Sunteți pe pagina 1din 131

1. Total Network Inventory Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2
1.1 Techpaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Scanning Microsoft Windows assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.2 Scanning Unix-based assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.3 Scanning other network assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Collected information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.1 Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.2 OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.2.3 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2.4 FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2.5 ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.2.6 Generic devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.3 FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.4 Feedback and support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.5 Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.6 Trial version limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.7 Installation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.8 User manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.8.1 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.8.1.1 Data import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.8.2 Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.8.3 Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
1.8.3.1 Selecting a node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
1.8.3.2 Altering the Storage structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.8.3.3 Information display settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.8.3.4 Searching in the Network tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
1.8.3.5 Storage assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.8.3.5.1 Working with assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1.8.3.5.2 Description of assistants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
1.8.3.6 Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
1.8.3.7 Custom assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.8.3.8 Synchronization with Aсtive Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
1.8.4 Network scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.8.4.1 Adding scan tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
1.8.4.2 Managing added tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
1.8.4.3 Scan process and scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
1.8.4.4 Saving, importing and exporting tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
1.8.4.5 Scan scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.8.5 Scanning using agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.8.5.1 Manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
1.8.5.2 Logon script scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
1.8.5.3 Resident agent scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.8.6 Common reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
1.8.6.1 Building reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
1.8.6.2 Viewing information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
1.8.6.3 Printable reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
1.8.6.4 Additional features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
1.8.7 Table reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
1.8.7.1 Creating a template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
1.8.7.2 Template management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
1.8.8 Software asset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
1.8.8.1 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
1.8.8.2 Software management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
1.8.8.2.1 Browsing, searching and filtering software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
1.8.8.2.2 Inspecting a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
1.8.8.3 License management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
1.8.8.3.1 Creating a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
1.8.8.3.2 Sorting out auto-detected license keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
1.8.8.3.3 Licensing software installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
1.8.8.3.4 Editing a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
1.8.8.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
1.8.8.4.1 Report builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
1.8.9 Change log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
1.8.10 Storage properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
1.8.11 Network node properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
1.8.12 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
1.8.13 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
1.8.14 Custom fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
1.8.15 Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
1.8.16 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
1.8.17 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Total Network Inventory Documentation


Total Network Inventory Documentation
Search this documentation Popular topics

Getting started 6
Software
6
management
Printable reports 4
Alerts 4
Snapshots 4
License
4
management
Change log 4
Viewing information 3
Storage properties 3
Selecting a node 3
Techpaper
List of terms
Minimum system requirements for the admin unit
Database mechanism
Scan technology

List of terms
TNI 3: stands for Total Network Inventory 3 and represents its name and trademark.

Admin unit (main unit): a GUI application operated by the user. It's installed on a workstation or a server computer and is used for gathering
inventory information, viewing it and including into reports.

Scanning: a process of obtaining information on hardware and software from computers and other devices.

Storage: application's database.

Minimum system requirements for the admin unit

CPU 1000 MHz

RAM 512 MB

HDD space 30 MB + 0,35 MB per stored asset

Network TCP/IP

OS Windows XP Professional SP3 / Windows Server 2003 SP2

Screen 1280x1024

Database mechanism
The TNI 3 database (a.k.a the Storage) is a folder created by the user on a hard drive. Each inventoried asset is represented in it as a
separate file of specific format. Auxiliary data is stored separately from the asset files and includes user information, logins and passwords for
remote access, etc. All data is compressed and encrypted.

It's possible to create several separate storages and switch between them at any time. Asset-related data can be copied to another storage
by copying the corresponding file.

Scan technology
Scanning Microsoft Windows assets
Scanning Unix-based assets
Scanning other network assets
Scanning Microsoft Windows assets
Technology
Remote scanning via the SMB protocol
How it works
Requirements for the target machine
Remote scanning via the RPC protocol
How it works
Disadvantages
Requirements for the target machine
Manual scanning
How it works
Additionally
Requirements for the target machine
Scanning overhead
Low-level hardware scan

Technology
Windows Management Instrumentation (WMI) is Microsoft's implementation of Web-Based Enterprise Management (WBEM) standard for
Windows operating systems.

Using WMI technology, TNI 3 obtains software and hardware information, as well as computer registry data.

WMI service is pre-installed on Windows 2000 and higher. For Windows NT, Windows 95 and Windows 98 it is available for
download from the Microsoft website.

There are three methods for scanning Windows-based computers.

Manual scanning is the only way to collect information from computers running Windows XP Home Edition. This OS cannot be
accessed remotely due to its limitations. Any connection attempt will result in the Access denied error.

Remote scanning via the SMB protocol

How it works
1. Executable tniwinagent.exe (an agent) is uploaded to the administrator's shared folder admin$ on a remote computer.
2. TNI's main unit connects to the Service manager on the target PC, installs the agent as a service and starts it.
3. The agent collects information and saves it into a compressed file. Then it stops.
4. The main unit imports the resulting file into the storage.
5. The agent service is uninstalled, and the executable is deleted.

No traces of scanning will remain on the target PC after the scan is complete.

Requirements for the target machine

CPU 500 MHz

RAM 64 MB

HDD space 10 MB

TCP ports 445, 139

Services Server
Windows Management Instrumentation (WMI)
Remote Procedure Call (RPC)
Remote Registry
Resources ipc$
admin$

Protocols SMB
NetBIOS (for Windows NT4)
TCP/IP

Windows versions XP Pro, Vista, 7, 8, 8.1, 10, Server 2003/2008/2012(incl R2)/2016

Remote scanning via the RPC protocol

How it works

TNI's main unit connects directly to the WMI service on the target PC via the RPC protocol and collects information remotely.

Disadvantages

1. Significant traffic is generated.


2. The scanning speed depends on the connection quality.
3. All data processing is performed by the main unit. This considerably increases the consumption of system resources when scanning
large networks.

This method has no advantage over the scanning via SMB. It is recommended for use only when, for whatever reason, the SMB
protocol can't be used.

Requirements for the target machine

CPU 500 MHz

RAM 64 MB

HDD space 10 MB

TCP ports 135 and random ports above 1024

Services Windows Management Instrumentation (WMI)


Remote procedure call (RPC)

Protocols RPC
TCP/IP

Windows version 2000, XP Pro, Vista, 7, 8, 8.1, 10, Server 2000/2003/2008/2012(incl R2)/2016

Manual scanning

How it works

1. Executable tniwinagent.exe (an agent) is manually copied to the target computer and launched. When the scanning is complete, the
agent creates a file containing the collected information.
2. The resulting file must be moved to the TNI 3 storage.

Additionally

The agent can be run by a domain logon script, by the task scheduler or on Windows startup.

Command line parameters of the agent tniwinagent.exe:

/path:"\\server\share" allows to set a path to a folder where the data file will be placed;
/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;
/delay:XX specifies the gap in seconds between the agent's launch time and the start of a scan;
/overwrite overwrites the data file in case the target folder already contains its older version.

See the Manual scan section for details.

Requirements for the target machine

CPU 500 MHz

RAM 64 MB

HDD space 10 MB

Services Windows Management Instrumentation (WMI)

Windows version XP Home/Pro, Vista, 7, 8, 8.1, 10, Server 2003/2008/2012(incl R2)/2016

Scanning overhead
All scanning methods require CPU time and execution of a variety of disk operations, which is why an insignificant loss of efficiency may occur
while scanning a computer. Scanning usually takes 1-2 minutes.

Online scanning methods (on demand) generate network traffic:

Method To remote computer From remote computer


(upload) (download)

SMB 1.8 MB 0.05-0.1 MB

RPC 10 MB 18 MB

Numbers in the table represent average values including service data size (i.e. packet headers, etc.).

High traffic during RPC scanning is a result of WMI's collection of data from the registry, and it depends on the number of applications and
services installed on the remote computer.

Low-level hardware scan


In the manual scan mode, as well as during remote scanning via the SMB protocol, TNI installs a third-party driver to collect low level hardwa
re details, such as memory SPD data, HDD S.M.A.R.T. data, etc. In the normal mode, the driver is installed and uninstalled each time the
scan is run, which only takes a fraction of a second.

There's a known issue with the Intel storage driver (iastor.sys). A bug in this driver causes a BSOD during low-level disk subsystem scanning.
A workaround has been implemented for this: TNI skips low-level disk scanning when the driver is detected. This behaviour can be changed
in the program settings or using command-line switches in the standalone agent.
Scanning Unix-based assets
Technology
Remote scanning via the SSH protocol
Manual scanning

Technology

Computers based on OS X, Linux, FreeBSD, and ESX/ESXi operating systems are scanned by agents. An agent is an executable uploaded via
the SSH and SCP/SFTP protocols to a remote computer and gathers information about its hardware and software using the operating system
utilities.

The SSH protocol enables exchanging data between two hosts using a secure channel. Currently, there are 2 versions of this protocol: SSH-1
and SSH-2. TNI 3 uses SSH-2 for scanning. Most modern UNIX systems allow use of this protocol.

The SCP and SFTP protocols are used for file transfers through a secure channel between two hosts. They are components of most modern
SSH servers. TNI 3 supports both of these protocols.

Remote scanning via the SSH protocol

How it works:

1. TNI 3 connects to the remote computer via the SSH protocol.


2. A temporary folder is created in the remote user's home folder. The agent is then uploaded there using either the SFTP or the SCP
protocol.
3. The scanning agent is run and creates a file with gathered information upon completion of its work.
4. A file containing computer information is then transferred via the SFTP or SCP protocol back to TNI 3 and added to the opened
storage.
5. The temporary folder containing the agent and the created file is deleted.

Before starting a scan one should make sure that:

the remote computer runs an SSH-2 server (on TCP port 22) that supports SFTP or SCP, and firewall allows access to it;
the remote user is allowed to access the SSH-server (the AllowUsers option). If scanning is done under the root user, the PermitRoot
Login option should be set to yes;
the remote user must have administrative privileges (for Linux: be in the sudoers list if the user is other than root).

The operating system should provide the agent with a number of utilities so it can collect all needed data from the computer. The list of
utilities depends on the operating system configuration. If one of the utilities is not installed on the scanned computer, a message will be
displayed in the appropriate category of the Common reports view.

Furthermore, the operating system should be able to provide standard C++ library libstdc++.so.6.

An approximate list of utilities needed to collect the data on a Linux-based computer: arch, cd-info, df, dmidecode, dpkg-query /
emerge / pacman / pkgtool / rpm, get-edid, hdparm, head, ifconfig, iptables, iptables-save, ls, lspci (pciconf for FreeBSD), lsusb,
ps, pvdisplay, pvscan, route, rpm, swapon, uname.

Manual scanning

How it works:

1. Executable tniwinagent.exe (an agent) is manually copied to the target computer and launched. When the scanning is complete, the
agent creates a file containing the collected information.
2. The resulting file must be moved to the TNI 3 storage.

See the Manual scan section for details.


Scanning other network assets
Technology
Scanning SNMP devices
Scanning Telnet devices

Technology

Many network assets are not covered by the SMB/RPC/SSH protocols. These are the assets that either don't run Windows or Unix-based
operating systems, or run unsupported systems, or run simple Unix-based systems without the SSH interface. These could include network
printers, managed switches, routers, xDSL modems, IP phones, wireless access points, etc. Most often these devices support either SNMP or
Telnet or sometimes both, and in such cases they can be scanned by TNI using these protocols.

Scanning SNMP devices

TNI considers any devices that could not been scanned via other protocols as potentially SNMP-compatible, therefore, it tries to scan them
using SNMP, if it's allowed by the scanner settings. By default, when the public community is specified, it tries several well-known
communities until it succeeds:

admin
cisco
mngt
private
public
snmpd

Scanning Telnet devices

If a Telnet login is specified, TNI checks if TCP port 23 is open. If positive, TNI will try to scan the device using the Telnet protocol.

Currently TNI supports Telnet scanning for the following systems: BusyBox.
Collected information
This section contains an overview of information collected by TNI 3 from various types of assets:

Windows
OS X
Linux
FreeBSD
ESXi
Generic devices
Windows
Hardware
Software
Other

Here you can see an overview of data collected from Windows OS assets.

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Hardware

System
Computer parameters, chassis, motherboard (including chipset), BIOS.
System slots, memory slots, ports.
CPU
Name and manufacturer, clock speed, socket designation, code name, TDP, number of cores, cache memory, etc.
System memory
General information on physical memory, virtual memory and paging files. Number and availability of memory slots.
Memody modules: capacity, manufacturer, type, speed, form-factor, serial number, manufacture date, etc.
Video system
Video adapters: name and manufacturer, chipset, video memory, current video mode, drivers.
Monitors: name/model, manufacturer, manufacture date, serial number, image size and diagonal, picture aspect ratio,
video input, etc.
Audio system
Name and manufacturer of the sound device, driver version and date.
Storage details
Hard disk drives and removable media: model and manufacturer, interface, media type (HDD/SSD/removable), size,
serial number, S.M.A.R.T. data (where available).
CD drives: model and manufacturer, device type, read/write support.
Floppy-disk drives
Logical partitions: disk letter, drive and media type, file system, size, free/used, serial number, etc.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, type, connection status, DHCP,
host name, etc.
Modem: name, provider, port, type, etc..
Peripheral devices
Printers (including virtual printers): name and manufacturer, paper size, driver, status, resolution, port, attributes, etc.
Network printers: source name, server, user account.
Keyboards: manufacturer, layout, number of keys.
Mice and other pointing devices: manufacturer, interface, number of buttons.
USB devices: all USB devices with USB version, driver manufacturer and version, serial number (where available).
Devices
The full list of devices divided into classes. It duplicates the data structure of Windows device manager.

