode, the assistant displays an icon for each asset where "must-have" software is not found and the amount of such software. With for
bidden, an icon is displayed for each asset where forbidden software is found. When choose all, an icon is displayed when both types of
violations exist. The hint lists which software caused the icon to appear and the type of violation.
Inventory
Compares the age of the latest snapshot with the user-defined number of days.
The Indicator displays the number of days since the asset was last scanned.
Example of usage: view all the assets that were not scanned for at least a month.
Misc
Online status
TNI 3 pings all the assets in the storage once every several seconds, and this assistant is used to display the result in the Network tree.
In the Filter mode, this assistant only shows the nodes that are online at the moment (or offline, if the user changes the condition).
Note contents
Each asset can have a note assigned to it. These are comments added by the user of TNI 3.
Notes can be easily added in the Common reports mode or in Network node properties.
This assistant's condition contains a search string. When left blank, all the nodes that have a note will satisfy the condition. When text is
entered into the assistant's field, only the nodes which have a note containing the entered text as part of it will satisfy the condition.
The Indicator displays an icon for each asset that satisfies the condition. The hint contains the full note.
It's a good idea to include a short keyword in every note along with the actual message (e.g., "TODO" for tasks, "FIX" for faulty
assets, "UPGRADE" for assets that need to be upgraded, etc.) In this case, the Note contents assistant becomes very helpful. For
instance, you can use it to filter all the nodes by the presence of "FIX" in their notes, which will yield the list of malfunctioning
assets. Then you hover your mouse over one of them to find out what exactly is wrong:
Alerts presence
The Indicator displays a red flag and the number of problems in front of each asset where problems have been detected.
The Filter allows you to hide all the devices that don't have any alerts. This can be useful when building an alert report.
See: Alerts.
Search node
The condition contains a search string. Only the nodes that have the string as part of their name or additional text will satisfy the condition.
Actions is a tool for performing operations on the network nodes in your Storage right from the Network tree.
Actions can be accessed via the network node and group context menus:
By default, only the actions that are applicable to the selected nodes are visible in the menu. This can be changed from the Options
.
Standard actions
Reboot;
Power off;
Wake-on-LAN.
These actions don't need to be configured. To execute one of them, simply select it from the action list of the desired node or group of
nodes.
Custom actions
Custom actions allow you to use any system routines or third-party utilities in order to accomplish a desired task involving a remote network
device.
Custom actions are defined in the action text file using a simple syntax. To access the file, right-click any asset, choose Edit actions from the
Actions sub-menu and, when the Options window opens, click the Edit commands in Notepad button in Options / Actions.
A convenient, brief summary for the action definition syntax, with examples and a complete list of keywords and templates, can be
found in the Actions section of the Options window, with one-click copy capability included. The list is also available on this
documentation page.
Action name is the name that will appear in the Actions menu.
Templates
Inside the command's definition, certain string templates are used to pass the parameters of a targeted network node into the command.
These are the supported templates:
%HOST% FQDN, hostname or IP, depending on the Static IP flag of the asset
%USERNAME% Username from the login record used for asset scanning
%PASSWORD% Password from the login record used for asset scanning
Conditions
Conditional directives may be added to the action's definition, thus rendering the action inapplicable to certain assets. This is useful in a
variety of cases, i.e. to prevent attempts to execute a command that are certain to fail.
A condition is specified when {$IF condition} is added before the action's definition in this way:
SSH The device was scanned via SSH (a Linux, OS X, FreeBSD, or an ESX/ESXi device)
LAN The device and the PC running TNI 3 share the same subnet
EXISTS(filename.exe) The specified executable exists on the paths specified in the PATH environment variable
By default, any action is considered inapplicable to several devices at once. Thus, it won't appear in the action list when you select several
devices or a group. To make it available in these cases, multiple targets have to be allowed explicitly by adding the {$MULTI} directive in
front of the definition.
Example:
When targeted at multiple devices, a condition is considered satisfied if any of the target nodes satisfies it. To make a condition mandatory
for all targets, an "!" should be added after it.
Examples:
{$IF LAN} If any of the target nodes share the local subnet
{$IF LAN!} If all of the target nodes share the local subnet
If an action is "unsafe", adding an {$?} directive to the definition will display a confirmation dialog before every execution.
{$?}Shutdown="C:\PSTools\psshutdown.exe" -k \\%HOST%
Sending keystrokes
Sometimes executing a command launches a user interface that requires further user input. In order to automate this task, TNI can send
predefined keystrokes to the launched application.
To send keystrokes, append /sendkeys: to the action's definition, followed by a string of keys to send. After the /sendkeys: command you
may use:
Arbitrary sent as is
text
{$WAIT pauses the execution for X milliseconds (if this directive is omitted, the default pause before sending any keys is one second)
X}
{key simulate pressing a special key (the following keyboard keys can be used: F1..F10, LEFT, RIGHT, UP, DOWN, ENTER,
name} BACKSPACE, PGUP, PGDN, HOME, END, TAB)
Example of usage:
When the action is executed, an authorization window will open up. TNI then sends the password to the input box and presses Enter to log
in, automatically.
Custom assets
Adding custom assets
Cloning custom assets
Adding custom assets from file
Converting non-scanned assets to custom assets
Custom assets can be added to your Network tree manually by using the Add custom asset feature. This allows to create new assets in your
Storage, even if they don’t have a network interface (e.g. monitors, tablets, webcams). As a result, viewing and building reports becomes
possible for both custom and automatically created assets.
button above the Network tree (or in the context menus of your Storage root node or any asset group);
2. In the new window, specify the asset’s type and name;
3. If necessary, fill in the values for common fields and add special fields.
It's possible to save and load special field presets by clicking Save preset as… and Load preset buttons in the Adding new custom asset windo
w.
Cloning custom assets
To add a large number of identical assets you can use the Clone asset button (by right-clicking any custom asset on your network tree).
Enter the number of copies you need and press OK.
The copies you make will appear in the Network tree as follows:
Adding custom assets from file
The Add custom assets from file option allows you to perform a quick import of a whole list of assets or IP addresses to your Network tree.
To add custom assets from file, right-click your storage root node or any asset group node, and then click the corresponding button:
The Convert to custom asset option allows to transform an asset that couldn't be scanned by any method to a custom asset. As a result, you
can avoid scan error alerts.
To convert an asset, right-click any non-scanned asset in the Network tree and choose Convert to custom asset:
The asset will be displayed and marked with
Conversion does not bring any changes to the information fields or properties of assets.
Synchronization with Aсtive Directory
Synchronizing with Active Directory allows you to automatically transfer the OU structure to your network tree. A group will be created for each
OU in the current domain, and each computer in the domain will be moved to its proper place in the structure.
To perform AD synchronization right-click the Storage root and choose the corresponding option:
During the synchronization, assets will receive Location and Description retrieved from AD (if they are filled), and also the OS Version (for assets
that have logged into the domain at least once).
Users are also synchronized with AD during every Storage synchronization, and can be synced separately by going to the Edit – Users tab and
clicking Synchronize with AD. This function retrieves AD users with their names, positions, contact info, etc. and places them into your Storage for
convenient search and report building.
Placeholders are created for each device that has been discovered in the domain but has not yet been scanned. These placeholders are empty
nodes that can be rescanned to retrieve inventory information. They will be displayed as
in the Network tree, and the following hint will be displayed in the Viewer & reports – General information tab for such assets:
Placeholders contain some basic information from AD: Description, Location, OS name, its version and installed Service Pack.
You also get to choose which action to take if a previously scanned PC has not been discovered in the domain during synchronization: move it to
a separate group or delete it.
You can configure TNI to perform synchronization on startup. This and several other switches are located in Options – General.
Active Directory synchronization is one-way only: it's only possible to import data from AD to TNI at this time.
Network scanning
The Scanner mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing Ctrl + 1.
Scanning in TNI 3 is a process of data collection from remote assets and saving it to the current Storage.
When the program scans an asset not present in the Storage, a new node is created for it. Assets that are already in the Storage can be
scanned repeatedly to update with the collected information.
Related topics:
Before starting a scan, you'll need to specify a task list for the scanner.
Quick Add
Type what you'd like to scan into the Quick Add field and press Enter.