Software

Operating system
Name, version, architecture, registered user, install date, country code, locale.
OS type, product key, suite, SKU, supply channel.
Internet Explorer version, DirectX version, etc.
Installed software
Name, publisher, version, install date and source, uninstall string.
For Microsoft Office products (including Project and Visio): service pack, product ID, product key, supply channel.
System updates
ID, description, comments, Service pack version, install date and user name.
Security
Antivirus, firewall, antispyware status.
Auto-updates status.
Antivirus, firewall, antispyware: name, publisher, version, status.
Directory list in the Program files folder
Databases
Detected database servers (if any): MS SQL Server (including edition), MySQL, PostgreSQL, Oracle Database, Firebird.
Audio and video codecs
Name, manufacturer, version, description.
Virtual machines
For discovered VMware Workstation virtual machines: ID, guest OS type, total size, storage size, state, config file,
hardware compatibility, memory, processors, HDD details, CD/DVD details, network adapter details.

Other
System and user environment variables
Shared resources: disk drives, print queue, IPC admin, etc.
Name, type, path, comments.
Autorun applications
Application name, startup string, user account, location.
Services: file system drivers, kernel drivers, own and shared processes
Name, service name, executable, startup type, status, logon as...
Processes
Name, command line, executable path, started on, threads number.
User accounts
Name, full name, domain, description, activity, attributes.
OS X
Hardware
Software
Other

Here you can see an overview of data collected from OS X assets.

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Hardware

System
Computer parameters and chassis, memory slots.
Power supply settings.
CPU
Name, clock speed, number of cores, cache memory, etc.
System memory
Physical memory size.
RAM units: capacity, manufacturer, type, speed, etc.
Video system
Video adapters: name, video memory.
Monitors: name and manufacturer, size and image size, picture aspect ratio, video input, etc.
Storage details
Hard disk drives and removable media: model and manufacturer, interface, size, number of partitions, serial number.
CD drives: model.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
Peripheral devices
Printers: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.
USB devices: name and manufacturer, version, speed.

Software

Operating system
Version, architecture, update, kernel, run time.
Software
Version, install date, location, execution environment, properties.
Security
Firewall status.

Other

Environment variables
Processes
Name, command line, process and parent process ID, user account.
User accounts
Name, full name, ID, home directory, shell.
Linux
Hardware
Software
Other

Here you can see an overview of data collected from Linux OS assets.

This list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describing
which data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.

Hardware

System
Computer parameters, motherboard and BIOS, memory slots, ports.
CPU
Name and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memory
Physical memory size and swap partition.
RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.
Video system
Video adapters: name and manufacturer, video memory.
Monitors: name and manufacturer, image size and diagonal, picture aspect ratio, video input, etc.
Storage details
Hard disk drives and removable media: model, interface, number of partitions, size, serial number.
CD drives: model and manufacturer, location, availability, media support, features.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
List of DNS-servers.
Peripheral devices
Printers: name and manufacturer, driver, status, fax, URI, print-server, PostScript parameters, etc.
USB devices: name and manufacturer, speed.
Devices
Devices divided into types; their names and flags.

Software

Operating system
Name, architecture, code name, description, kernel, run time.
Software
Software divided into groups.
Name, package name, version, source, URL.
Security
Firewall rules presented as a hierarchy.
Virtual machines
For discovered VMware Workstations for Linux, VMware ESX, and KVM (only partial KVM information is collected): ID,
guest OS type, total size, storage size, state, config file, hardware compatibility, memory, processors, HDD details,
CD/DVD details, network adapter details.

Other

Environment variables
Processes
Name, command line, process ID and parent process ID, user account.
User accounts
Name, full name, ID, group, home directory, shell.
FreeBSD
Hardware
Software
Other

Here you can see an overview of data collected from FreeBSD OS assets.

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describing
which data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.

Hardware

System
Computer parameters, motherboard and BIOS, memory slots, ports.
CPU
Name and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memory
Physical memory size and swap partition.
RAM units: capacity, manufacturer, type, form-factor, speed, bank label, locator, etc.
Storage details
Hard disk drives and removable media: model, interface, number of partitions, size, serial number.
CD drives: model and manufacturer, location, availability, media support, features.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
List of DNS-servers.
Devices
Devices divided into types; their names, vendors and classes.

Software

Operating system
Name, architecture, kernel, uptime.
Software
Software divided into groups.
Name, version, description (properties).

Other

Environment variables
Processes
Name, command line, process ID and parent process ID, user account.
User accounts
Name, full name, ID, group, home directory, shell.
ESXi
Hardware
Software
Other

Here you can see an overview of data collected from VMware ESXi assets.

ESX is a far more generic Linux system compared to ESXi, and it's scanned by the same Linux agent as other Linux systems. That's
why you can find the list of data collected from ESX systems in the Linux section.

The list is far from complete. If you are looking for particular information that you can't find here, please contact our tech support.

Some data can only be collected when certain utilities are installed on the target system. If these utilities are not found, an entry describing
which data could not be collected and ways to fix the problem will be included into the report in the Common reports mode.

Hardware

System
Computer parameters, motherboard and BIOS, memory slots.
CPU
Name and manufacturer, clock speed, number of cores, socket designation, cache memory, etc.
System memory
Physical memory size.
RAM units: capacity, type, form-factor, bank label, locator.
Storage details
Hard disk drives: model, interface, number of partitions, size, firmware revision.
Logical partitions: label, file system, size, free/used, mount point.
Network
Network adapters: name and manufacturer, MAC address, IP address/subnet/gateway, BSD device name, type.
Peripheral devices
USB devices: name and manufacturer, speed.
Devices
Devices divided into types; their names and flags.

Software

Operating system
Name, architecture, description, uptime.
Software
Name, publisher, version, install date.
Security
Firewall rules.
Virtual machines
ID, guest OS type, total size, storage size, state, config file, hardware compatibility, description, memory, processors,
HDD details, CD/DVD details, network adapter details.

Other

Environment variables
Processes
Name, command line, process ID.
User accounts
Name, full name, ID, group, home directory, shell.
Generic devices
SNMP
Telnet

Here you can see an overview of data collected from generic assets via the SNMP and Telnet protocols.

SNMP

General information
IP address, MAC address, network name.
System
Asset name, description, object ID, uptime, contact, location, service list.
Network interfaces
Name, manufacturer, MAC address, interface type, speed, MTU, administrative state, operational state.

Telnet

General information
IP address, MAC address, network name.
System
Uptime.
Processor
Name, system type.
System memory
Total/free memory, swap partition size.
Network
Network interfaces: name, manufacturer, MAC address, IP address, IP subnet, BSD device name, type.
List of DNS servers.
ARP table.
Security
Firewall rules presented as a hierarchy.
FAQ
General questions
Installation
Backup and restore
Scan questions
Access is denied
RPC server is unavailable
Port numbers
TCP/IP security limit
No network provider accepted the given network path
Call was canceled by the message filter
Domain logon scan
Windows 95/98/NT scan
Program usage questions
Network tree selection
List of computers with particular software
No antivirus installed

General questions

Installation
Q: Should I install the program on a server or on a workstation?

A: Both a server and a workstation can run Total Network Inventory 3. It’s just a matter of usage convenience, because it's not a
client-server application, and you need to have access to the graphical console of the computer it's installed on, either directly or by using a
remote desktop utility. However, if you run it under the domain admin account, you’ll be able to scan all computers as "current user" –
otherwise you’d need to specify domain admin credentials explicitly.

However, take note that if you install the program on Windows XP SP2/SP3 or Vista SP0/SP1 and there are a lot of scan threads launching
simultaneously, there may be issues with connections to remote computers. This is caused by a restriction on the maximum number of TCP
half-open connections (connection attempts, SYN_SENT socket state) existing in the aforementioned Windows versions, which doesn't allow
for more than 10 outbound connections to be in this state at a time. After reaching this limit, all other connections in the system (including
those executed by this program) are queued and may reach their timeout, thus producing inconsistent results. This issue is also known as the
Event 4226 issue, because reaching the limitation produces a record in the System Event Log with EventID 4226. Windows Vista SP2,
Windows 7 and newer, and all Windows Server systems don't have this limitation. Thus, in the general case, we recommend to install the
program on server systems or modern desktops.

Backup and restore


Q: How to backup/restore the Storage or move the program to another computer?

A: The Storage is located in a separate folder (file system directory). It can be located by right-clicking the storage root group and selecting S
how in Explorer. Then go up one level and copy/archive the whole storage folder.

Program settings can be backed up by copying/archiving a folder entitled Total Network Inventory 3 in your account's Application Data folder
(referred to by %APPDATA% environment variable), if you chose Install for me during the program installation. If you chose Install for all,
the settings are stored in "С:\Documents and Settings\All Users\Application Data\Total Network Inventory 3" (Windows 2000/XP/2003) or "C:
\ProgramData\Total Network Inventory 3" (Windows Vista/7/8/10/2008/2012). You can also find this folder by clicking Open tasks folder in
the Scanner tab or Open templates folder in the Table reports tab and then going up one level.

To restore the program, install it on another computer (but don't run it) and extract your backed-up settings to the Total Network Inventory 3
folder in the Application Data folder for your profile or all users, depending on your choice during the installation (after the installation, this
folder is automatically created and contains one file: config.ini). Also, extract the storage folder locally: for instance, to My Documents. Then
run the program and browse to the storage folder when prompted (if its location differs from the path stored in previous settings).

Scan questions

Access is denied
Q: How do I deal with the errors "Access is denied" or "Unknown user name or bad password"?

A: These errors can occur for several reasons:

Username or password are specified incorrectly.

Check your username and password.

The specified user account does not have administrator rights on the remote machine.
You need to have administrator access to remote computers to be able to scan them (local administrator or domain administrator
rights). If you have logged on as domain administrator or remote computers have the same name and password for the local
administrator account as your account, you can use the Current user scan option. Otherwise specify the user name in full format: DO
MAIN\Administrator.

Blank password.

Remote administrator access with blank password is not allowed starting with Windows XP.

The scanned computer has Windows XP Home Edition installed.

This version of Windows cannot be scanned remotely. It’s an OS limitation, and the Access denied error will be displayed at all times.
However, it’s possible to scan XP Home locally by running the standalone audit tool tniwinagent.exe (located in the program's
installation folder) on that machine. It’ll generate an .inv file with scan results, which should be copied to the program's storage (it
will be imported upon TNI’s next launch or immediately, if TNI is running) or imported by using the Storage main menu or any
group's context menu.

Computers are not in domain and have default settings.

Workstations running Windows XP, Vista or later client versions and not connected to a domain don't allow the local administrator to
authenticate as himself by default. Instead, the ForceGuest policy is used, which means that all remote connections are mapped to
the Guest account. But again, the administrator rights are required for running the scan. Thus, you need to update the security
policy on each computer using one of the following ways:

Run secpol.msc, expand Local policies / Security options, locate the Network access: Sharing and security model for local
accounts policy and change its value from Guest to Classic.
Disable the Use simple file sharing option in File Explorer’s Folder Options.
Modify the registry: set the forceguest value, located in the "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
" key, to zero.

For Windows client versions starting with Vista, an additional step should be taken: it concerns the User Account Control (UAC). It
restricts administrator rights for remote logons in certain cases. You should either disable UAC or make changes to the registry:
create a DWORD parameter (name: LocalAccountTokenFilterPolicy; value: 1) in the "HKLM\SOFTWARE\Microsoft\Windows\CurrentV
ersion\Policies\system" key (source). A reboot may be required.

You can modify both settings easily by running a .reg file with the following contents on such computers (omit the last two lines for
Windows XP):

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"forceguest"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system]
"LocalAccountTokenFilterPolicy"=dword:00000001

RPC server is unavailable


Q: How do I deal with the error "RPC server is unavailable"?

A: This error may be caused by one of the following reasons:

The connection is blocked by a firewall (Windows Firewall or third party firewall).

Try temporarily disabling the firewall on the remote computer. If the target computer runs on Windows XP SP2/SP3, Vista or 7, see
the question regarding the Windows Firewall setup.

The target computer does not have the Windows Management Instrumentation service installed.

According to the Microsoft documentation:

"WMI is preinstalled in Windows 7, Windows Vista, Windows Server 2008, Windows Server 2003, Windows XP, Windows Me, and
Windows 2000.
Windows NT Workstation 4.0 SP4 and later: WMI is available through "Add/Remove Windows components" in Control Panel, as
WBEM option install. A later, more comprehensive, version is available as an Internet download from http://www.microsoft.com/dow
nloads. See "WMI CORE 1.5 (Windows 95/98/NT 4.0)".
Windows 98/95: WMI CORE 1.5 (Windows 95/98/NT 4.0) is available as an Internet download from http://www.microsoft.com/down
loads. This download requires Microsoft Internet Explorer version 5 or later."

Remote interrogation of Windows 98/95 computers is supported partially, because problems with DCOM authentication may occur.
The solution is to run a local scan (manual or autostart) with the help of the standalone audit tool ( tniwinagent.exe).

Additional information about scanning the Windows computers using WMI

The target computer is offline or the IP address may not be occupied at all (when scanning by IP's and if the ICMP ping option is

disabled).
disabled).

The Windows Browser service updates the computer list every 12 minutes, so a computer can go offline, but remain visible in My
Network Places. However, in this case you are more likely to get the Ping failed status. But if the ICMP protocol (ping, echo) is not
allowed in your network, you might want to disable pinging in Options – Scanner – Use ICMP ping. After this, you will be able to scan
online hosts which don't respond to pings, but all offline hosts (and also unoccupied IP addresses) will show the RPC error status,
and thus it will slow down the scanning of large IP groups or ranges.

Wrong DNS record.

If you scan the computer by name, it could be resolved to an invalid or not existing (unoccupied) IP address due to problems with
DNS or WINS. If you scan the computer by IP address, you are likely to receive Ping failed, but if pinging before scanning is
disabled, you will receive the RPC error when scanning an offline or unoccupied address (see the previous point). A TNI user has
encountered this problem and described it on our forum: http://www.softinventive.com/forum/index.php?showtopic=428

The target host is not a computer, or it runs an operating system other than Windows when scanning via the RPC protocol.

If the scanned name or IP address belongs to a network device which can be pinged, but is not a Windows computer (NIX-computer,
network printer, router, managed switch, type library, IP phone, firewall, thin client, etc.), it cannot be scanned via the RPC protocol
and shows this error. However, the program tries to scan this host via other protocols (SMB, SSH and SNMP), and the scan result
may vary depending on the settings for these protocols and the nature of the scanned network host.

Port numbers
Q: How can I find out which port numbers are used by TNI, so I can configure the firewall?

A: By default, TNI uses the SMB protocol to scan Windows computers. It can be allowed by enabling the File and Printer Sharing exception in
the Windows Firewall or TCP port 445 in other firewalls. You could also enable TCP port 139 (NetBIOS) for older systems.

Also, TNI uses the RPC protocol to scan Windows computers (direct WMI connection) if SMB fails. To allow remote RPC connections, you
should either disable Windows Firewall or set it up in the following way:

Use the following netsh firewall command in the command prompt: netsh firewall set service RemoteAdmin enable for Windows XP
or netsh advfirewall firewall set rule group="remote admin" new enable=Yes for Windows Vista/7 or newer;
Use the Group Policy editor: Group Policy editor (gpedit.msc) -> Local Computer Policy -> Computer Configuration -> Administrative
Templates -> Network -> Network Connections -> Windows Firewall -> Domain Profile or Standard Profile -> Windows Firewall:
Allow remote administration exception -> Action -> Properties -> Enable.

Windows Firewall in Vista, 7 or newer has a special exception entitled "Windows Management Instrumentation (WMI)", which can
be enabled and thus save you from the necessity of setting up the policies manually.

TCP/IP security limit


Q: How do I deal with the following warning "TCP/IP has reached the security limit imposed on the number of concurrent TCP connect
attempts"?

A: This warning may appear when you run the network scan under Windows XP SP2/SP3 or Windows Vista SP0/SP1 with port scan enabled.
In these operating systems a controversial limitation of not more than 10 concurrent TCP connect attempts ("half-open connections") has
been introduced by Microsoft to reduce the speed with which malicious software spreads over the networks. You can find more information in
this Microsoft article. When you see this message in the scanner log, it means that the program detects that some computers have no open
ports and there is an event with ID 4226 (source: Tcpip) in the system Event Log with the same message. As a consequence of reaching the
aforementioned limitation, the program cannot reliably detect whether ports on computers are open or not. That's why the program starts to
ignore the port scan results and connects to all computers using all selected protocols to provide successful scans. This policy remains active
during the current session, that is, until the next program restart. To avoid this warning you can do the following:

Disable the Scan ports option in the Scanner settings. Note that this will decrease the network scan performance;
Patch your system using the widely known patch by LvlLord or this patch (based on the former). However, note that this is illegal
according to the Windows EULA;
Run TNI on the system which is not affected by this limitation: Windows Server 2000/2003/2008, Windows 2000, Vista SP2 or
Windows 7.

No network provider accepted the given network path


Q: How to fix the error "No network provider accepted the given network path"?

A: Take the following steps:

1. Make sure that you can ping the remote computer by network name;
2. Make sure that the File and Printer Sharing exception is enabled in the Windows Firewall (or that NetBIOS is allowed in any other
firewall), or the firewall is disabled;
3. Make sure that both Client for Microsoft Networks and File and Printer Sharing For Microsoft Networks are enabled in the properties

of the network connection on the remote computer;


3.

of the network connection on the remote computer;


4. Make sure that the NetBIOS over TCP/IP setting in the properties of the network connection (Internet Protocol Version 4 – Properties
– Advanced – WINS) is set to Default or Enabled and that the TCP/IP NetBIOS Helper service is set to Automatic and started;
5. Make sure that the Network security: LAN Manager authentication level security policy (secpol.msc–Local Policies – Security Options)
is set to Send LM & NTLM responses (option #1) or Send LM & NTLM responses – use NTLMv2 session security if negotiated (option
#2);
6. Run sfc /scannow.

Call was canceled by the message filter


Q: How to fix the error "Call was canceled by the message filter"?

A: Take the following steps:

1. Run services.msc on the remote computer and make sure that the Windows Management Instrumentation service is set to Automatic
and started;
2. Make sure that DCOM is enabled: run dcomcnfg, select Component Services – Computers – My Computer, right-click, choose Properti
es, open the Default Properties tab and make sure that Enable Distributed COM on this computer is on;
3. Restart the remote computer;
4. Run WMI diagnosis utility from Microsoft;
5. Follow these tips to repair WMI on the remote computer.

Domain logon scan


Q: How do I set up the program to scan computers when users log on to a domain?

A: This is a shortened guide. The full version of this guide is available here.

1. Copy the standalone scan agent tniwinagent.exe located in the program’s installation directory to a shared folder on your file server
accessible to all users with read-only access. For this, open the Options window, then open the Logon script page, press the Export
standalone scanner button and specify the folder to export to. This action will also fill the Path to agent field. It should be a UNC
path (a network path starting with double backslash).
2. Create and share a folder with write access for all users on your file server. This will be the folder where the scan agent will save the
scan results. Note: instead of creating a separate folder (most secure), you can share an empty folder inside the TNI 3 storage
(secure) or the storage root folder (least secure) with write access for all users.
3. In Options – Logon script – Save path specify a path to the folder where the agent should save the files (the folder from step 2).
This should also be a UNC path. Specify other options if necessary (such as Delay before scan start and Overwrite existing files).
4. Copy the auto-generated command using the Copy the command button.
5. If you already have a logon script for your domain, a particular Organizational Unit or a single user, paste the command you’ve
copied earlier to this script and save it. Otherwise, refer to the full version of this guide.
6. In the main window of Total Network Inventory 3 press Options, open the Auto-import page and specify the path to the folder with
the inventory files in the Import data path field. You can import new data right now or set the settings to import on startup or set
the timer. Each time you want to update the information manually, open Options – Auto-import and click Import now. Also, you can
delete files after importing or import from subfolders (in case each OU has its own logon script which runs the scanner with different
parameters to save results in different folders). If you chose to share a folder in the storage or the whole storage folder, you don’t
need to set up Auto-import. The scan results will be automatically imported as you run the program and it opens the storage, or
immediately, if the program is already running.

Resources to read:
Logon script scan
Standalone agent's command-line parameters
Data import
Logon scripts FAQ
Creating logon scripts

Windows 95/98/NT scan


Q: Is it possible to scan Windows 95/98/NT machines?

A: It's possible, however these systems can only be scanned remotely (via the RPC protocol). First of all, you should install Microsoft WMI cor
e components for Windows 95/98/NT. WMI CORE 1.5 (Windows 95/98/NT 4.0) is available as an Internet download from http://www.micros
oft.com/downloads.

Then place a link to \WINDOWS\SYSTEM\WBEM\WinMgmt.exe into the startup folder and reboot, or run the file manually.

Additionaly, in order to perform the remote online scan, you need to run a registry file ( *.reg) with the following content on a Windows 95/98
machine:

REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\OLE]
"EnableDCOM"="Y"
"EnableRemoteConnect"="Y"
[HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM]
"SetupForDCOM"="1"
"AutostartWin9X"="2"
"EnableAnonConnections"="1"

Alternatively, you may change these values manually. Rebooting is advised. After this, you should be able to connect remotely using any
credentials or as current user.

Please note that support for Windows 95/98/NT is provided "AS IS", because Microsoft has officially stopped supporting these
operating systems.

Program usage questions

Network tree selection


Q: I have selected several assets in a network tree, but the report shows only one. Why?

A: In TNI 3 the Network tree has two node selection modes: single and multiple. To build a report for several nodes, either select a group
(the report will be built for all assets in this group and all subgroups) or enable multiple selection by ticking the Multiple selection checkbox ov
er the tree — checkboxes will appear in front of each node. Rectangular selection (as well as selection using Ctrl or Shift) is not used for
building reports and is used for working with the nodes in the tree (drag'n'drop moving, deleting, etc). For more details, see Selecting a node
.

List of computers with particular software


Q: How to get a list of computers which have particular software installed?

A: Go to the Software accounting tab, use the Search bar and filters to find the necessary software and select it to display a list of computers
it's installed on (in the details area on the Installations page). You can select the items in the list and copy or export them, or click the Install
ations summary link to get a printable report.

No antivirus installed
Q: Why does the program show that no antivirus (or firewall, or antispyware) is installed?

A: TNI 3 can recognize all antiviruses and firewalls (in Windows XP SP2/SP3, Windows Vista, 7, and 8) and antispyware (only in Windows
Vista, 7, and 8) that support Windows Action Center (previously known as Windows Security Center), that is, if they are displayed by the
Action Center. The vendors of antivirus (firewall and antispyware) software should provide this support from their side, because they have to
publish the product information and status to the system in a special way. Otherwise neither our product, nor Windows itself can recognize
such software (in this case Windows Action Center should usually generate a message from time to time that the computer is not protected
by antivirus/firewall/antispyware).
Unfortunately, even with the support from the side of the security products, this does not work on Windows 2000 and earlier and also on all
Windows Server systems, because they don't have Action Center, that is they don't provide an interface for these products to publish their
status to the system and thus to other applications.
We are going to add support for direct detection of the most popular products without dependency on the Action Center interface in the
future versions of our program.
Feedback and support
Sending feedback from the software
Support page on the Softinventive Lab website
E-mail support
Online support
Social networks

Please contact us if:

You've found a bug in our program — we'll fix it!


You'd like to see new functions added — describe the situations they can help you in.
You dislike something about our program — tell us how to improve it.
You like something about our program — it's important for us to know, what exactly!
You have any technical or financial questions — our answer will be fast, polite and clear.

Your feedback is very important to us, your comments define the ways we improve our software. We'd be grateful for any message!

Sending feedback from the software


The Feedback button in the top right corner of TNI's window opens the quick feedback form.

Don’t forget to include your name and email address — otherwise we won’t be able to reply to you.

Support page on the Softinventive Lab website


Welcome: www.softinventive.com/support/

E-mail support
Technical support: support@softinventive.com
General questions: info@softinventive.com
Financial questions: sales@softinventive.com

Online support
You can rely on our assistance whenever you need it. Our technicians can be contacted via instant messengers.

softinventive

Social networks
Follow us online!

softinventive.lab

@Softinventive
Updates
TNI 3 updates regularly. To make sure that you have the latest version, use the Help / Check for updates option from the main menu.
Furthermore, the program automatically checks for updates on launch, but no more than once a day.

If an update is found, you'll see a list of changes in the new version. Click Start download, and Install update after the download is complete. The
program will be closed and restarted after the update has been applied.
Trial version limitations
Total Network Inventory is distributed as shareware.

The evaluation version of Total Network Inventory has 3 limitations:

1. The program only works for 60 days after its first launch on a computer.
2. The maximum number of computers (network nodes) allowed to scan and manage is limited by 50 nodes.
3. Reports created by the program can be exported and printed, but certain fields are randomly substituted with the phrase TRIAL VERSION
.
Installation instructions
Run the Total Network Inventory installer

After clicking the download link, save the tni-setup.exe file and run it.

In Google Chrome

Once the download is finished, click the file at the bottom of the browser.

In Mozilla Firefox

In MS Internet Explorer

Install the software

Tell Windows it's OK to run the file:


And once again:

Then follow the instructions as the installer guides you through the process:
Begin working with Total Network Inventory

To get familiar with the software, see our documentation.

Uninstallation instructions
Total Network Inventory can be uninstalled using standard Windows tools.

For example, from its start menu group:


User manual

Storage
Data import

Workspace

Network tree
Selecting a node
Altering the Storage structure
Information display settings
Searching in the Network tree
Storage assistants
Working with assistants
Description of assistants
Actions
Custom assets
Synchronization with Aсtive Directory

Network scanning
Adding scan tasks
Managing added tasks
Scan process and scan results
Saving, importing and exporting tasks
Scan scheduler

Scanning using agents


Manual scan
Logon script scan
Resident agent scan

Common reports
Building reports
Viewing information
Printable reports
Additional features

Table reports
Creating a template
Template management

Software asset management


Getting started
Software management
Browsing, searching and filtering software
Inspecting a software item
Tracking software installations
Merging software items
License management
Creating a license
Sorting out auto-detected license keys
Licensing software installations
Editing a license
Reports
Report builder
Change log

Storage properties

Network node properties

Alerts

Snapshots

Custom fields

Logins

Users

Options
Storage
Storage concept
Storage contents
Contents of auxiliary files
Contents of an asset file (*.inv)
Storage management
Data import

Storage concept
TNI 3 Storage is a folder on a hard drive selected by user.

Each asset is represented by an .inv file.

The folder structure inside the Storage replicates the structure of the groups created by user in the Network tree. Any direct changes to the
Storage contents shall be registered by the program.