Network name
PC321
host.domain.com
IP-address
192.168.0.1
Subnet
192.168.0.0/24 (allowed CIDR notation number range: from 16 to 30)
192.168.0.0/255.255.255.0 (allowed masks range from 255.255.0.0 to 255.255.255.252)
IP range
192.168.0.1-192.168.0.254
192.168.0.1-192.168.2.150
(the total number of hosts must not exceed 65536, i.e. X.X.0.0-X.X.255.255)
Shortened IP range
192.168.0.1-254
192.168.0.1,5,7
192.168.0.1-50,125,130
192.168.0-3,5,7.1-254
Windows workgroup name (prefixed with WG:)
WG:MSHOME
Domain controller
Hostname or IP address of a controller prefixed with AD:
AD:10.0.0.1
AD:servername
This works even when your PC is not in a domain.
LDAP notation
LDAP://OU=Seattle,OU=Washington,OU=USA,DC=company,DC=local
Only works when your PC is in a domain.
Shortened LDAP notation
There are several ways of defining an Active Directory object. These notations are converted into LDAP and can only be
used from inside a domain.
Domain
DC:company
DC:company.local
Container
CN:Computers
Organizational unit
OU:Seattle
OU:Seattle.Washington.USA
Exception task
A hostname or an IP address of a node that needs not to be scanned, prefixed with a " -"
-APACHESERVER
-10.0.0.1
The Quick Add field stores the history of commands you typed in, similar to how Windows command prompt does. Browse recently
used commands using up and down arrow keys.
Sidebar
The Add scan task group on the sidebar contains these items:
This PC: adds a task for scanning the computer running the current instance of TNI 3;
All assets: adds tasks for rescanning of each asset in the storage;
Selected assets: adds tasks for rescanning of the selected assets;
IP networks;
This group contains automatically detected networks that your network adapters are set up to use.
Windows network;
Here, all visible Windows workgroups are listed.
Active Directory.
Your default naming context and root domain naming context are presented here.
The Connect to domain option allows to use another domain controller. It has the same effect as typing AD:<hostname or
IP of a domain controller> into the Quick Add field.
You can create tasks for rescanning the existing nodes in several ways:
1. Simply type the hostnames or addresses of assets into the Quick Add field;
2. Select the corresponding nodes in the Network tree with your mouse or using Shift or Ctrl and drag them into the task list area:
Drag and drop a group, and a task will be created for each asset it contains.
Node discovery
Complex scan tasks (i.e. network scan, IP-address scan or Windows workgroup scan) work with previously discovered nodes. The discovery
will be performed automatically, but it also can be done manually before scanning starts.
To perform the network discovery, just expand a complex task. The subtasks corresponding to discovered nodes will gradually show up.
Searching is accompanied by animation. It can be stopped by pressing the Stop search button.
When the search is completed or stopped, two additional buttons appear on the right:
Repeat search deletes all subtasks and performs a new node discovery;
The Padlock option shows the way the complex task will be saved in Saved tasks.
When the padlock is opened, the task will be saved without subtasks, and the search will be performed again when the
saved task is added again.
To save the task along with the configured subtasks, click the padlock and it'll close.
About saving scan tasks.
Setting logins
To access a remote node, the TNI 3 scanner requires a login (username and password, or a community string for the SNMP protocol).
Logins for each task can be specified in columns corresponding to their protocols.
Click on an arrow in any protocol cell, and the login menu will show up.
This list contains all logins created by the user and the standard login for the protocol (for Windows: the current user of the system where
the program is run; for SNMP: a public community).
To scan an asset by the selected protocol, select one of the logins or create a new one by using the Add option.
Along with the username and password (or the community string for SNMP), an alias should also be specified when adding a new login. An al
ias is a unique identifier that will be used to address this login in TNI.
To change the username and password for previously created logins, use the Edit button (the pencil icon) located in front of every login in
the list.
Only one login for one of the protocols can be selected for any single task. If the login is not specified, the task will be ignored during
scanning.
Complex tasks can have several logins for each protocol. In this case, access to every asset scanned within this task will be sequentially
requested using all specified logins until one of them matches.
A tilde (~) in a login cell means that the task uses the logins of a parent task, but another login can be assigned to the task, and it will be
used for scanning.
Logins for assets of various types
If the asset is not present in the Storage and the scanning has not been started yet, TNI doesn't know its type, therefore the protocol to scan
this asset with is unknown as well. In this case, login for any protocol can be set.
When the asset type is known, it can only be scanned via the appropriate protocol: Win for Windows-assets, SSH for Mac OS X and Linux
assets, etc. The cells of other protocols will be greyed out and inactive.
Assigning a login to an asset in the Storage means that a new scan task for this asset will be automatically created with the assigned login.
Assigning logins to assets, as well as creating, deleting, editing logins and changing default logins can be performed in the Edit mode. For
more details, see Logins.
On the first scan of a remote asset, the login that successfully provided access is automatically assigned to it.
A new task automatically acquires a login entered with additional semicolon-separated login command:
For instance:
By default, all new assets are placed in the root folder of the Storage.
You can select a folder in the Storage for every task, and the scanned assets will be placed there.
The Destination folder column serves this purpose. Clicking on an arrow in this column will show a menu with the list of all storage folders.
It's not possible to create a new folder from this menu. If assets should be placed in a new folder, create it manually beforehand.
You can use an additional "to" command when creating a new task with Quick Add:
EARTH; to Planets
Deleting tasks
To delete a task, use the Delete button in front of its title in the Task column or select multiple tasks and press Delete on the keyboard.
Disabling tasks
To disable a task without deleting it, tick off the checkbox in front of its title. This can also be done by selecting multiple tasks and pressing
the Space bar. To enable or disable all tasks, use the checkbox in the Task column.
You can create a new task as disabled through Quick Add by using an additional disable command:
<task creating command>; disable
Exceptions
You can create an exception task using Quick Add. Just enter a network name or an IP-address with prefix "-" (minus). If the exception task
is enabled, the scanner will ignore the specified asset.
Exceptions are convenient to use for scanning networks and ranges. For instance, if one or several assets in the 10.0.0.0/24 netwo
rk should not be scanned, you can do the following:
1. Create a task, expand it and wait for all subnodes to be discovered, then delete the unnecessary ones;
2. Create a task and several exception tasks.
It displays the current status of the scanner and additional command buttons. Certain buttons may appear or disappear depending on
situation.
When the tasks have been added and configured, click Start scan.
Scanning
You can't remove, disable or configure scan tasks during scanning. All disabled tasks are hidden.
The Status column displays the progress of each task and their current states.
Click Stop scan if you want to interrupt the scan process. This operation can take some time.
Click Stop scan if you want to interrupt the scan process. This operation can take some time.
You don't have to stop the scan process to add new tasks. Simply create new tasks during the scan: from the Quick Add field, by
dragging assets into the scanner area or in any other way. They will be processed when in turn.
You don't have to monitor the scan process. You can freely switch to a different mode and work there while the scan is performed
in the background. The icon in the Scanner tab displays the scan progress.
Scan results
When the scanning is done, the results of every task are displayed in the main area.
If an error has occurred while processing any of the tasks, you'll see an error message in the Status column.
Names and statuses of tasks can be copied by selecting them and pressing Ctrl + C or via the context menu.
The sidebar displays the overall scan result and some additional commands.
Back to editing: dismisses the scan results and returns to normal mode.
Clear finished: only leaves the tasks that have not finished with success for one reason or another. This allows to eliminate the
causes of errors and run the scanner again without rescanning the tasks that finished with success.
Saving, importing and exporting tasks
Saving and loading
Importing and exporting
Manually creating a task list file
To save a task list, click Save current tasks on the Sidebar. Once saved, a task list can be loaded and used at any time.
To load a previously saved task list, click on its title in the Saved tasks list.
When a task list is loaded, its tasks are appended to the tasks already in the scanner. If you want to only load the tasks you saved,
clear the tasks in the scanner before loading the list.
If you need to pass a task list on to another TNI 3 user, you can find your saved lists as separate files in the Tasks subfolder of the
program's application data folder ({Path to the Application Data folder}\Total Network Inventory 3\Tasks). It can be accessed by
clicking the Open tasks folder link on the Sidebar in the Scanner mode.
To export the current task list click Save tasks to file. You can choose between file extensions .task-list and .txt.
Sometimes it's convenient to manually create a list of nodes that need to be scanned.
Using the Load tasks from file command, you can turn such a list into tasks for the TNI 3 scanner.
In general, the task file in TNI 3 is a simple text file where each line is a command that adds one task.
The simplest example of a valid task file is a list of IP addresses and network names, each in a separate line. However, the options are not
limited to network names and IP addresses. You can find the full list of supported notations here.
Scan scheduler
Creating a scheduled scan task
Setting up a scheduled scan task
Run log
Managing scheduled scan tasks
Scan tasks can be scheduled to run on a specified day and at specified time, or daily, weekly or monthly using flexible rules.
The scheduler works with saved tasks. For information on how to create them, see:
1. Move your cursor over a task in the Scanner's sidebar and click Schedule this task;
2. Go to Options / Scan scheduler, click the Add task dropdown and choose your task from the list.
Clicking the [+] button to the left of the task name in Options / Scan scheduler reveals its settings.
Once
On a specified date.
Daily
Every day at specific time, or once every N days.
Weekly
On specific weekdays every Nth week.
Monthly
On specific days of chosen months of the year.
The exact Time of scanning can be specified using the corresponding field.
For repeated tasks, the Starting date can also be specified. The task will not be executed before this date.
Run log
For a task to be executed at the scheduled date and time, TNI must be running, and the scanner must not be busy with other
tasks.
Each scheduled scan task has a separate Run log (accessible from Options / Scan scheduler). Each time a task is run or skipped, TNI adds an
appropriate descriptive entry to the corresponding log. A run log can be cleared or copied to clipboard.
Toggling the switch to the right of a scheduled scan task in Options / Scan scheduler on or off enables or disables the task. You can temporar
ily disable the task to stop it from running on scheduled days and re-enable it at any time.
To unschedule a task, click the X to the right of the scheduled scan in the Options window.
The saved task itself will not be deleted, only removed from the scheduler.
Another way to remove a scheduled scan task is to delete the corresponding scan task itself from the Scanner's Sidebar.
Scanning using agents
One of the ways TNI scans remote devices is by sending an agent to them. The agent then studies the remote system, obtains the inventory
information in the form of a data file and sends it back to TNI. When the scanning is complete, the agent is erased from the remote system and
no traces of scanning remain. You can learn more about the scanning technology from the Techpaper.
This section describes how TNI's scanner agents can be used as standalone tools.
Manual scan: use standalone scanner tools for inventorying assets locally when they're not accessible remotely.
Logon script scan: configure the script that automatically scans computers that show up in a domain.
Resident agent scan: automatic scheduled scan of any Windows computer without the main unit's direct participation.
Manual scan
1. Copy the agent executable to the asset you need to scan
2. Perform the scan
3. Import the data into your Storage
Manual scan can be used to inventory assets that are not connected to your network or are inaccessible for regular scanning for one reason
or another. For example, assets running Windows XP Home Edition can only be scanned this way due to OS limitations.
Agents are located in TNI's installation folder (e.g. "C:\Program Files (x86)\Total Network Inventory 3"). The filenames are as follows:
OS X agent: tnimacagent
The Windows agent can also be copied to a specified folder by using the Export standalone scanner option from Options – Logon script.
Launch the agent on the remote system. When the scanning is complete, a data file will be generated and, by default, placed into the
directory the agent is run from.
When scanning a Windows asset, you can use these command line parameters for tniwinagent.exe:
/path:"\\server\share" allows to set a path to a folder where the data file will be placed;
/delay:XX specifies the gap in seconds between the agent's launch time and the start of the scan;
/overwrite overwrites the data file in case the target folder already contains its older version (otherwise, new files appended with
(2), (3), etc. will be created after each scan);
/scripted is required for running the logon script scan;
/debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will be
created, which can be sent to the developers in order for them to search for and fix possible scan errors;
/driver:{x} controls the low-level hardware scan mode. Set x to:
Linux, OS X, FreeBSD and ESX agents are run from the console. For example, you can run the Linux agent using the following command:
When scanning Linux, OS X, FreeBSD and ESX systems, the following command line parameters can be used:
-silent allows to scan an asset without user interaction. Only the scan progress percentage will be displayed;
-log allows to scan an asset while logging the scanning process;
-debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will be
created, which can be sent to the developers in order for them to search for and fix possible scan errors.
Locate the generated data file and send it back to the system that runs your copy of TNI (or any other place TNI has access to).
3. Import the data into your Storage
You can do this in several ways: by placing the file directly into the Storage folder, by using the Import menu, or by enabling the automatic
import if the manual scanning should be performed regularly. See the Data import section for details.
Logon script scan
Setting up the logon script scanning
Automatically importing new data files
This type of scan uses TNI's Windows agent to automatically scan any Windows computer as it logs on to the domain. This is achieved by
adding a specific command line (with a call to a previously exported agent executable) to the user's domain logon script. Whenever the script
is run, the agent is run on the remote asset as well. It generates a data file and places it into the specified directory. The resulting set of data
files can then be imported to the TNI Storage either manually or automatically.
Go to the Scanner tab and click the Set up logon script scan button on the Sidebar (or open the Options window and go to the Logon script p
age).
Use the Export standalone agent... button to place a copy of the Windows agent (tniwinagent.exe) into the shared folder of your
choice. Make sure that the scanned assets have read rights to the folder you choose.
Path to agent: contains the path to the agent's executable.
In the Save path field, specify a separate folder that will contain the data files generated by agents. This folder should be accessible
for writing from the remote assets.
You can add a delay before scan start in order to prevent performance issues caused by the scan process starting simultaneously
with autorun programs.
Overwrite existing files: when enabled, the previous versions of data files will be replaced with the new ones when the assets are
scanned repeatedly.
Any modification of the above parameters generates a command line for the logon script. You may copy the command and paste it into the
logon script manually, or let the program do it for you by clicking the Add the command to a script button.
To automatically import the data generated by the logon script scan, go to Auto-import options and specify the path to the folder containing
the data files (from the Save path field in Logon script settings) into the Import data path field. This way, your Storage will always contain
the most recent configuration information from each computer in your domain. See the Data import section to find out more about the
automatic import feature and its parameters.
Resident agent scan
Setting up the resident agent
Resident agent settings
Agent activity schedule
Automatic resident agent deployment and uninstallation
Manual resident agent installation and uninstallation
Updating the resident agent
This type of scan uses TNI's Windows agent to automatically scan any Windows computer without the main unit's direct participation. It can
be arranged by installing the resident agent as a service on the remote computer. The service then performs scheduled scans and can send
the data file – generated after each scan – via e-mail or FTP, or save it to a network share. The data files can then be imported to the TNI
Storage either manually or automatically. The advantage of this scanning type is in the ability to collect information from computers that the
main TNI unit has no or limited access to.
Go to the Scanner tab and click the Set up resident agent button on the Sidebar (or open the Options window and go to the Resident agent p
age).
Show resident agent deployment controls in the Scanner: allows to make the buttons Deploy and Remove resident agent on the
Sidebar in the Scanner tab visible or hide them. See Automatic resident agent deployment and uninstallation.
Auto-update the agent or settings from a network resource (HTTP or SMB): allows to set the path to the folder on a web or file
server that the resident agent can self-update or obtain new settings from. See Updating the resident agent.
Data transfer method: allows to select one of the 3 available protocols using which the scan results are to be sent. If the Do not sent
data option is set, the files will be saved to the current folder where the agent is installed (for the automatically deployed agent, it's
C:\Windows\TNIRESIDENTAGENT\).
Keep sent data in the 'Sent' folder: allows to disable automatic deletion of inventory files after they're sent. Files can be found in subf
older Sent inside the current folder where the agent is installed (for the automatically deployed agent, it's C:\Windows\TNIRESIDENT
AGENT\Sent\).
Use the Export resident agent… button to place the agent's files into the folder of your choice for further manual deployment on
remote computers. The files exported include a copy of the Windows agent (tniwinagent.exe), the settings file (tniwinagent.ini) and
– if required by the agent according to the settings (see below) – 2 libraries (libeay32.dll and ssleay32.dll).