It means that you can create, delete and rename groups, move and delete asset files either using TNI's tools or via any file manager.
Furthermore, its design makes it possible to back-up and share data with other TNI 3 users, etc.

For the program to function correctly, do not delete, move or rename auxiliary hidden files in the Storage root folder. This may
lead to data loss or corruption.

Do not rename asset files (*.inv). See here to learn how to change displayed names.

Storage contents
Contents of auxiliary files

1. Logins to access the assets (encrypted);


2. User information (manually created and domain users);
3. Software accounting data;
4. Storage properties (storage name, company name and logo, inventory numbers template).

Contents of an asset file (*.inv)

1. Asset network identifiers (network name, IP address, MAC address);


2. Properties (alias, type, description, inventory number, etc.)
3. Asset configuration snapshots, collected as a result of scanning (see Collected information);
4. An alias of the login assigned to the asset;
5. ID of user assigned to the asset;
6. The asset's local user information;
7. Special field values.

Asset files can be moved between storages. However, various storage data will not be moved. For instance, the remote access
login will be lost, but it could be restored manually.

Storage management
A copy of TNI 3 is not linked to any particular storage. This means that you can switch between storages when the program is running.

Storage management is carried out from the Storage menu:

Create: select an empty folder on a computer and create an empty Storage there;
Open: select a folder containing a previously created Storage to work with;
Recent: contains a list of recently opened Storages that allows to quickly switch between them;
Reload: reads the data from the computer again, if the changes made to the currently opened Storage have not been automatically
registered by TNI 3;
Close: closes the Storage.

To quickly locate the folder containing the current storage or a file representing one of the devices, you can use the Show in
Explorer option in the context menu of the Network tree.
It's possible to create a Storage in a shared folder and have several copies of TNI connected to it from different computers. Keep in
mind that simultaneous access of the same Storage by different copies of TNI is not supported and could lead to irrelevant
information being displayed. This happens when changes made by one user are not yet reflected in the program of another.

Data import
Learn about importing possibilities in the Data import section.
Data import
Importing by moving or copying data files
Importing files and folders
Automatic import
Converting the Storage from TNI 1.x

Importing by moving or copying data files

To import assets that were scanned by any version of TNI, simply copy the .inv files of these assets into the storage folder. If TNI 3 is
running and connected to that storage at the moment, the new files will be converted to the new format if necessary and imported
immediately. Otherwise, the files will be imported next time TNI 3 is started and the Storage opened.

To locate the storage folder, right-click the Storage root group in the Network tree and select Show in Explorer.

Importing files and folders

To import one or several assets, right-click a group or the root node of the Network tree and click Import / Import files..., then select the
data files for import. This will place the specified assets into the group that you initially right-clicked.

To import the contents of a folder including subfolders, do the same, but click Import / Import folder... instead. After you specify the source
folder, you'll be prompted to choose whether to import the folder structure. If you choose to do so, groups will be created in your storage to
match the contents of the source folder. Otherwise, all the assets found in the source folder and its subfolders will be placed in the group you
initially right-clicked.

These commands are also available from the main menu Storage / Import when the Storage is opened.

Automatic import

You can set up TNI to automatically refresh asset files from a certain folder on program launch or at regular intervals. This is done from the A
uto-import section of the Options window. Additional options are:

Press the Import now button to perform the importing without having to restart TNI or waiting for the timer;
Import from subfolders is optional;
Import folder structure: if enabled, TNI creates groups in your Storage root to match the folders found inside the source folder when
the importing is being performed. Groups are only created for the folders that contain asset files. If disabled, all the discovered
assets will be placed into the root group of your storage;
It is possible to Delete files after import;
You can enable or disable Import at startup and Import on timer and specify a custom Import period.

When importing an asset that is already present in the Storage, configuration snapshots from the new file will be moved to the
existing one. If the new file was placed into the Storage manually, it will be deleted. This ensures that a single asset in TNI 3
always has one file corresponding to it. This is true for import of any kind.

Converting the Storage from TNI 1.x

To convert the whole Storage from the old format, use the Storage / Open option from the main menu and select the root folder of the target
Storage. The Storage contents will be wrapped into a ZIP archive first, and then converted to the new format. This process also preserves
your group structure.

Converting an asset file from the TNI 1.x format to that of TNI 3.0 reduces its size from ~1,5 MB to ~35 KB. Thus, complete
conversion of the old Storage shrinks it about 40 times without losing any useful data.
Workspace
Introducing the main window
Basic operations with the Network tree
TNI 3 view modes

Introducing the main window

1. The Network tree


2. The Main area
3. The Sidebar

The right side of the Main menu contains:

The Feedback menu;


The Options button;
The language switcher;
The Help menu, which contains tools that allow to check for updates, register your copy of TNI 3 and upgrade your license.

The Network tree and the Sidebar can be temporarily hidden in order to increase the main area. This can be done by clicking the small Hide/
Show network tree and Hide/Show sidebar buttons located on both sides of the tab bar.

You can alter the widths of the Network tree and the Sidebar by dragging their edges.

Basic operations with the Network tree


The Network tree displays the contents of the currently opened Storage.

To select an asset to display in the main area, left-click its node.

In order to choose several assets at once, tick the Multiple selection checkbox on the toolbar above the Network tree. A checkbox will be
displayed next to every node for you to select the necessary assets. To return to the normal selection mode, untick Multiple selection.

To create a new group, right-click the parent group or Storage root and select Create group. To move some assets into a new group, first
select them using your mouse's Rectangle selection or keyboard keys Shift and Ctrl and then drag them onto the group node. Alternatively,
you can use the Move to group option from the context menu of a node.

Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. The
Selecting nodes using the Rectangle selection, Shift and Ctrl is not the same as ticking nodes in the Multiple selection mode. The
former is only used for operations with several nodes (e.g. moving and deleting) and does not influence the contents of the main
area.

There's a way to start working with normally selected assets in the main area. To do that, use the Choose option after right-clicking
one of the selected assets. The assets will become selected with Multiple selection.

Groups in the Network tree replicate the structure of directories on the hard drive as described in the Storage section. Thus,
operations such as creating, deleting or renaming groups and moving assets between them can be performed in any file manager.

See the Network tree section for information on searching the Network tree, displaying additional text and graphic information in it and
filtering assets according to various criteria.

TNI 3 view modes


There's a separate view mode in TNI 3 for each specific task. View modes can be switched by clicking on tabs above the main area. The Side
bar is automatically adjusted to always display an appropriate set of controls.

Pressing Ctrl + <tab number> provides quick access to the desired view.

Scanner Before any of the information on remote assets becomes available for viewing and building reports, these assets have to be
Ctrl + 1 scanned. The Scanner view makes collecting asset information a breeze.

TNI 3 can collect information from Windows, Mac OS X and Linux computers or scan any other devices via the SNMP protocol.
See the Whitepaper section on how to ensure that all the conditions for successful scanning are met.

Read more: Network scanning.

Viewer & This mode displays the first thing you'll want to see after you've scanned your network: common reports. These reports
reports contain detailed information on hardware and software of each scanned asset sorted into convenient categories and available
Ctrl + 2 for instant search. It's possible to build descriptive and accurate reports, print them or export them to PDF, RTF, HTML, etc.

Read more: Common reports.

Table Here it's possible to create a table that contains only the necessary information. Rows can represent individual devices or any
reports device components such as HDDs, monitors, RAM units, software items, etc. Columns represent properties of the selected
Ctrl + 3 object. When the table has been built, it can be sorted, filtered, printed or exported for further analysis.

Read more: Table reports.

Software Here you're able to see the list of software found on Windows and Mac assets in the Storage. For each software item you can
accounting display the full list of computers that it's installed on. Software can be organized, searched and filtered in a multitude of ways.
Ctrl + 4
If you have the TNI 3 Professional license, you'll find at your disposal a variety of tools that will help with keeping track of
your software licenses, individual licensed installations, license keys, compliance problems, etc.

Read more: Software asset management.

Change After scanning an asset several times over a period of time, you may want to know what has changed in terms of hardware
log or software installed on the asset, system parameters, disk space usage, connected peripherals, etc. In this mode, you'll find
Ctrl + 5 a precise list of all changes. Also at your disposal are: advanced search, filtering and reporting tools.

Read more: Change log.

Edit This view mode allows to change properties of individual assets or the Storage itself, manage user records, custom fields,
Ctrl + 6 snapshots and logins.

Read more:

Storage properties: storage name, company name and logo, inventory number generator;
Network node properties: network identifiers, alias, description, etc;
Snapshots: viewing and deleting configuration snapshots;
Custom fields: adding or changing user information;
Logins: managing logins and linking them to assets;
Users: viewing and editing information on network asset users.
Network tree
The Network tree reflects the contents of the opened Storage.

Main elements:

1. The Network tree toolbar;


2. The list of added assistants;
3. The main area;
4. The icon marking the computer TNI 3 is currently running on;
5. Additional text output;
6. Assistants' indicator icons.

Below the tree is the status bar where several indicators can be found:

The first of them shows the license usage. It displays how many licensed spots are occupied by scanned assets, the total number of nodes
that your license allows, and the usage percentage.
The second indicator shows the number of unscanned assets, and the third one shows the number of custom assets. These types of assets
don't occupy license spots, so they are displayed separately. These indicators may be missing if there are no assets of the corresponding type
in your Storage.
Related topics:

Selecting a node
Altering the Storage structure
Information display settings
Searching in the Network tree
Storage assistants
Actions
Custom assets
Synchronization with Aсtive Directory
Selecting a node
Simple selection
Selection for processing
Single selection
Multiple selection

There are two ways of selecting nodes in the Network tree.

Simple selection

It's used for performing such operations as deletion and moving between groups containing one or multiple nodes.

It's done in the same manner as in Windows Explorer: using your mouse's Rectangle selection or keyboard keys Shift and Ctrl and arrow keys
.

The selected nodes are highlighted with the blue background:

This type of selection doesn't affect other workspace areas in any way.

Selection for processing

This selection type is used for selecting nodes to work with in the Common reports, Table reports, Software accounting and Edit modes.

The Network tree has two selection modes: Single selection and Multiple selection. Press the Multiple selection button located to the right of
the root node to switch between modes.

Single selection

Active when the Multiple selection button is released.

Only one network node or one group can be selected. To select it, simply click the node. The selected node is highlighted with the blue
rectangle:

While staying in the single selection mode, you can quickly select the next or previous node in the tree: Alt + arrow up/down.

Multiple selection

Active when the Multiple selection box is checked.

Each node will receive a checkbox, and the nodes are selected when their checkboxes are ticked:
You can check or uncheck the box either with the mouse or by selecting the nodes using Single selection and pressing the space bar.

Nodes selected using Simple selection can be selected for processing by using the Choose option from the context menu.

Selecting a group in the Single selection mode is the same as selecting all assets in this group and its subgroups in the Multiple
selection mode. A report will be built for all assets in the single selected group and editing will affect all assets in it, so you don't
need to enable the Multiple selection mode to build reports for whole groups. The only exception is the Group summary mode
which displays information about the group itself and is not available in the Multiple selection mode.
Altering the Storage structure
Creating a group
Renaming a group
Moving nodes into a group
Deleting network nodes and groups
Working with storage files directly

The Network tree allows to create, rename and delete groups of network nodes.

Creating a group

1. Right-click the parent group (to create a first-level group, right-click the root node);
2. Click Create group in the context menu;
3. Type the name of the group and press Enter.

Renaming a group

Click Rename in the context menu or select the group and press F2. Type the desired name and press Enter.

Renaming the root node will change the Storage name. Another way to do this is via the Storage properties.

Moving nodes into a group

1. If you need to move multiple nodes, select them using your mouse's Rectangle Selection or your keyboard's Shift or Ctrl;
2. Do one of the following:
a. Drag the selection with your mouse and drop it onto the title of the target group;
b. Right-click one of the selected nodes and use the Move to group menu item.

Deleting network nodes and groups

To delete one or several nodes or groups, select them and press Delete on your keyboard or use the Delete option from the context menu.

Deleting a network node is an irreversible operation. All the data connected to the deleted asset will be permanently lost. Consult
the Contents of an asset file section to find out what exactly is being deleted.

Deleting a group is not the same as "ungrouping". All the assets inside the group will be deleted as well.

Working with storage files directly

The Storage structure fully replicates the structure of files and directories inside the Storage directory, as described in the Storage s
ection. Therefore, it's possible to create, delete or rename groups and move assets between them by performing corresponding
operations over file system objects, which can be done in any file manager. TNI 3 will react to these changes automatically.

Right-click any node and choose Show in Explorer to quickly locate a directory or file corresponding to the node. This will launch an instance
of Windows Explorer navigated to the target directory. If the selected node is an asset node, its file will be selected.

You can also use this function when backing up data, copying, transferring to another TNI 3 user, etc.
Information display settings
Network node names
Additional field
Sorting the nodes
Number of assets in groups

What information is displayed in the Network tree can be chosen in the Tree display settings menu on the Network tree toolbar.

For instance, setting hostnames as node names, selecting IP addresses for the additional field and enabling the Show number of assets in
groups option will result in the Network tree looking like this:

Both node names and the additional field are used when searching the Network tree.

Network node names

A variety of values can be displayed as the node name: network names, IP addresses, inventory numbers, usernames, etc.

If Alias is set as the node name, network nodes can be renamed by choosing Rename from the individual context menu or by
pressing F2. The asset's alias will be changed. Another way to do this is via the Network node properties.

Additional field

An additional value can be displayed in the Network tree for every node. This value is selected from the same list as for the node name.

Sorting the nodes

The Sorting section allows to select the sorting criteria: nodes can be sorted either by their names or by the additional field values
(configured as shown above), with an option to reverse the sorting order.

Number of assets in groups

When Show number of assets in groups is enabled, the number of assets is displayed in parentheses to the right of the group title.
Searching in the Network tree
Saving the search
A case of using a saved search

To start searching the Storage, click the search field on the Network tree toolbar or press Ctrl + Shift + F.

Matching text is instantly highlighted as you type:

Both node names and additional text are searched. See Information display settings for details.

By default, the contents of the Network tree are filtered to only display the nodes which match the query, and the rest is hidden. This
function can be disabled by clicking the Filter button to the left of the search input field. When it's disabled, all nodes will remain visible while
the matching ones will be highlighted.

You can use the up and down arrow keys when the search field is in focus to navigate the nodes. Pressing Enter opens the selected node in
the main area.

Saving the search

You can deactivate search without losing its results by pressing the Save search button. You will then be able to toggle filtering on or off, run
a new search in the results of the saved one, etc.

Searching actually uses the Search node assistant. See Storage assistants for more details about what assistants can do.

A case of using a saved search

Let's imagine that inventory numbers of developer workstations in the Storage are prefixed with DEV_. We can quickly put together a simple
tool for switching the Storage from showing all assets to showing only developer workstations. All it takes is setting the Additional field to Inv
entory numbers and saving a search for DEV_. Now if we want to see developer workstations, all we have to do is turn the filtering on for the
newly-created assistant.

As with all added assistants, saved searches are not deleted when TNI is closed. After saving a search once, you can use it as long
as you need, temporarily disable it or remove it at any time.
Storage assistants
Storage assistants is a tool that displays additional graphic and text information in the Network tree, and also enables searching and filtering
by various criteria.

For example:

The OS Assistant displays the icon and the version of the currently running operating system in front of every asset and can hide the
nodes with OSes different from the one displayed.
The Online status Assistant displays a green or red circle, depending on the asset's online status. When the status changes, the
indicator is automatically updated. There's an option to hide all offline computers.
The Alerts presence Assistant displays a red flag and the number of problems in front of each asset where problems have been
detected. The hint lists the problems found.

There are many other assistants. This is how the Storage looks when the abovementioned assistants have been added:

Related topics:

Working with assistants


Description of assistants
Working with assistants
Adding assistants
Managing the added assistants

Adding assistants

Follow these steps to add an assistant:

1. Click the Add assistant (+) button on the toolbar in the Network tree;
2. Select the assistant type from the appearing menu;
3. Set a condition if necessary.

Setting up the Installed RAM assistant.

Any number of assistants can be used at the same time.


Several assistants of the same type can be added.
The assistants are saved when TNI is closed.

Managing the added assistants

Newly added assistants appear in a separate area under the toolbar: the Assistant list, which isn't displayed when empty. The Assistant list ca
n always be collapsed or expanded by clicking the title area.

This is what the expanded list looks like:

Every added assistant has several controls:

The Indicator toggle.

This enables or disables the corresponding icon on the right of every network node. Hovering the mouse cursor over an icon reveals a
hint with additional info.

The Filter toggle.

When enabled, all assets that don't meet the assistant's condition are hidden.

The Remove assistant button.

The number of assistants that currently act as Indicators and Filters is shown in the assistant list's header when the list is collapsed.
The number of assistants that currently act as Indicators and Filters is shown in the assistant list's header when the list is collapsed.

In case you can't find an asset that exists in the Storage, make sure it has not been filtered out by one of the active assistants.

By default, assistants are added as Indicators.

The Filter and Indicator toggles may be enabled simultaneously. If they are both disabled, the assistant is considered disabled and will not
affect the contents of the Network tree. The illustration above shows the Alerts assistant is disabled and the Online status assistant has both
toggles enabled.

Double-click the title of any added assistant to edit it (instead of removing it from the list and adding another). When the editing is
done, click Apply.
See how editing the Installed RAM assistant looks like:
Description of assistants
Hardware
Installed RAM
Virtual type
Software
Operating system
Tracked software
Inventory
Last snapshot age
Misc
Online status
Note contents
Alerts presence
Search node

The purpose of any assistant is to display additional information in the network tree. Assistants are sorted into groups by the nature of this
information: Hardware, Software, Inventory or Miscellaneous.

Each assistant has a condition. When an assistant is active, every network node is matched against its condition.

When the Indicator mode is active, the nodes that passed the check are marked with an icon.

Hovering the mouse cursor over this icon will provide additional information in the form of a hint.

In the Filter mode, an assistant will hide all assets that do not satisfy its condition.

If you've got a suggestion for a new assistant type, feel free to send us a message! Use the main menu option Feedback / Feature
request and tell us. Perhaps, next update you'll find your assistant in the program.

Hardware

Installed RAM

Compares the amount of RAM on an asset with the user-defined value.

The Indicator displays an icon with the amount of RAM.

Virtual type

Shows whether a device is physical or virtual.

Example of usage: excluding all virtual devices from a hardware report.

Software

Operating system

The Indicator displays the icon representing the installed OS and its version. The full title and version of the OS can be found in the hint.
The Filter hides all assets that run on an OS from a different OS family than the one specified (Windows, Linux, MacOS, FreeBSD or ESXi).

Tracked software

This assistant is related to the Software accounting mode, where it's possible to enable tracking for presence or absence of certain software
on selected assets. It has three modes and can point out the computers with must-have violations, forbidden violations or both. In the must-
have mode, the assistant displays an icon for each asset where "must-have" software is not found and the amount of such software. With for
bidden, an icon is displayed for each asset where forbidden software is found. When choose all, an icon is displayed when both types of
violations exist. The hint lists which software caused the icon to appear and the type of violation.

Inventory

Last snapshot age

Compares the age of the latest snapshot with the user-defined number of days.

The Indicator displays the number of days since the asset was last scanned.

Example of usage: view all the assets that were not scanned for at least a month.

Misc

Online status

TNI 3 pings all the assets in the storage once every several seconds, and this assistant is used to display the result in the Network tree.

In the Filter mode, this assistant only shows the nodes that are online at the moment (or offline, if the user changes the condition).

Note contents

Each asset can have a note assigned to it. These are comments added by the user of TNI 3.

Notes can be easily added in the Common reports mode or in Network node properties.

This assistant's condition contains a search string. When left blank, all the nodes that have a note will satisfy the condition. When text is
entered into the assistant's field, only the nodes which have a note containing the entered text as part of it will satisfy the condition.

The Indicator displays an icon for each asset that satisfies the condition. The hint contains the full note.

It's a good idea to include a short keyword in every note along with the actual message (e.g., "TODO" for tasks, "FIX" for faulty
assets, "UPGRADE" for assets that need to be upgraded, etc.) In this case, the Note contents assistant becomes very helpful. For
instance, you can use it to filter all the nodes by the presence of "FIX" in their notes, which will yield the list of malfunctioning
assets. Then you hover your mouse over one of them to find out what exactly is wrong:
Alerts presence

The Indicator displays a red flag and the number of problems in front of each asset where problems have been detected.

The Filter allows you to hide all the devices that don't have any alerts. This can be useful when building an alert report.

See: Alerts.

Search node

The condition contains a search string. Only the nodes that have the string as part of their name or additional text will satisfy the condition.

An alternative way of creating this assistant is by saving the tree search.

See: Searching in the Network tree.


Actions
Standard actions
Custom actions
Defining a new action
Templates
Conditions
Actions for multiple nodes
Accidental run protection
Sending keystrokes

Actions is a tool for performing operations on the network nodes in your Storage right from the Network tree.

Actions can be accessed via the network node and group context menus:

By default, only the actions that are applicable to the selected nodes are visible in the menu. This can be changed from the Options
.

Standard actions

TNI comes with three standard actions:

Reboot;
Power off;
Wake-on-LAN.

These actions don't need to be configured. To execute one of them, simply select it from the action list of the desired node or group of
nodes.

Custom actions

Custom actions allow you to use any system routines or third-party utilities in order to accomplish a desired task involving a remote network
device.

Custom actions are defined in the action text file using a simple syntax. To access the file, right-click any asset, choose Edit actions from the
Actions sub-menu and, when the Options window opens, click the Edit commands in Notepad button in Options / Actions.

A convenient, brief summary for the action definition syntax, with examples and a complete list of keywords and templates, can be
found in the Actions section of the Options window, with one-click copy capability included. The list is also available on this
documentation page.

Defining a new action

To add a new action, add a line to the action text file:


Action name=command

Action name is the name that will appear in the Actions menu.

Command is the command for the operating system to execute.

Templates

Inside the command's definition, certain string templates are used to pass the parameters of a targeted network node into the command.
These are the supported templates:

%HOST% FQDN, hostname or IP, depending on the Static IP flag of the asset

%HOSTNAME% Hostname of the asset

%ALIAS% Alias of the asset

%IP% IP-address of the asset

%MAC-% Hyphen-separated MAC-address

%MAC:% Colon-separated MAC-address

%MAC% MAC-address without delimiters

%SSHPORT% Custom SSH port as specified in the scanner options

%USERNAME% Username from the login record used for asset scanning

%PASSWORD% Password from the login record used for asset scanning

%DATE% Current date (YYYYMMDD)

%TIME% Current time (HHMM)

%TIMES% Current time (HHMMSS)

An example of using a template in a command:

Ping asset=ping.exe %HOST%

Conditions

Conditional directives may be added to the action's definition, thus rendering the action inapplicable to certain assets. This is useful in a
variety of cases, i.e. to prevent attempts to execute a command that are certain to fail.

A condition is specified when {$IF condition} is added before the action's definition in this way:

{$IF condition}Action name=command

These are the supported conditions:

OPEN00 The specified port is open

OPENSSHPORT The SSH port specified in the scanner settings is open

ONLINE The device is online

WIN It's a Windows device

LIN It's a Linux device

MAC It's an OS X device

SSH The device was scanned via SSH (a Linux, OS X, FreeBSD, or an ESX/ESXi device)

SNMP The device was scanned via SNMP

LAN The device and the PC running TNI 3 share the same subnet

EXISTS(filename.exe) The specified executable exists on the paths specified in the PATH environment variable

Several conditions separated by commas result in a logical AND treatment.

Adding an "!" before a condition negates it (logical NOT).


Adding an "!" before a condition negates it (logical NOT).

Example usage with conditions:

{$IF LAN,!ONLINE}Wake-on-LAN=wol.exe %MAC:%

Actions for multiple nodes

By default, any action is considered inapplicable to several devices at once. Thus, it won't appear in the action list when you select several
devices or a group. To make it available in these cases, multiple targets have to be allowed explicitly by adding the {$MULTI} directive in
front of the definition.

Example:

{$MULTI}{$IF LAN,!ONLINE}Wake-on-LAN=wol.exe %MAC:%

When targeted at multiple devices, a condition is considered satisfied if any of the target nodes satisfies it. To make a condition mandatory
for all targets, an "!" should be added after it.

Examples:

{$IF LAN} If any of the target nodes share the local subnet

{$IF LAN!} If all of the target nodes share the local subnet

Negation and mandatory-for-all modification can be combined:

{$IF !ONLINE!} If all of the targeted nodes are offline

Accidental run protection

If an action is "unsafe", adding an {$?} directive to the definition will display a confirmation dialog before every execution.

{$?}Shutdown="C:\PSTools\psshutdown.exe" -k \\%HOST%

Sending keystrokes

Sometimes executing a command launches a user interface that requires further user input. In order to automate this task, TNI can send
predefined keystrokes to the launched application.

To send keystrokes, append /sendkeys: to the action's definition, followed by a string of keys to send. After the /sendkeys: command you
may use:

Arbitrary sent as is
text

Templates converted to text and sent as they are

{$WAIT pauses the execution for X milliseconds (if this directive is omitted, the default pause before sending any keys is one second)
X}

{key simulate pressing a special key (the following keyboard keys can be used: F1..F10, LEFT, RIGHT, UP, DOWN, ENTER,
name} BACKSPACE, PGUP, PGDN, HOME, END, TAB)

Example of usage:

Remote Desktop with login=mstsc.exe /v:%IP% /sendkeys:%PASSWORD%{ENTER}

When the action is executed, an authorization window will open up. TNI then sends the password to the input box and presses Enter to log
in, automatically.
Custom assets
Adding custom assets
Cloning custom assets
Adding custom assets from file
Converting non-scanned assets to custom assets

Adding custom assets

Custom assets can be added to your Network tree manually by using the Add custom asset feature. This allows to create new assets in your
Storage, even if they don’t have a network interface (e.g. monitors, tablets, webcams). As a result, viewing and building reports becomes
possible for both custom and automatically created assets.

Follow these steps to add a custom asset:

1. Click the Add custom asset

button above the Network tree (or in the context menus of your Storage root node or any asset group);
2. In the new window, specify the asset’s type and name;
3. If necessary, fill in the values for common fields and add special fields.

A new asset will appear marked with

in the Network tree:

It's possible to save and load special field presets by clicking Save preset as… and Load preset buttons in the Adding new custom asset windo
w.
Cloning custom assets

To add a large number of identical assets you can use the Clone asset button (by right-clicking any custom asset on your network tree).
Enter the number of copies you need and press OK.

The copies you make will appear in the Network tree as follows:
Adding custom assets from file

The Add custom assets from file option allows you to perform a quick import of a whole list of assets or IP addresses to your Network tree.
To add custom assets from file, right-click your storage root node or any asset group node, and then click the corresponding button:

It's possible to import from a text file (*.txt) only.