The two libraries will be exported along with the agent and necessary for its correct operation when any of the following combinations of
settings are used:
Data transfer method is set to SMTP, Send to MX server is disabled, and either STARTTLS or TLS/SSL is selected as the Security level
;
Data transfer method is set to FTP, FTP proxy is disabled, and an FTPS address is specified as the URL;
Auto-updates from a network resource are enabled via HTTPS.
If FTP proxy is enabled, encryption will not be used even if an FTPS address is specified in the URL field.
When using FTPS, the agent will attempt to encrypt both the command channel and the data channel. If the server does not
support this (and some servers won't), only the command channel will be encrypted during further transfers.
For both the SMTP and FTP transfer methods, TLS is not enforced. If the server does not support TLS, the transfer will be
performed over an unencrypted connection.
Scheduling the agent launch is essential. If the schedule is not created, no scans or data transfers will be performed.
Before deployment, set up the Resident agent. Then add computers to the task list, select logins and click Deploy resident agent on the
Sidebar.
Buttons Deploy and Remove resident agent will be displayed only if enabled in Resident agent options, and if tasks have been adde
d to the task list.
Deploy resident agent. The main TNI unit uploads tniwinagent.exe, tniwinagent.ini and, depending on the data transfer and
auto-update settings, 2 .dll files to remote computer folder C:\Windows\TNIRESIDENTAGENT and then connects to the Service
Control Manager to install and start the agent as a service.
Remove resident agent. The main TNI unit connects to the Service Control Manager to stop and uninstall the resident agent service.
Folder TNIRESIDENTAGENT is deleted.
When the resident agent is removed, all content from TNIRESIDENTAGENT, including inventory files and logs, is deleted
permanently.
Manual deployment can be used when the computer that needs to be inventoried is not connected to your network or cannot for whatever
reason be deployed to automatically.
1. Set up the resident agent and use Export resident agent… to place tniwinagent.exe, tniwinagent.ini and, if required by the settings, 2
.dll files to an empty folder.
2. Move this folder containing the files to the remote computer where the agent has to be installed. Make sure that the resident agent
folder will not be deleted by accident.
3. Start the resident agent service from the resident agent folder using the following command:
tniwinagent.exe /install
The following switches can also be used during installation:
/start will start the service right after the installation;
/testrun will run a test scan when the service is started for the first time, and the resulting data will afterwards be transferred via
the selected protocol.
A message will notify you when the service is successfully installed or uninstalled.
The resident agent can be updated on the remote computers using one of the following methods:
In this case, the resident agent doesn't need to be removed first because the contents of the agent's folder – including any
saved scan results – will be deleted.
2. Configure auto-updates from a network resource. For this, enable this option from Resident agent options and specify the path to
the directory where the updated versions of the agent and the settings file will be placed. If only the settings need to be updated,
then the settings file (tniwinagent.ini) alone may be copied into the specified directory, without the agent file.
The resident agent automatically checks for updates 5 minutes before the scheduled scan and updates itself if necessary.
It's not possible to update the agent without the settings file.
Common reports
The Common reports mode is activated by clicking the Viewer & reports tab above the main area or by pressing Ctrl + 2.
In this mode, you can study each asset's configuration in detail by browsing the information collected during scanning. Information is sorted into
categories: Processor, System memory, Operating system, Installed software, Shared resources, etc.
This is also the right place to build full and brief reports for printing or exporting to popular formats. Reports can cover several assets and
information categories at once.
Related topics:
To build a report on one or several assets in the Storage, you must first select them in the Network tree.
In certain cases, the report will be rebuilt automatically in response to your actions. But whenever report customization takes
several steps (e.g. when selecting several assets one by one), no auto-updating will occur; press F5 or click the blue hint bar to
update the report manually.
Group summary
To build a group summary, choose a group while in the Single selection mode.
Clicking on the gear button to the right of the Group summary item in the Sidebar will open its settings, where unwanted overview items can
be disabled.
The gear button to the right of the Alerts item in the Sidebar opens the alert settings window.
Remember: to include only one asset in the report, it's enough to click it (when the Multiple selection mode is disabled); to include
several assets, you need to first enable the Multiple selection mode by ticking the Several assets checkbox.
The Sidebar will display the list of information categories that can be used to build a report. Contents of this list depend on the number and
type of selected network nodes.
If a single asset is chosen, a list of its snapshots will be displayed at the top of the main area:
To switch between snapshots, use the Earlier snapshot and Later snapshot arrow buttons or select a date from the drop-down list. When the
snapshot is selected, the current report will be automatically rebuilt.
When several assets have been included in a report, only the latest snapshots are used.
Click one of the categories to see a report on it for the selected assets.
To include several categories in a report, tick the Several categories checkbox. As a result, a checkbox for every category will be displayed.
Tick the categories of interest and refresh your report.
The main categories are sorted into groups: Hardware, Software, Other.
The contents of the main categories are described in the Collected information section.
Additional categories:
After one or several assets in the Network tree and the report categories have been selected, information about the assets will be displayed
in the main area.
Selection
You can select lines in the report in a normal way, use the mouse or keyboard keys Shift and Ctrl.
To easily select a group of fields, click its header.
To select the whole report, press Ctrl + A or use the Select all option from the context menu.
When using the context menu options, only the selected lines are affected.
When using the Copy and Export buttons in the upper right part of the main area, all displayed information is copied or saved whether it's
selected or not.
Copying
1. Copy as text
Group titles, field names and values are copied. Nesting levels will be indicated by tabulation characters in the beginning of each line.
The same character separates field titles from values.
This method is used for copying by default. This is also the way information is copied when you press Ctrl + C.
2. Copy as CSV
CSV (Comma-separated Values) is a text format that is convenient for storing structured information.
Export
You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.
You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.
To save to PDF, HTML, RTF and ODT formats, build a printable report and export it.
To initiate a search, click the search field at the top of the main area or press Ctrl + F. The search will be performed instantly as you type.
When the Filter checkbox below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.
The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result is
achieved by pressing the up and down arrow keys on the keyboard.
Printable reports
Types of printable reports
Zooming and changing paper format
Search
Customizing printable reports
Printing and exporting
To switch to the Print preview, click Printable reports in the upper-right corner of the main area.
The Print preview toolbar will appear. Printable pages of the report on currently selected assets and categories will be displayed in the main
area.
Close print preview (the X on the right edge of the toolbar) to return to the normal mode.
You don't have to close the print preview to build another printable report. Simply work in this mode as you would in the normal
mode. Selecting assets and categories will update the printable version automatically.
The Paper format drop-down menu is used to set paper size and text orientation.
Search
To initiate a search, click the search field at the top of the main area or press Ctrl + F. The search will be performed instantly as you type.
To highlight the next match, click the Next result arrow button or press the down arrow key on the keyboard.
To highlight the next match, click the Next result arrow button or press the down arrow key on the keyboard.
The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result is
achieved by pressing the up and down arrow keys on the keyboard.
Click Reports options to open the TNI 3 options window on the Reports page.
The company title and logo, printed in the header, can be set as well. See Storage properties.
To save the report to a file, use the Export button. You can choose from PDF, TXT, HTML, RTF and ODT formats in its drop-down menu.
Clicking the button itself initiates an export to PDF.
Additional features
User information overview
Viewing and adding notes
If a single network node is selected, the name of the user assigned to the node will appear in place of the Users category in the Sidebar.
Expand it via the [+] button to the right and the user's image, full name and contacts will be displayed:
Clicking on one of the contacts will copy it to clipboard (if it's an email address, the email client will be opened).
The Edit user button activates the Edit / Users mode, where you can edit user information or assign another user to the computer. For more
details on this mode, see Users.
To do this:
To edit, delete or copy the contents of a note to the clipboard, use the corresponding buttons. You can also initiate note editing by
double-clicking it. An alternative way of deleting a note is by clearing its contents.
Learn to use notes more efficiently, display them next to assets in the Network tree and filter computers by the note contents: abo
ut Storage assistants.
Another way to add a note is via the Network node properties screen.
Another way to add a note is via the Network node properties screen.
Table reports
Working with a built report
Multi-column sorting
Changing the column order and visibility
Searching and filtering
Exporting and copying
Printing
The Table reports mode is activated by clicking the corresponding tab above the main area or by pressing Ctrl + 3. In this mode, you can
build a table report that contains only the information you need.
To build a report:
To build a report on all computers in the Storage, select the root node of the Network tree.
TNI 3 has a number of standard report templates, but you can create your own template by clicking the New template button on the Sidebar.
A separate editor is used for creating and modifying templates. To learn how to use this tool, see the Creating a template section.
Multi-column sorting
Beside the regular sorting by way of clicking on a column header, the tables in TNI 3 can be sorted by
many columns at once. Just sort by one column, then click another column header while holding Ctrl. The
arrows in column headers show their sorting directions. The numbers appearing beside the arrows show
the sequence in which the columns sort the report. You can sort by up to nine columns simultaneously.
You can hide and show columns using the context menu of the column headers.
To initiate a search, click the search field at the top of the main area or press Ctrl + F. The search will be performed instantly as you type.
When the Filter checkbox below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.
Use up and down arrow keys to be forwarded to next and previous results of the search.
To export or copy the table, use the context menu or buttons to the right of the search field. The report can be exported to text, CSV, HTML,
XLSX.
It's better to export or copy the report in the CSV format if you're planning to import it into the spreadsheet processor.
Printing
To build a printable table report, click Printable reports in the upper right corner of the main area. Printable reports can be exported to text,
PDF, RTF, HTML, ODT.
Printable reports preserve the arrangement, visibility and sorting by columns, as well as line filtering.
Related topics:
Related topics:
Creating a template
Template management
Creating a template
Selecting the object for your report
Selecting fields for the report
Fields of the Asset object
Fields of other objects
Filtering fields by asset types
Complex fields
Searching fields
Modifying selected fields
Adding conditions
Creating expressions
Creating complex expressions
To create a table report template, click the New template button on the Sidebar. The template editor will be opened.
1. Object of report
2. The list of available fields
3. The list of selected fields
4. Condition builder
Every value retrieved by TNI 3 from remote assets can be displayed in a table report.
Start building the template by selecting one of the report object types.
Each single row of the resulting table report will correspond to a single object of the specified type.
A report can only be built for a single type of object. Selecting a new object will clear the list of selected fields. If you need to
display fields from different types of objects (e.g. operating systems and RAM units), select Asset as the object, since it contains
the fields of all the other objects.
Selecting fields for the report
When you've selected an object of report, its properties will be listed as Available fields.
Click one of the fields to select it. The circle next to its name will turn green, and the field will be added to the Selected fields list.
To delete a field from the template, click the X next to the field's name in the list of Selected fields or click the field in the list of Available
fields once again. The circle will revert to gray.
This is the main object type, containing all the fields known to the program:
Network node properties: network attributes, date of the latest update, asset type, identification number, etc.;
Data from the main categories: hardware, operating system, installed software, user accounts, etc.;
Other data: custom fields, alert messages, user information.
All types of objects except for the Asset belong to a hypothetical asset. Therefore, attributes of the asset containing the object can be
included in the report along with the fields of the object itself. Thus, the list of available fields is divided into two parts.
For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.
For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.
By default, the list of Available fields displays all fields of the chosen object, and icons of all types are highlighted in blue in the filter pane:
Click one of the icons to hide the fields specific to the corresponding type. Another click will display them again.
Complex fields
A complex field can be added as a whole, but you can add its elements independently as well.
To view the elements of a complex field, click the [+] button next to its name:
Searching fields
Type a field name into the search field to only display the matching fields and the groups that contain them.
The order of the fields defines the order of the columns. You can reorder them by dragging them with your mouse (first select the field and
then drag it).
To delete a field from the template, click the X next to the field's name in the list of Selected fields or click the field in the list of Available
fields once again.
Click the [+] button to the left of the selected field's name or double-click the field to access its properties:
Title: defines the name of the column. Full names of some fields are too long and inconvenient. You can change them to a more
appropriate and shorter title in this field. Later you can revert the title back to the default by clicking the Restore icon on the right;
Sorting: Use this to automatically sort the column in any direction;
Fix column: A fixed column remains on the screen when you scroll the table horizontally. You may fix any number of columns;
Hide column: hides the column from the report. You may still use values in it for sorting or for filtering using conditions (see below).
When the table report has been built, you can right click its header to hide or reveal columns via the context menu.
Adding conditions
Conditions are used to filter the table rows based on the values from selected columns, or combinations thereof.
To add a condition, you first need to add some fields to the report and then create a simple or complex expression using the Condition
builder.
Creating expressions
An expression consists of a field, a type of comparison and, in most cases, a value. To build one, specify all the elements when prompted.
Different kinds of fields will provide different types of comparisons and values. Numeric fields can be compared with numeric values; strings
can be matched against masks or other strings; some values can be selected in the list.
A complex expression is a chain of simple expressions and logical operators: AND, OR, NOT.
To create a complex expression, first create a simple expression as described above. Buttons "And..." and "Or..." will appear below. Select
one to chain in the second expression. A logical group of expressions will be formed.
To add another expression to the existing group, click the small (+) button below. After, click "And..."/"Or..." if you want to make it a part of
a new logical group.
In the Sidebar, templates with conditions are indicated by a small funnel icon overlay.
Don't forget to name your new template and press OK. The report will be automatically built and the template will appear in the Sidebar, to
be used when needed.
Template management
Using templates built by the other users
Three buttons appear when you hover over a user template with your mouse:
TNI 3 stores table templates as files with the .table-template extension in the Templates subfolder of the program's application data folder ("
{Path to Application Data}\Total Network Inventory 3\Templates"). It can be opened automatically by clicking the Open templates folder link
on the Sidebar when in the Table reports mode.
To use a template built by another user, copy its file to the Templates directory. The template will become available in the Table reports mod
e.
Software asset management
The Software asset management (SAM) mode is activated by clicking the Software accounting tab or by pressing Ctrl + 4.
This mode lets you view all the software discovered in your network, browse software installations, track software items, organize them and
build a variety of software-related reports.
The owners of TNI 3 Professional have the ability to store software license data, manage licenses and see detailed reports on the compliance
status of licenses, software items, computers or single software installations.
Related topics:
Getting started
Software management
License management
Reports
Getting started
Creating a database
Importing a database
The software database must be connected to the Storage containing all the hardware assets you plan to involve in the software inventory
process. Open your TNI Storage or create a new one and use the Scanner to fill it.
The database has not been created yet, so press the gear button on the Screen selector to switch to the Manage database screen.
Creating a database
Click Update software database, and the process of analyzing each asset in your Storage will start. A list of software will be retrieved from
assets along with the discovered license keys. You only need to do this manually once. Subsequent changes to your Storage will be handled
automatically.
Importing a database
If you've used Software asset management in earlier TNI versions, TNI 3 will detect the old database and prompt you to import data from it.
Click the Start import button. The list of available items will appear.
It contains important information (i.e. tags and license keys). Click Import next to each item that you want imported into the new database.
Software management
To access the Software management screen, click the Software tab on the screen selector:
This screen has all the tools necessary for browsing, searching, filtering, organizing and inspecting software items and separate software
installations.
The Main software list displays every software item installed in your network.
Title & version: the name and publisher of each software item, as well as its platform: TNI analyzes both Windows and Mac OS X software. T
ags, comments and tracking status will also be displayed here.
Copies: the number of installations of each software item discovered in your network.
Licensing: compliance status for items that have licenses linked to them. Read about licensing in the License management section.
Searching software
Use the search bar on the top-right of the workspace or press Ctrl + F to activate instant search. Start entering a software item title or a
publisher name to narrow down the list.
Filtering software
Available software filters can be found to the left of the list. To apply one of the filters, click it and select its mode from the menu:
In the Copies column's cells two numbers are displayed: X/Y, where X is the number of installations on selected computers
and Y is the overall number of installations.
Tag filter: to display only the software with a specific tag (see the Inspecting a software item section to learn about tags);
Saved searches: to save frequently used search terms and quickly apply them to the software list; to add a search term, choose Add fr
om the filter menu.
Choose a title for your saved search and enter the desired term. You can also choose to create a regular expression to find items that
satisfy a complex condition.