The file should contain only one asset name or IP address per line.
For example, the following list of names:
PC-1
PC-2
PC-3
PC-4
...will appear in the Network tree in this way:

Converting non-scanned assets to custom assets

The Convert to custom asset option allows to transform an asset that couldn't be scanned by any method to a custom asset. As a result, you
can avoid scan error alerts.

To convert an asset, right-click any non-scanned asset in the Network tree and choose Convert to custom asset:
The asset will be displayed and marked with

in the Network tree.

Conversion does not bring any changes to the information fields or properties of assets.
Synchronization with Aсtive Directory
Synchronizing with Active Directory allows you to automatically transfer the OU structure to your network tree. A group will be created for each
OU in the current domain, and each computer in the domain will be moved to its proper place in the structure.

To perform AD synchronization right-click the Storage root and choose the corresponding option:

During the synchronization, assets will receive Location and Description retrieved from AD (if they are filled), and also the OS Version (for assets
that have logged into the domain at least once).

Users are also synchronized with AD during every Storage synchronization, and can be synced separately by going to the Edit – Users tab and
clicking Synchronize with AD. This function retrieves AD users with their names, positions, contact info, etc. and places them into your Storage for
convenient search and report building.

Placeholders are created for each device that has been discovered in the domain but has not yet been scanned. These placeholders are empty
nodes that can be rescanned to retrieve inventory information. They will be displayed as

in the Network tree, and the following hint will be displayed in the Viewer & reports – General information tab for such assets:

Placeholders contain some basic information from AD: Description, Location, OS name, its version and installed Service Pack.

You also get to choose which action to take if a previously scanned PC has not been discovered in the domain during synchronization: move it to
a separate group or delete it.

You can configure TNI to perform synchronization on startup. This and several other switches are located in Options – General.
Active Directory synchronization is one-way only: it's only possible to import data from AD to TNI at this time.
Network scanning
The Scanner mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing Ctrl + 1.

Scanning in TNI 3 is a process of data collection from remote assets and saving it to the current Storage.

When the program scans an asset not present in the Storage, a new node is created for it. Assets that are already in the Storage can be
scanned repeatedly to update with the collected information.
Related topics:

Adding scan tasks


Managing added tasks
Scan process and scan results
Saving, importing and exporting tasks
Scan scheduler
Adding scan tasks
Quick Add
Sidebar
Rescanning network nodes

Before starting a scan, you'll need to specify a task list for the scanner.

Quick Add

Type what you'd like to scan into the Quick Add field and press Enter.

Here you can type in the following:

Network name
PC321
host.domain.com
IP-address
192.168.0.1
Subnet
192.168.0.0/24 (allowed CIDR notation number range: from 16 to 30)
192.168.0.0/255.255.255.0 (allowed masks range from 255.255.0.0 to 255.255.255.252)
IP range
192.168.0.1-192.168.0.254
192.168.0.1-192.168.2.150
(the total number of hosts must not exceed 65536, i.e. X.X.0.0-X.X.255.255)
Shortened IP range
192.168.0.1-254
192.168.0.1,5,7
192.168.0.1-50,125,130
192.168.0-3,5,7.1-254
Windows workgroup name (prefixed with WG:)
WG:MSHOME
Domain controller
Hostname or IP address of a controller prefixed with AD:
AD:10.0.0.1
AD:servername
This works even when your PC is not in a domain.
LDAP notation
LDAP://OU=Seattle,OU=Washington,OU=USA,DC=company,DC=local
Only works when your PC is in a domain.
Shortened LDAP notation
There are several ways of defining an Active Directory object. These notations are converted into LDAP and can only be
used from inside a domain.
Domain
DC:company
DC:company.local
Container
CN:Computers
Organizational unit
OU:Seattle
OU:Seattle.Washington.USA
Exception task
A hostname or an IP address of a node that needs not to be scanned, prefixed with a " -"
-APACHESERVER
-10.0.0.1

The Quick Add field stores the history of commands you typed in, similar to how Windows command prompt does. Browse recently
used commands using up and down arrow keys.

Sidebar
The Add scan task group on the sidebar contains these items:

This PC: adds a task for scanning the computer running the current instance of TNI 3;
All assets: adds tasks for rescanning of each asset in the storage;
Selected assets: adds tasks for rescanning of the selected assets;
IP networks;
This group contains automatically detected networks that your network adapters are set up to use.
Windows network;
Here, all visible Windows workgroups are listed.
Active Directory.
Your default naming context and root domain naming context are presented here.
The Connect to domain option allows to use another domain controller. It has the same effect as typing AD:<hostname or
IP of a domain controller> into the Quick Add field.

Rescanning network nodes

You can create tasks for rescanning the existing nodes in several ways:

1. Simply type the hostnames or addresses of assets into the Quick Add field;
2. Select the corresponding nodes in the Network tree with your mouse or using Shift or Ctrl and drag them into the task list area:

Drag and drop a group, and a task will be created for each asset it contains.

3. Use All assets or Selected assets from the Sidebar;


4. While in any mode (not necessarily the Scanner), select Rescan from the context menu of a node or a group.
Managing added tasks
Node discovery
Setting logins
Logins for single tasks
Logins for complex tasks
Logins for assets of various types
Assigning logins to assets
Setting a login for a task created with Quick Add
Setting the destination folder
Deleting and disabling tasks; exceptions
Deleting tasks
Disabling tasks
Exceptions

Node discovery

Complex scan tasks (i.e. network scan, IP-address scan or Windows workgroup scan) work with previously discovered nodes. The discovery
will be performed automatically, but it also can be done manually before scanning starts.

To perform the network discovery, just expand a complex task. The subtasks corresponding to discovered nodes will gradually show up.

Searching is accompanied by animation. It can be stopped by pressing the Stop search button.
When the search is completed or stopped, two additional buttons appear on the right:

Repeat search deletes all subtasks and performs a new node discovery;
The Padlock option shows the way the complex task will be saved in Saved tasks.
When the padlock is opened, the task will be saved without subtasks, and the search will be performed again when the
saved task is added again.
To save the task along with the configured subtasks, click the padlock and it'll close.
About saving scan tasks.

Setting logins

To access a remote node, the TNI 3 scanner requires a login (username and password, or a community string for the SNMP protocol).

Logins for each task can be specified in columns corresponding to their protocols.

Click on an arrow in any protocol cell, and the login menu will show up.
This list contains all logins created by the user and the standard login for the protocol (for Windows: the current user of the system where
the program is run; for SNMP: a public community).

To scan an asset by the selected protocol, select one of the logins or create a new one by using the Add option.

Along with the username and password (or the community string for SNMP), an alias should also be specified when adding a new login. An al
ias is a unique identifier that will be used to address this login in TNI.

To change the username and password for previously created logins, use the Edit button (the pencil icon) located in front of every login in
the list.

To skip scanning the asset by a particular protocol, select Ignore.

Logins for single tasks

Only one login for one of the protocols can be selected for any single task. If the login is not specified, the task will be ignored during
scanning.

Logins for complex tasks

Complex tasks can have several logins for each protocol. In this case, access to every asset scanned within this task will be sequentially
requested using all specified logins until one of them matches.

A tilde (~) in a login cell means that the task uses the logins of a parent task, but another login can be assigned to the task, and it will be
used for scanning.
Logins for assets of various types

If the asset is not present in the Storage and the scanning has not been started yet, TNI doesn't know its type, therefore the protocol to scan
this asset with is unknown as well. In this case, login for any protocol can be set.

When the asset type is known, it can only be scanned via the appropriate protocol: Win for Windows-assets, SSH for Mac OS X and Linux
assets, etc. The cells of other protocols will be greyed out and inactive.

Assigning logins to assets

Assigning a login to an asset in the Storage means that a new scan task for this asset will be automatically created with the assigned login.

Assigning logins to assets, as well as creating, deleting, editing logins and changing default logins can be performed in the Edit mode. For
more details, see Logins.

On the first scan of a remote asset, the login that successfully provided access is automatically assigned to it.

Setting a login for a task created with Quick Add

A new task automatically acquires a login entered with additional semicolon-separated login command:

<task creating command>; login <login alias>

For instance:

10.0.0.3; login Homer

You can also enter several logins separated by commas:

10.0.0.0/24; login Homer, Marge

Setting the destination folder

By default, all new assets are placed in the root folder of the Storage.

You can select a folder in the Storage for every task, and the scanned assets will be placed there.

The Destination folder column serves this purpose. Clicking on an arrow in this column will show a menu with the list of all storage folders.

It's not possible to create a new folder from this menu. If assets should be placed in a new folder, create it manually beforehand.

You can use an additional "to" command when creating a new task with Quick Add:

<task creating command>; to <path to folder>

EARTH; to Planets

10.0.0.3; login Homer; to New devices

PLUTO; to Planets\Dwarf planets

Deleting and disabling tasks; exceptions

Deleting tasks

To delete a task, use the Delete button in front of its title in the Task column or select multiple tasks and press Delete on the keyboard.

Disabling tasks

To disable a task without deleting it, tick off the checkbox in front of its title. This can also be done by selecting multiple tasks and pressing
the Space bar. To enable or disable all tasks, use the checkbox in the Task column.

You can create a new task as disabled through Quick Add by using an additional disable command:
<task creating command>; disable

HALLEY; to Comets; disable

Exceptions

You can create an exception task using Quick Add. Just enter a network name or an IP-address with prefix "-" (minus). If the exception task
is enabled, the scanner will ignore the specified asset.

Exceptions are convenient to use for scanning networks and ranges. For instance, if one or several assets in the 10.0.0.0/24 netwo
rk should not be scanned, you can do the following:

1. Create a task, expand it and wait for all subnodes to be discovered, then delete the unnecessary ones;
2. Create a task and several exception tasks.

Option 2 is sometimes faster and more handy.


Scan process and scan results
Editing the task list
Scanning
Scan results

The scanner control block is located at the top of the Sidebar.

It displays the current status of the scanner and additional command buttons. Certain buttons may appear or disappear depending on
situation.

Editing the task list

When the tasks have been added and configured, click Start scan.

Looped scan: performs current tasks with specified frequency.


Set up scanner: opens the options window.
Set up logon script scan (see Logon script scan).
Set up scheduler (see Scan scheduler).
Set up resident agent (see Resident agent scan).
Set up logins: opens the Logins subpage in Edit.
Clear all: removes all added tasks.

Scanning

You can't remove, disable or configure scan tasks during scanning. All disabled tasks are hidden.

The Status column displays the progress of each task and their current states.

The overall scanning progress is displayed in the Sidebar.

Click Stop scan if you want to interrupt the scan process. This operation can take some time.
Click Stop scan if you want to interrupt the scan process. This operation can take some time.

You don't have to stop the scan process to add new tasks. Simply create new tasks during the scan: from the Quick Add field, by
dragging assets into the scanner area or in any other way. They will be processed when in turn.

You don't have to monitor the scan process. You can freely switch to a different mode and work there while the scan is performed
in the background. The icon in the Scanner tab displays the scan progress.

Scan results

When the scanning is done, the results of every task are displayed in the main area.

If an error has occurred while processing any of the tasks, you'll see an error message in the Status column.

Names and statuses of tasks can be copied by selecting them and pressing Ctrl + C or via the context menu.

The sidebar displays the overall scan result and some additional commands.

Back to editing: dismisses the scan results and returns to normal mode.
Clear finished: only leaves the tasks that have not finished with success for one reason or another. This allows to eliminate the
causes of errors and run the scanner again without rescanning the tasks that finished with success.
Saving, importing and exporting tasks
Saving and loading
Importing and exporting
Manually creating a task list file

Saving and loading

To save a task list, click Save current tasks on the Sidebar. Once saved, a task list can be loaded and used at any time.

To load a previously saved task list, click on its title in the Saved tasks list.

When a task list is loaded, its tasks are appended to the tasks already in the scanner. If you want to only load the tasks you saved,
clear the tasks in the scanner before loading the list.

If you need to pass a task list on to another TNI 3 user, you can find your saved lists as separate files in the Tasks subfolder of the
program's application data folder ({Path to the Application Data folder}\Total Network Inventory 3\Tasks). It can be accessed by
clicking the Open tasks folder link on the Sidebar in the Scanner mode.

Importing and exporting

Task lists can be exported to a file or imported from it.

To export the current task list click Save tasks to file. You can choose between file extensions .task-list and .txt.

To import a task list file, click Load tasks from file.

Manually creating a task list file

Sometimes it's convenient to manually create a list of nodes that need to be scanned.

Using the Load tasks from file command, you can turn such a list into tasks for the TNI 3 scanner.

In general, the task file in TNI 3 is a simple text file where each line is a command that adds one task.

The simplest example of a valid task file is a list of IP addresses and network names, each in a separate line. However, the options are not
limited to network names and IP addresses. You can find the full list of supported notations here.
Scan scheduler
Creating a scheduled scan task
Setting up a scheduled scan task
Run log
Managing scheduled scan tasks

Scan tasks can be scheduled to run on a specified day and at specified time, or daily, weekly or monthly using flexible rules.

Creating a scheduled scan task

The scheduler works with saved tasks. For information on how to create them, see:

Adding scan tasks


Managing added tasks
Saving, importing and exporting tasks

A scan task can be scheduled in two ways:

1. Move your cursor over a task in the Scanner's sidebar and click Schedule this task;

2. Go to Options / Scan scheduler, click the Add task dropdown and choose your task from the list.

As a result of one of these actions, a scheduled scan task will be created.

Setting up a scheduled scan task

Clicking the [+] button to the left of the task name in Options / Scan scheduler reveals its settings.

The Run section allows to set up the type of repetition:

Once
On a specified date.