Active filters are highlighted in blue. To deactivate a filter, click it and choose No filter from the menu.
Under the list of filters is the list of publishers. Next to each publisher is the number of software items released by them that are currently
visible in the main list.
The list can be used as a publishers filter. Click a publisher title to narrow down the software list. Click Clear publishers filter to deactivate the
filter.
You can select several publishers with your mouse and/or Ctrl and Shift keys. This could be useful when a single publisher is listed under
several slightly different titles:
Use the search bar above the list to quickly find publishers.
You can pin an important publisher to the top of the list by hovering over an item and clicking the little pin icon to the left of it.
An indicator next to the screen selector displays the number of currently visible software items at all times.
Whenever a filter is applied to the software list, a filter deactivator appears below the list. All filters can be cleared at once as well.
Select one or several software items in the Software list to inspect them in the Details panel.
Tags
Click Add tag in the header of the Details panel to assign a tag to a software item. From the menu, choose one of the available tags or add a
new one. A corresponding tag icon will appear as an indication that the tag has been assigned (it will appear in the software list as well as in
the Details panel).
You may assign an arbitrary number of tags to a software item. You may also assign a tag to multiple software items at once by first
selecting them in the software list.
To remove a tag from the software, click the X on the tag icon.
To delete a tag completely, you have to remove it from all software items that have it. An easy way to achieve this is to use the Tag filter to
select all such items and then remove the tag from all of them at once.
Installations
The Details panel opened in the Installation mode displays a complete list of installations of the selected software and contains the following
information:
The text displayed in the Computer column is the same as in the Network tree. Use the Network tree display menu to change it.
The search bar allows to find installations by computer or by previously added comment.
Click On selected computers and make a selection in the Network tree to narrow down the installations list. Click All installations to clear the
filter.
You can select any number of rows and press Ctrl + C to copy them in plaintext format.
Click Installations summary for a quick printable report on all displayed installations.
Comments
Select Comment in the list of Details panel modes. A text field will appear on the right. You can type arbitrary text in it and it will be attached
to the software item when you switch away.
An icon in the software list indicates the presence of a comment. Hover over it to read the comment. Click it to go to the comment editor.
Additional features
To quickly find out about unfamiliar software, click Google this software on the bottom-left.
If the publisher has specified the software website, the link will be available on the bottom-left.
Related topics:
Switch to the Tracking mode on the Details panel to access the tracking policy editor.
Tracking is used to mark software as must-have or forbidden on all or only specific computers. Computers that violate the policy are easy to spot
and build reports on. Also, you can easily see the tracking summary for separate software items you choose to track.
By default, a software item is neither must-have nor forbidden: the corresponding lists in the policy editor are empty.
You may specify tracking rules of either kind (or both) by dragging assets or groups from the Network tree into the lists.
The Must-have list contains computers that are obliged to have the software installed on them. If a copy of the software is not found, a
violation is registered.
The Forbidden list contains computers that are prohibited from having the software installed on them. If a copy of the software is found,
a violation is registered.
Immediately after adding computers to a list, you can see all violations at a glance.
You can apply the policy to all computers at once by selecting for all from the drop-down menu in the header of each list.
Click the X next to a computer in the list to stop tracking it. In the for all mode, removing a computer creates an exception: the computer will not
be reported as violating the policy regardless of the situation. To cancel the exception, remove the computer from the exceptions list.
Tracked software items are marked with a crosshair icon that appears to the right of its title in the software list and indicates its tracking status.
You can limit the software list to only tracked at any time by applying the tracking filter.
To see all computers that violate tracking policy for any software item, use the Tracked software storage assistant.
For a quick printable report on tracking status of single software, click Tracking status or Tracking violations to the right of the tracking lists.
Merging software items
Some software items may represent different versions of the same software. Having duplicate records for the same entity is not always
convenient or acceptable (e.g. you can only link a license to a single software item, whereas in reality it could cover all versions of this software).
In most cases, a publisher will fill the software info in such a way that a single item can be recognized with different versions in different
installations. Merging is the tool designed to deal with other situations.
Select all versions of the software in the main list. Use search and filters to find them faster. To make a multiple selection, drag your mouse or
use Shift-clicking and Ctrl-clicking.
If necessary, enter the title and select the publisher from the drop-down list, check the list of versions again, tick the safety checkbox and click
the Merge selected software button. This is what a merged software looks like in the main list:
This feature is NOT a replacement for groups. Do not merge software by kind, by purpose, by publisher, etc. You can use tags in these
cases. Only use merging for combining different versions of the same software into a single item.
You can later add new items to the merged software in the same way.
To remove an item, switch to the Merged tab and click the X next to the item you want to remove.
To keep track of licensed software, create a license, connect it to a software item and assign it to separate installations. You can also set up
rules for each license to use in order to determine compliance status of these installations.
License key is another entity within a license. Creation of license keys allows for easy management, simple visual representation of all
connections and detection of new licensed installations on the fly.
TNI does not provide support for fixed licensing models due to a large variety thereof. What TNI provides instead are the uniform tools that
help to fit the rules of any specific license to most real-life situations.
To access the License management screen, click the Licenses tab of the Screen selector:
This screen provides the tools for creating and managing software license assets, setting up licensing rules and keeping track of the licensing
status of your software.
1. The main list of licenses
2. The list of licensed software
3. The Details panel
Related topics:
Creating a license
Sorting out auto-detected license keys
Licensing software installations
Editing a license
Creating a license
The most common way to create a license is to use the corresponding button under the Screen selector.
Name the license and use the search field or the list to find the software item to attach the license to, then click Select next to its title. In some
cases, the software will be selected automatically.
Fill in the license properties. The most important are the Keys are mandatory/optional switch and the number of activations.
When the setting is Keys are mandatory, the number of copies that a single key activates needs to be specified. The most common scenarios are:
However, you're free to create a license with several volume keys or just one single-activation key. Any combination will work.
In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.
In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.
Copy the license keys into the License keys field, each key on a separate line. You will be able to add or remove keys later, either by editing this
list or by manipulating key entities directly.
When the setting is Keys are optional, the total number of activations the license allows needs to be specified. License keys will be ignored. A
software installation is considered non-compliant if the activation limit of the license is exceeded.
In any mode, click the activations field to see the ∞ (infinity) button. By setting the activation number to infinity, an unlimited capacity license is
created.
In any mode, set the activations to 0 to create a pirate license. Use these to track unwanted installations. You may also store known pirate
license keys in them.
TNI will automatically detect licensed installations of certain software along with the corresponding license keys. After switching to the Licenses sc
reen, you may see the following item at the top of the main area:
Click the item to display all detected licensed copies in the Details panel, sorted by software title and keys. From here, you can quickly find the
installations you're interested in and create licenses for them (or select from the existing ones) by selecting from corresponding action menus.
If the same key is detected in several installations, the corresponding row may be expanded to display the list of computers.
Sometimes, identical license keys are found in installations of different software items. This may be an indicator that those items are different
versions of the same software and should be merged. A special case hint will appear: click it and all suspected software items will be selected and
you'll be offered to merge them before creating a common license.
Pressing New license for this software will bring up the license creation window.
Licensing software installations
Assigning licenses to new installations
Managing installations under a license
Managing licensed installations for a software item
Select a license in the main list and go to the Installations page of the Details panel.
For a newly-created license, the list of licensed copies is empty. On the left, click Installations without license to display all unlicensed
installations of the affected software.
Click Add to this license next to each installation that belongs to this license (or select all needed installations and click once). You may also
want to use the Computers & keys search field to find installations.
Select a license in the main list and go to the Installations page of the Details panel. Click Installations under this license on the
left to view the status of licensed copies.
The information on this page depends on the way you've set up the licensing rules. The illustration shows one of the possible cases. You can
see that the first key was used on four computers while the rules only allow for one activation per key. Thus, the remaining three copies are
marked as being Over limit.
Note that TNI considers the first of the four copies to be Compliant. If you know that is incorrect, you can use status switches to change it.
Click the green switch to turn it red: all copies will be Non-compliant, and all the red switches will be unlocked. Now click the switch on the
legit installation to turn it green.
If, for any reason, you want a copy to be considered Non-compliant despite the fact that it does not violate the licensing rules, you can
simply switch it to red and leave it that way. Your decision will affect the overall compliance status of the license and of the software item.
On the Software screen, select one software item and go to the Licensing page in the Details panel. From here, you can create and manage
licenses, assign installations to them, etc.
If a software item has a license attached, then, by default, all installations are expected to be assigned to it and to comply with its licensing
rules. Any installation not assigned to a license is considered Unlicensed and is displayed as problematic. But there might be instances where
you'd like these to be green. In that case, just tick the Consider compliant checkbox in the header of the Unlicensed group.
you'd like these to be green. In that case, just tick the Consider compliant checkbox in the header of the Unlicensed group.
Editing a license
Editing the license properties
Custom fields
Comments
Deleting a license
Click the Edit license button in the Details panel header to open the License editor window. This window is similar to the License creation win
dow and lets you change the affected software item, modify licensing rules, specify the price, purchase and expiration dates for the license or
edit assigned license keys in text mode.
Custom fields
You can add any information to a license by creating custom fields. In the Details panel, switch to the Custom fields page.
Among other available field types is the File attachment. You may attach any number of files to a license; the files will be copied into your
Storage and archived, available later at any moment by accessing the Custom fields page.
Comments
The Comment page of the Details panel allows you to attach an arbitrary text to a license. This is a convenient place for the EULA in case you
need to store it.
Deleting a license
To delete a license, select it in the main list and click Delete license in the Details panel.
Before they're deleted, TNI will ask you if you want to copy the license keys.
License deletion is irreversible. Its rules, license keys, custom fields and attached files will be lost.
Reports
General plain-text/CSV export
Quick reports
Advanced reports
Throughout the Software accounting tab, you can select data in any mode and right-click to access the copy/export menu (or press Ct
rl + C):
This results in creating easy-to-process plaintext tables of data. The feature is available in:
Quick Export to XLSX (MS Excel) is available from the copy/export buttons next to the main search bar.
Quick reports
You will find quick report links on most pages in the Details panel:
Advanced reports
TNI features a Software report builder for creating advanced customizable reports that cover user-specified items.
See Report builder.
Report builder
Creating a report
Creating templates
To open the Report builder, click the Report builder button in the Sidebar.
1. Report type
2. Report description and properties
3. Report content
Creating a report
Click Build report. A print preview will be displayed. You may then print or export it using the buttons on the top right. Available export
formats:
Plain text
Rich text, RTF
PDF
HTML
Open document file, ODF
MS Excel file, XLSX
Creating templates
Click Save as template in the Report description and properties area to add a link to the report to the Sidebar. You can use it later to quickly
build the report.
Change log
The concept
Reading a change log
Log summary, searching, filtering and printing
This mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing Ctrl + 5.
In this mode, you can choose an asset or a group of assets in the Network tree to see all the changes detected by TNI in their hardware,
software and other parameters over the inventory period.
The concept
Every time an asset is scanned, TNI creates a snapshot of it and places it into the Storage alongside the previous snapshots. You can switch
between various snapshots in the Viewer & reports mode using the date/time box next to the asset name:
You can manage snapshots from the corresponding section of the Edit tab. The auto-deletion policy can be set up in Options / Scanner. By
default, TNI stores up to 10 snapshots per asset and removes the ones that are more than 90 days old (except for the oldest one).
See Snapshots.
In order to build the change log, TNI compares the existing snapshots. The change log is not saved anywhere and is always built on the fly
from available snapshots.
To build a log, select one or several assets or a group thereof in the Network tree.
TNI displays the result of snapshot comparison in the form of a nested list.
The timeline is divided into Intervals sorted from the most recent to the least recent. Each interval has a starting and ending date and time
from adjacent snapshots. It also shows at a glance how many changes have been detected in this period of time.
Added,
Removed or
Changed.
Before generating a log, you can change the history depth value to view the changes from a certain number of snapshots, or select specific
objects on the Sidebar to only view the changes for these objects. Decreasing the history depth value or selecting less objects can
significantly increase the speed of generation if you store a large number of snapshots or if a large number of assets is selected.
After the log is generated, the Sidebar displays a full summary of logged changes.
Numbers on the right indicate how many elements of the corresponding type are present in the change log.
To only view events of a certain object type, hover your mouse cursor over the corresponding type and click the Hide the rest/Show all butto
n on the right. Click it again to quickly reveal the full log.
Use the instant search to narrow the log down: press Ctrl + F or click the search bar at the top and enter a search term.
Click Printable reports next to the search bar to print the change log. The printable version will respect all active filters.
Storage properties
Basic properties
Inventory number generator
The properties of the current Storage can be edited by switching to the Edit mode (Ctrl + 6) and selecting the Storage properties page in the
Sidebar.
Basic properties
A Storage name is its current title displayed in the Network tree, storage summary report and other places.
A Company name and a Company logo can be displayed in the header of a printable report.
To add a logo:
Use buttons to the right of the logo to load another image or remove the logo.
TNI 3 can generate inventory numbers for the network assets automatically.
The inventory number template may contain arbitrary text and the following macros:
# : unique counter. This number will be unique among inventory numbers built with this template only;
#* : globally unique counter (unique for the Storage);
%TYPE% : a short declaration of the device type (WIN, MAC, LINUX etc);
%HOSTNAME% : asset's network name;
%IP% : asset's IP address;
%IP.Х% : values of a particular octet in the IP address (X is a number between 1 and 4).
You can quickly add macros from the macros menu (the button to the right of the template string).
Generate for all generates new inventory numbers using the specified template for all assets in the Storage.
Automatically generate numbers for new assets: if this box is checked, the inventory numbers will be generated for all assets added to the
Storage.
Reset counters: after resetting, the numbers generated and assigned using # and #* templates will start from 1 again.
You can assign arbitrary inventory numbers to assets without using templates or the generator by manually specifying their numbers on the
Network node properties screen.
Network node properties
Network properties
Asset properties
Inventory number
To edit the properties of the selected network node, switch to the Edit mode (Ctrl + 6) and select Properties on the Sidebar.
To save the changes that were made on this page, you can do the following:
1. Click Apply changes at the top of the page (you can also discard unsaved changes by clicking Undo);
You can edit the properties of several assets at the same time by selecting several network nodes or a group of nodes in the Network tree.
Be careful when editing the properties for several nodes at the same time. It's impossible to revert to the previous state
automatically after applying the changes. Recovering lost data may take a lot of time.
A handy way of editing several network nodes in succession is by using hotkeys for selecting the next or previous network node: Al
t + Up/Down arrow. The changes are applied automatically in this case.
Network properties
You can change the network node name and IP address here.
Click one of the Resolve buttons to get the network name by IP address or vice versa.
Check the Static IP address box to access the asset by its IP address. Otherwise, the network name will be used for the access.
Asset properties
Device type determines the asset's icon in the Network tree and can be included in the table report.
Virtual type specifies the virtualization platform. Its icon will be included in the reports and displayed next to the node name in the Network
tree. Specifying any value other than Physical device marks the asset as virtual.
You can hide all the virtual assets in the Network tree or, conversely, display only the virtual assets. There is a special assistant for
this.
Usually, you won't need to set the virtual type manually. TNI 3 automatically detects popular virtualization platforms.
An alias is an arbitrary computer name. It can be displayed in the Network tree instead of the actual network name or used in the reports.
Description is the computer description obtained from the system properties of the asset.
A Note is a comment left by user. There's a special assistant that works with notes. Notes can be added or edited in the Common reports mo
de.
For more details, see Viewing and adding notes, Note contents assistant.
Inventory number
The items in this section work in the same way as in Storage properties.
The Generate button creates an inventory number using the specified template.
Arbitrary text can be entered into the Inventory number field without the use of the generator when a single asset is selected.
You can set up the template for automatic assignment of inventory numbers to new assets in the Storage properties.
Inventory numbers can be displayed in the Network tree as an additional field or in place of node names. They can be searched
and filtered as well. For more details, see Information display settings and Searching in the Network tree sections.
Alerts
List of alerts
Disk space alert
Antivirus problems
Firewall problems
Auto-update status
Service Pack is out of date
Track software presence / absence
Using alerts
List of alerts
One or more logical partitions on the asset are low on free space.