Daily
Every day at specific time, or once every N days.

Weekly
On specific weekdays every Nth week.

Monthly
On specific days of chosen months of the year.
The exact Time of scanning can be specified using the corresponding field.

For repeated tasks, the Starting date can also be specified. The task will not be executed before this date.

Run log

For a task to be executed at the scheduled date and time, TNI must be running, and the scanner must not be busy with other
tasks.

Each scheduled scan task has a separate Run log (accessible from Options / Scan scheduler). Each time a task is run or skipped, TNI adds an
appropriate descriptive entry to the corresponding log. A run log can be cleared or copied to clipboard.

Managing scheduled scan tasks

Toggling the switch to the right of a scheduled scan task in Options / Scan scheduler on or off enables or disables the task. You can temporar
ily disable the task to stop it from running on scheduled days and re-enable it at any time.

To unschedule a task, click the X to the right of the scheduled scan in the Options window.

The saved task itself will not be deleted, only removed from the scheduler.

Another way to remove a scheduled scan task is to delete the corresponding scan task itself from the Scanner's Sidebar.
Scanning using agents
One of the ways TNI scans remote devices is by sending an agent to them. The agent then studies the remote system, obtains the inventory
information in the form of a data file and sends it back to TNI. When the scanning is complete, the agent is erased from the remote system and
no traces of scanning remain. You can learn more about the scanning technology from the Techpaper.

This section describes how TNI's scanner agents can be used as standalone tools.

Manual scan: use standalone scanner tools for inventorying assets locally when they're not accessible remotely.
Logon script scan: configure the script that automatically scans computers that show up in a domain.
Resident agent scan: automatic scheduled scan of any Windows computer without the main unit's direct participation.
Manual scan
1. Copy the agent executable to the asset you need to scan
2. Perform the scan
3. Import the data into your Storage

Manual scan can be used to inventory assets that are not connected to your network or are inaccessible for regular scanning for one reason
or another. For example, assets running Windows XP Home Edition can only be scanned this way due to OS limitations.

Manual scanning of any system involves three basic steps.

1. Copy the agent executable to the asset you need to scan

Agents are located in TNI's installation folder (e.g. "C:\Program Files (x86)\Total Network Inventory 3"). The filenames are as follows:

Windows agent: tniwinagent.exe

Linux agents: tnilinagent


tnilinagent_x64

OS X agent: tnimacagent

FreeBSD agent: tnibsdagent

VMware ESX agent: tniesxagent

The Windows agent can also be copied to a specified folder by using the Export standalone scanner option from Options – Logon script.

2. Perform the scan

Launch the agent on the remote system. When the scanning is complete, a data file will be generated and, by default, placed into the
directory the agent is run from.

When scanning a Windows asset, you can use these command line parameters for tniwinagent.exe:

/path:"\\server\share" allows to set a path to a folder where the data file will be placed;
/delay:XX specifies the gap in seconds between the agent's launch time and the start of the scan;
/overwrite overwrites the data file in case the target folder already contains its older version (otherwise, new files appended with
(2), (3), etc. will be created after each scan);
/scripted is required for running the logon script scan;
/debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will be
created, which can be sent to the developers in order for them to search for and fix possible scan errors;
/driver:{x} controls the low-level hardware scan mode. Set x to:

0 — to disable low-level hardware scan completely;


1 — to always skip disk drive scan (in order to avoid BSOD);
2 — to skip disk drive scan automatically if the faulty driver is present (default value);
3 — to enable full low-level hardware scan.

/admin runs the agent with administrator rights;


/noadmin runs the agent without administrator rights;
/keepdriver keeps the low-level hardware scan driver installed;
/removedriver removes the low-level hardware scan driver (if it's installed);
/nodriver disables low-level hardware scan (same as driver:0);
/logoff logs the current user off (post-scan);
/reboot restarts the computer (post-scan);
/poweroff powers off the computer (post-scan; same as /shutdown);
/shutdown shuts the computer down (post-scan; same as /poweroff).

Linux, OS X, FreeBSD and ESX agents are run from the console. For example, you can run the Linux agent using the following command:

chmod 755 tnilinagent


./tnilinagent

When scanning Linux, OS X, FreeBSD and ESX systems, the following command line parameters can be used:

-silent allows to scan an asset without user interaction. Only the scan progress percentage will be displayed;
-log allows to scan an asset while logging the scanning process;
-debug allows to scan an asset in debug mode (when scanning errors are detected in normal mode). A special data file will be
created, which can be sent to the developers in order for them to search for and fix possible scan errors.

Locate the generated data file and send it back to the system that runs your copy of TNI (or any other place TNI has access to).
3. Import the data into your Storage

You can do this in several ways: by placing the file directly into the Storage folder, by using the Import menu, or by enabling the automatic
import if the manual scanning should be performed regularly. See the Data import section for details.
Logon script scan
Setting up the logon script scanning
Automatically importing new data files

This type of scan uses TNI's Windows agent to automatically scan any Windows computer as it logs on to the domain. This is achieved by
adding a specific command line (with a call to a previously exported agent executable) to the user's domain logon script. Whenever the script
is run, the agent is run on the remote asset as well. It generates a data file and places it into the specified directory. The resulting set of data
files can then be imported to the TNI Storage either manually or automatically.

Setting up the logon script scanning

Go to the Scanner tab and click the Set up logon script scan button on the Sidebar (or open the Options window and go to the Logon script p
age).

Use the Export standalone agent... button to place a copy of the Windows agent (tniwinagent.exe) into the shared folder of your
choice. Make sure that the scanned assets have read rights to the folder you choose.
Path to agent: contains the path to the agent's executable.
In the Save path field, specify a separate folder that will contain the data files generated by agents. This folder should be accessible
for writing from the remote assets.
You can add a delay before scan start in order to prevent performance issues caused by the scan process starting simultaneously
with autorun programs.
Overwrite existing files: when enabled, the previous versions of data files will be replaced with the new ones when the assets are
scanned repeatedly.

Any modification of the above parameters generates a command line for the logon script. You may copy the command and paste it into the
logon script manually, or let the program do it for you by clicking the Add the command to a script button.

A detailed step-by-step guide is available in the FAQ.

Automatically importing new data files

To automatically import the data generated by the logon script scan, go to Auto-import options and specify the path to the folder containing
the data files (from the Save path field in Logon script settings) into the Import data path field. This way, your Storage will always contain
the most recent configuration information from each computer in your domain. See the Data import section to find out more about the
automatic import feature and its parameters.
Resident agent scan
Setting up the resident agent
Resident agent settings
Agent activity schedule
Automatic resident agent deployment and uninstallation
Manual resident agent installation and uninstallation
Updating the resident agent

This type of scan uses TNI's Windows agent to automatically scan any Windows computer without the main unit's direct participation. It can
be arranged by installing the resident agent as a service on the remote computer. The service then performs scheduled scans and can send
the data file – generated after each scan – via e-mail or FTP, or save it to a network share. The data files can then be imported to the TNI
Storage either manually or automatically. The advantage of this scanning type is in the ability to collect information from computers that the
main TNI unit has no or limited access to.

Setting up the resident agent

Go to the Scanner tab and click the Set up resident agent button on the Sidebar (or open the Options window and go to the Resident agent p
age).

Resident agent settings

Show resident agent deployment controls in the Scanner: allows to make the buttons Deploy and Remove resident agent on the
Sidebar in the Scanner tab visible or hide them. See Automatic resident agent deployment and uninstallation.
Auto-update the agent or settings from a network resource (HTTP or SMB): allows to set the path to the folder on a web or file
server that the resident agent can self-update or obtain new settings from. See Updating the resident agent.
Data transfer method: allows to select one of the 3 available protocols using which the scan results are to be sent. If the Do not sent
data option is set, the files will be saved to the current folder where the agent is installed (for the automatically deployed agent, it's
C:\Windows\TNIRESIDENTAGENT\).
Keep sent data in the 'Sent' folder: allows to disable automatic deletion of inventory files after they're sent. Files can be found in subf
older Sent inside the current folder where the agent is installed (for the automatically deployed agent, it's C:\Windows\TNIRESIDENT
AGENT\Sent\).
Use the Export resident agent… button to place the agent's files into the folder of your choice for further manual deployment on
remote computers. The files exported include a copy of the Windows agent (tniwinagent.exe), the settings file (tniwinagent.ini) and
– if required by the agent according to the settings (see below) – 2 libraries (libeay32.dll and ssleay32.dll).

The two libraries will be exported along with the agent and necessary for its correct operation when any of the following combinations of
settings are used:

Data transfer method is set to SMTP, Send to MX server is disabled, and either STARTTLS or TLS/SSL is selected as the Security level
;
Data transfer method is set to FTP, FTP proxy is disabled, and an FTPS address is specified as the URL;
Auto-updates from a network resource are enabled via HTTPS.

If FTP proxy is enabled, encryption will not be used even if an FTPS address is specified in the URL field.

When using FTPS, the agent will attempt to encrypt both the command channel and the data channel. If the server does not
support this (and some servers won't), only the command channel will be encrypted during further transfers.

For both the SMTP and FTP transfer methods, TLS is not enforced. If the server does not support TLS, the transfer will be
performed over an unencrypted connection.

Agent activity schedule

Configured similarly to the Scan scheduler.

Scheduling the agent launch is essential. If the schedule is not created, no scans or data transfers will be performed.

Automatic resident agent deployment and uninstallation

Automatic deployment is initiated from the Sidebar in the Scanner tab.


Automatic deployment is initiated from the Sidebar in the Scanner tab.

Before deployment, set up the Resident agent. Then add computers to the task list, select logins and click Deploy resident agent on the
Sidebar.

Buttons Deploy and Remove resident agent will be displayed only if enabled in Resident agent options, and if tasks have been adde
d to the task list.

Deploy resident agent. The main TNI unit uploads tniwinagent.exe, tniwinagent.ini and, depending on the data transfer and
auto-update settings, 2 .dll files to remote computer folder C:\Windows\TNIRESIDENTAGENT and then connects to the Service
Control Manager to install and start the agent as a service.
Remove resident agent. The main TNI unit connects to the Service Control Manager to stop and uninstall the resident agent service.
Folder TNIRESIDENTAGENT is deleted.

When the resident agent is removed, all content from TNIRESIDENTAGENT, including inventory files and logs, is deleted
permanently.

Manual resident agent installation and uninstallation

Manual deployment can be used when the computer that needs to be inventoried is not connected to your network or cannot for whatever
reason be deployed to automatically.

For manual deployment, the following steps have to be taken:

1. Set up the resident agent and use Export resident agent… to place tniwinagent.exe, tniwinagent.ini and, if required by the settings, 2
.dll files to an empty folder.
2. Move this folder containing the files to the remote computer where the agent has to be installed. Make sure that the resident agent
folder will not be deleted by accident.
3. Start the resident agent service from the resident agent folder using the following command:
tniwinagent.exe /install
The following switches can also be used during installation:
/start will start the service right after the installation;
/testrun will run a test scan when the service is started for the first time, and the resulting data will afterwards be transferred via
the selected protocol.

To remove the service, use the following command:


tniwinagent.exe /uninstall

A message will notify you when the service is successfully installed or uninstalled.

Updating the resident agent

The resident agent can be updated on the remote computers using one of the following methods:

1. Re-deploy the agent from the Scanner in TNI.

In this case, the resident agent doesn't need to be removed first because the contents of the agent's folder – including any
saved scan results – will be deleted.

2. Configure auto-updates from a network resource. For this, enable this option from Resident agent options and specify the path to
the directory where the updated versions of the agent and the settings file will be placed. If only the settings need to be updated,
then the settings file (tniwinagent.ini) alone may be copied into the specified directory, without the agent file.
The resident agent automatically checks for updates 5 minutes before the scheduled scan and updates itself if necessary.

Example path for updating via HTTP:


http://websiteaddress/folder/

Example path for updating via SMB:


\\computername\folder\

It's not possible to update the agent without the settings file.
Common reports
The Common reports mode is activated by clicking the Viewer & reports tab above the main area or by pressing Ctrl + 2.

In this mode, you can study each asset's configuration in detail by browsing the information collected during scanning. Information is sorted into
categories: Processor, System memory, Operating system, Installed software, Shared resources, etc.

This is also the right place to build full and brief reports for printing or exporting to popular formats. Reports can cover several assets and
information categories at once.

Related topics:

Building reports: report types and information categories.


Viewing information: searching information, copying and exporting values.
Printable reports: preparing reports that can be printed or exported to PDF, HTML, RTF, ODT.
Additional features: user information overview, adding custom notes to assets.
Building reports
Group summary
Report on selected assets
1. Select one or several assets
2. Select the report categories

To build a report on one or several assets in the Storage, you must first select them in the Network tree.

In certain cases, the report will be rebuilt automatically in response to your actions. But whenever report customization takes
several steps (e.g. when selecting several assets one by one), no auto-updating will occur; press F5 or click the blue hint bar to
update the report manually.

Group summary

To build a group summary, choose a group while in the Single selection mode.

The resulting report will provide an overview of the group contents:

The number of online and offline assets;


The list of assets that were scanned recently;
The list of assets that were not scanned;
The number of physical devices of each type;
The list of virtual devices including the virtualization platform names;
The list of computer models;
The list of operating systems discovered in the group and the number of copies of each;
The list of alerts in the group.

Clicking on the gear button to the right of the Group summary item in the Sidebar will open its settings, where unwanted overview items can
be disabled.

The gear button to the right of the Alerts item in the Sidebar opens the alert settings window.