In the alert settings, you can specify the threshold for the disk space alert in gigabytes or as a percentage of the total disk space.
Antivirus problems
Firewall problems
Auto-update status
Auto-update is disabled.
Using alerts
The Alerts page in the Settings window allows to disable each of the alert types and specify additional settings for the disk space alert.
Group summary contains a complete list of alerts for the computers in the group. All alerts in the Storage can be viewed in the
summary for the root group.
The Alerts category in the report on selected assets displays all alerts for the selected asset or assets. The number of alerts for the
selected assets is displayed to the right of the category in the Sidebar. The shortcut to the Alert settings becomes available when you
hover a mouse cursor over the category.
Alert messages can be included in the Table report when creating a custom template.
The Alerts presence assistant displays the number of alerts in the Network tree and allows to view a list of alerts for each asset in a hint, as
well as to hide all the devices that don't have any alerts.
When building a report on alerts, use this assistant to hide assets that don't have any alerts.
Snapshots
Viewing snapshot contents
Snapshot auto-deletion policy
Deleting snapshots manually
A new configuration snapshot is created following each successful scan. Each snapshot contains information about the state of hardware and
software on the asset at the moment of scanning.
Information collected at different times can be viewed in the Common reports mode. Use the snapshot list at the top of the main area to
browse different snapshots.
Limit the number of stored snapshots: old snapshots will be deleted when the new ones are created;
Specify maximum snapshot age: all snapshots older than the specified number of days will be automatically deleted.
The newest snapshot will never be automatically deleted. You can also make the oldest snapshot exempt from automatic deletion.
To manage snapshots, switch to the Edit mode (Ctrl + 6) and select the Snapshots page.
Snapshots in the main area can be grouped in two different ways: by assets or by date. To switch between them, click one of the buttons at
the top of the main area. Click the same button again to reverse the sorting order.
When hovering the mouse cursor over an asset, date or snapshot, a little arrow button appears. Click it to display the pop-up menu for deleti
ng snapshots.
When hovering over the menu commands, the snapshots to be deleted are highlighted red.
Custom fields
Managing custom fields
Custom fields in the reports
Custom fields are additional pieces of data that can be attached to individual assets in the Storage. Any custom field consists of a field name
and its value. Values can contain arbitrary information of different type: text, numbers, prices or dates.
To manage custom fields, switch to the Edit mode (Ctrl + 6) and select one of the two pages in the Custom fields category:
Common fields: fields created here will be shared by all the assets in the Storage (each asset has its own value);
Special fields: fields for the asset(s) selected in the Network tree.
If you hover the mouse cursor over any field or folder of fields, the X button to delete the item appears on the right.
You can change the order of fields and folders, as well as move items between groups, by dragging them using the mouse. Folders can be
nested infinitely, but are available for common fields only.
You can select several nodes in the Network tree to change the values of their common field(s) simultaneously. If multiple nodes are selected
and their values for the same common field are different, a Different values label will appear in place of the value. To replace these values
with the same value, click this label and set a new, common value. The same is applicable to Special fields if the field name is the same for
the selected assets.
In Common reports, you can include all the custom fields in a report by selecting the Custom information category.
You can also add any individual common field as a table report column when creating a custom template.
Logins
Management of Storage logins
Assigning logins to network nodes
A login in TNI is a set containing a username and a password (or a community string for SNMP), which are used to access remote assets
during scanning.
To display it, switch to the Edit mode (Ctrl + 6) and click All logins on the Sidebar.
To create a new login for one of the protocols, click the Add button below that protocol's list.
When adding a new login, an alias should also be specified along with the username and password (or community string for SNMP). An alias
is a unique identifier that will be used when working with a particular login in TNI 3. Aliases enable adding logins with the same usernames.
To edit a username or password, click on its field in the list. To change an alias, double-click it.
You can specify the default login for each protocol by clicking the option button to the left of it. This login will be used when scanning assets
for which no logins have been specified explicitly.
Logins can be added and edited in the Scanner mode right before scanning. For details, see the Managing added tasks - Setting
logins section.
To do this, select the asset in the Network tree, switch to the Edit mode (Ctrl + 6) and click Logins on the Sidebar.
All logins for the protocol that can be used to scan the selected asset will be shown. To assign one of them to the asset, click the small chain
icon to the left of the alias. The linked chain icon and blue highlighting indicate that this login is assigned to the selected asset.
Any login can be assigned to several network nodes at once. To do this, select the nodes or their group in the Network tree and select the
assigned login in the list.
When remote assets are scanned for the first time, logins that successfully provided access are automatically assigned to them.
Users
Viewing and editing users
Adding, deleting and renaming users
Editing user information
Searching users
Assigning users to assets
Displaying information about assigned users
TNI 3 allows to store information about your network users: their photos, names, addresses, contact information etc.
During the network scan, this information can be automatically obtained from Active Directory entities and user account settings on network
computers. Furthermore, you can create a new user record manually.
To manage users, switch to the Edit mode (Ctrl + 6) and select the Users page from the Sidebar.
The user list will show up on the left side of the main area, with the information about the selected user on the right side. The user list is
divided into categories by type: Domain users, Local users and Added manually.
The users of the currently selected asset are displayed in the Local users category. This category is hidden if multiple assets are selected.
To create a new user, click Add (+) over the user list and enter the username.
To delete a user, click the X to the right of the username in the list. To rename a user, double-click the username in the list.
After selecting a user in the list, you can see related information to the right: a photo, personal and contact info and addresses. This
information can be edited.
You can upload an avatar or a photo here. To upload an image, click Add in the Photo group and browse to a JPEG, BMP, GIF or PNG file. In
the next window, select the square area of any size in the image and click Done.
Searching users
To find a user in the list, enter the keyword in the Find users field. The list will be filtered as you type, highlighting the text that matches the
query.
query.
The search will be performed not only in user names but in all other information fields (e.g. phone numbers, e-mail addresses and
notes). After the search, when one of the users is selected, the matching text will be highlighted in the information area.
Any asset can be assigned one of its local users, any domain user, or any manually added user. Assigning a local asset user to another asset
is not allowed.
To assign a user to an asset or several assets, select them in the Network tree and click the small chain icon next to the assigned user.
Information about the assigned user can be viewed in the Common reports mode (category Users). Furthermore, the photo, full name and
contact info of the user assigned to the selected asset can be displayed in the Sidebar.
Any user information field can be added as a column in the Table report (see the Creating a template section).
Options
General
Scanner
Reports
Alerts
Auto-import
Logon script
Scan scheduler
Actions
SNMP
Resident agent
The Options window can be opened by clicking the corresponding button in the right part of the main menu bar.
General
Check the online status of assets periodically: automatic pinging of network nodes every few seconds can be disabled.
Scanner
Settings that control the scanner's behavior and the snapshot auto-deletion policy.
Reports
The company title and logo printed into the header are part of the Storage properties.
Alerts
On this page, you can enable, disable and set up the individual alerts.
More on alerts.
Auto-import
periodically updated re
The settings for automatic data import are available here. It may be used to import logon script scan results or
sults of external network scans in cases where no access to these networks is available from the current
location. This page allows you to set up automatic import of data when the program starts or at regular
intervals.
Logon script
This page serves as a tool for exporting the standalone scanner and for generating a command line for the Logon script scan.
Scan scheduler
Settings that control the scheduler, a list of scheduled scan tasks and their configuration tools are available here.
Actions
Choose the way in which the Action list (available from the Network tree context menus) behaves and access the editable custom actions file.
Also, here you'll find a summary of all templates and keywords of the action definition syntax: click to copy or hover with your mouse to view
a hint.
See Actions.
SNMP
Enable or disable the full SNMP scan from this page. This mode allows to collect complete SNMP information from SNMP-enabled devices (i.e.
perform an SNMPWalk). When this mode is disabled, only some basic information from the system and interfaces sections is collected.
Also, you can add MIB files from your equipment vendors on this page. When an appropriate MIB file is added, you will be able to see
meaningful names for values instead of OIDs when viewing the information in the SNMP tree section. TNI supports automatic downloading of
missing dependency MIBs from a couple of online MIB databases.
Resident agent
Configure the resident agent for deployment to remote Windows computers or export it for manual installation from this page.
More about the Resident agent here.