Report on selected assets

1. Select one or several assets

Remember: to include only one asset in the report, it's enough to click it (when the Multiple selection mode is disabled); to include
several assets, you need to first enable the Multiple selection mode by ticking the Several assets checkbox.

The Sidebar will display the list of information categories that can be used to build a report. Contents of this list depend on the number and
type of selected network nodes.
If a single asset is chosen, a list of its snapshots will be displayed at the top of the main area:
To switch between snapshots, use the Earlier snapshot and Later snapshot arrow buttons or select a date from the drop-down list. When the
snapshot is selected, the current report will be automatically rebuilt.

When several assets have been included in a report, only the latest snapshots are used.

2. Select the report categories

Click one of the categories to see a report on it for the selected assets.
To include several categories in a report, tick the Several categories checkbox. As a result, a checkbox for every category will be displayed.
Tick the categories of interest and refresh your report.

The main categories are sorted into groups: Hardware, Software, Other.
The contents of the main categories are described in the Collected information section.

Additional categories:

General information: an overview of network attributes, operating system and hardware;


Alerts: detailed description of problems found on the asset;
See the Alerts section for more information on how alerts work.
The number to the right of the category title is the total number of alerts for the selected assets.
Hover your mouse over the Alerts category to display a gear icon that takes you to the Alert options screen.
Custom information: additional user-created fields;
See Custom fields for more info.
Users: information about the user assigned to the asset.
Viewing information
Selection
Copying
Export
Searching and filtering

After one or several assets in the Network tree and the report categories have been selected, information about the assets will be displayed
in the main area.

Selection

You can select lines in the report in a normal way, use the mouse or keyboard keys Shift and Ctrl.
To easily select a group of fields, click its header.

To select the whole report, press Ctrl + A or use the Select all option from the context menu.

When using the context menu options, only the selected lines are affected.

When using the Copy and Export buttons in the upper right part of the main area, all displayed information is copied or saved whether it's
selected or not.

Copying

Information can be copied in several ways:

1. Copy as text
Group titles, field names and values are copied. Nesting levels will be indicated by tabulation characters in the beginning of each line.
The same character separates field titles from values.
This method is used for copying by default. This is also the way information is copied when you press Ctrl + C.

2. Copy as CSV
CSV (Comma-separated Values) is a text format that is convenient for storing structured information.

3. Copy values only


Field names and group titles will not be copied.

Export

You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.
You can save the selected lines or the whole report to a text or CSV file by using the Export menu or the context menu options.

To save to PDF, HTML, RTF and ODT formats, build a printable report and export it.

Searching and filtering

To initiate a search, click the search field at the top of the main area or press Ctrl + F. The search will be performed instantly as you type.

When the Filter checkbox below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.

The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result is
achieved by pressing the up and down arrow keys on the keyboard.
Printable reports
Types of printable reports
Zooming and changing paper format
Search
Customizing printable reports
Printing and exporting

To switch to the Print preview, click Printable reports in the upper-right corner of the main area.

The Print preview toolbar will appear. Printable pages of the report on currently selected assets and categories will be displayed in the main
area.

Close print preview (the X on the right edge of the toolbar) to return to the normal mode.

You don't have to close the print preview to build another printable report. Simply work in this mode as you would in the normal
mode. Selecting assets and categories will update the printable version automatically.

Types of printable reports

There are two types of printable reports:

Full printable report


This report contains all the information displayed in the viewer. All titles, values and structure of fields remain the same.
Brief printable report
This report contains only the most significant information on each of the selected categories. It's presented as a table, which makes
it more space-efficient compared to the full report. This report is great for making short overviews that will fit on a few pages.

To switch type, use toolbar buttons Brief and Full.

Zooming and changing paper format

The Paper format drop-down menu is used to set paper size and text orientation.

Scale controls are used to zoom the preview in or out.

Search

To initiate a search, click the search field at the top of the main area or press Ctrl + F. The search will be performed instantly as you type.

To highlight the next match, click the Next result arrow button or press the down arrow key on the keyboard.
To highlight the next match, click the Next result arrow button or press the down arrow key on the keyboard.

The arrow buttons Next / previous result on the right side of the search field enable fast browsing in the search results. The same result is
achieved by pressing the up and down arrow keys on the keyboard.

Customizing printable reports

Click Reports options to open the TNI 3 options window on the Reports page.

The company title and logo, printed in the header, can be set as well. See Storage properties.

Printing and exporting

Click the Print button on the right side of the toolbar.

To save the report to a file, use the Export button. You can choose from PDF, TXT, HTML, RTF and ODT formats in its drop-down menu.
Clicking the button itself initiates an export to PDF.
Additional features
User information overview
Viewing and adding notes

User information overview

If a single network node is selected, the name of the user assigned to the node will appear in place of the Users category in the Sidebar.
Expand it via the [+] button to the right and the user's image, full name and contacts will be displayed:

Clicking on one of the contacts will copy it to clipboard (if it's an email address, the email client will be opened).

The Edit user button activates the Edit / Users mode, where you can edit user information or assign another user to the computer. For more
details on this mode, see Users.

Viewing and adding notes

A text note can be added to each asset.

To do this:

1. Select a single asset;


2. Click the Add note button;
3. Enter text;
4. Press Ctrl + Enter or click the Save button under the input field.

To edit, delete or copy the contents of a note to the clipboard, use the corresponding buttons. You can also initiate note editing by
double-clicking it. An alternative way of deleting a note is by clearing its contents.

Learn to use notes more efficiently, display them next to assets in the Network tree and filter computers by the note contents: abo
ut Storage assistants.

Another way to add a note is via the Network node properties screen.
Another way to add a note is via the Network node properties screen.
Table reports
Working with a built report
Multi-column sorting
Changing the column order and visibility
Searching and filtering
Exporting and copying
Printing

The Table reports mode is activated by clicking the corresponding tab above the main area or by pressing Ctrl + 3. In this mode, you can
build a table report that contains only the information you need.

To build a report:

1. Select one or several assets in the Network tree;


2. Pick one of the report templates from the Sidebar.

To build a report on all computers in the Storage, select the root node of the Network tree.

TNI 3 has a number of standard report templates, but you can create your own template by clicking the New template button on the Sidebar.

A separate editor is used for creating and modifying templates. To learn how to use this tool, see the Creating a template section.

Working with a built report

Multi-column sorting

Beside the regular sorting by way of clicking on a column header, the tables in TNI 3 can be sorted by
many columns at once. Just sort by one column, then click another column header while holding Ctrl. The
arrows in column headers show their sorting directions. The numbers appearing beside the arrows show
the sequence in which the columns sort the report. You can sort by up to nine columns simultaneously.

Changing the column order and visibility

You can change the order of columns by dragging their headers.

You can hide and show columns using the context menu of the column headers.

Searching and filtering

To initiate a search, click the search field at the top of the main area or press Ctrl + F. The search will be performed instantly as you type.

When the Filter checkbox below the search bar is ticked, all fields and groups that do not contain the search string will be hidden.

Use up and down arrow keys to be forwarded to next and previous results of the search.

Exporting and copying

To export or copy the table, use the context menu or buttons to the right of the search field. The report can be exported to text, CSV, HTML,
XLSX.

It's better to export or copy the report in the CSV format if you're planning to import it into the spreadsheet processor.

Printing

To build a printable table report, click Printable reports in the upper right corner of the main area. Printable reports can be exported to text,
PDF, RTF, HTML, ODT.

Printable reports preserve the arrangement, visibility and sorting by columns, as well as line filtering.

Related topics:
Related topics:

Creating a template
Template management
Creating a template
Selecting the object for your report
Selecting fields for the report
Fields of the Asset object
Fields of other objects
Filtering fields by asset types
Complex fields
Searching fields
Modifying selected fields
Adding conditions
Creating expressions
Creating complex expressions

To create a table report template, click the New template button on the Sidebar. The template editor will be opened.

1. Object of report
2. The list of available fields
3. The list of selected fields
4. Condition builder

Every value retrieved by TNI 3 from remote assets can be displayed in a table report.

Selecting the object for your report

Start building the template by selecting one of the report object types.

Each single row of the resulting table report will correspond to a single object of the specified type.

A report can only be built for a single type of object. Selecting a new object will clear the list of selected fields. If you need to
display fields from different types of objects (e.g. operating systems and RAM units), select Asset as the object, since it contains
the fields of all the other objects.
Selecting fields for the report

When you've selected an object of report, its properties will be listed as Available fields.

Click one of the fields to select it. The circle next to its name will turn green, and the field will be added to the Selected fields list.
To delete a field from the template, click the X next to the field's name in the list of Selected fields or click the field in the list of Available
fields once again. The circle will revert to gray.

Fields of the Asset object

This is the main object type, containing all the fields known to the program:

Network node properties: network attributes, date of the latest update, asset type, identification number, etc.;
Data from the main categories: hardware, operating system, installed software, user accounts, etc.;
Other data: custom fields, alert messages, user information.

Fields of other objects

All types of objects except for the Asset belong to a hypothetical asset. Therefore, attributes of the asset containing the object can be
included in the report along with the fields of the object itself. Thus, the list of available fields is divided into two parts.

For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.
For example: you can build a list of monitors along with names and IP-addresses of assets that these monitors are connected to.

Filtering fields by asset types

Different types of assets have different sets of fields.


For example: the Operating system object for Windows-assets contains such specific fields as Service pack, Path to Windows directory, Direct
X version, etc. Linux operating systems don't have these attributes, but they have Core version and Code name instead.

By default, the list of Available fields displays all fields of the chosen object, and icons of all types are highlighted in blue in the filter pane:

Click one of the icons to hide the fields specific to the corresponding type. Another click will display them again.

Complex fields

Some fields consist of several separate values.


For instance, the Image size of a monitor — e.g. "47 cm x 30 cm (22")" — is a combination of its Width, Height, Diagonal.

A complex field can be added as a whole, but you can add its elements independently as well.
To view the elements of a complex field, click the [+] button next to its name:

Searching fields

Type a field name into the search field to only display the matching fields and the groups that contain them.

Modifying selected fields

Each selected field corresponds to a column in the resulting report.

The order of the fields defines the order of the columns. You can reorder them by dragging them with your mouse (first select the field and
then drag it).

To delete a field from the template, click the X next to the field's name in the list of Selected fields or click the field in the list of Available
fields once again.

Click the [+] button to the left of the selected field's name or double-click the field to access its properties:
Title: defines the name of the column. Full names of some fields are too long and inconvenient. You can change them to a more
appropriate and shorter title in this field. Later you can revert the title back to the default by clicking the Restore icon on the right;
Sorting: Use this to automatically sort the column in any direction;
Fix column: A fixed column remains on the screen when you scroll the table horizontally. You may fix any number of columns;
Hide column: hides the column from the report. You may still use values in it for sorting or for filtering using conditions (see below).

When the table report has been built, you can right click its header to hide or reveal columns via the context menu.

Adding conditions

Conditions are used to filter the table rows based on the values from selected columns, or combinations thereof.

To add a condition, you first need to add some fields to the report and then create a simple or complex expression using the Condition
builder.

Creating expressions

To create the first expression, click Add condition.

An expression consists of a field, a type of comparison and, in most cases, a value. To build one, specify all the elements when prompted.

Different kinds of fields will provide different types of comparisons and values. Numeric fields can be compared with numeric values; strings
can be matched against masks or other strings; some values can be selected in the list.

Creating complex expressions

A complex expression is a chain of simple expressions and logical operators: AND, OR, NOT.

To create a complex expression, first create a simple expression as described above. Buttons "And..." and "Or..." will appear below. Select
one to chain in the second expression. A logical group of expressions will be formed.
To add another expression to the existing group, click the small (+) button below. After, click "And..."/"Or..." if you want to make it a part of
a new logical group.

Keep adding expressions until you've built the desired condition.

In the Sidebar, templates with conditions are indicated by a small funnel icon overlay.

Don't forget to name your new template and press OK. The report will be automatically built and the template will appear in the Sidebar, to
be used when needed.
Template management
Using templates built by the other users

Your table templates appear on the Sidebar in Custom templates.

Three buttons appear when you hover over a user template with your mouse:

Edit: opens the template in the editor;


Copy: creates a copy of the template and opens it in the editor;
This option is also available for the standard templates. It makes it easy to create your own template based on an existing one.
Delete.

Using templates built by the other users

TNI 3 stores table templates as files with the .table-template extension in the Templates subfolder of the program's application data folder ("
{Path to Application Data}\Total Network Inventory 3\Templates"). It can be opened automatically by clicking the Open templates folder link
on the Sidebar when in the Table reports mode.
To use a template built by another user, copy its file to the Templates directory. The template will become available in the Table reports mod
e.
Software asset management
The Software asset management (SAM) mode is activated by clicking the Software accounting tab or by pressing Ctrl + 4.

This mode lets you view all the software discovered in your network, browse software installations, track software items, organize them and
build a variety of software-related reports.

The owners of TNI 3 Professional have the ability to store software license data, manage licenses and see detailed reports on the compliance
status of licenses, software items, computers or single software installations.

Related topics:

Getting started
Software management
License management
Reports
Getting started
Creating a database
Importing a database

The software database must be connected to the Storage containing all the hardware assets you plan to involve in the software inventory
process. Open your TNI Storage or create a new one and use the Scanner to fill it.

Switch to the Software accounting tab.

The database has not been created yet, so press the gear button on the Screen selector to switch to the Manage database screen.

Creating a database

Click Update software database, and the process of analyzing each asset in your Storage will start. A list of software will be retrieved from
assets along with the discovered license keys. You only need to do this manually once. Subsequent changes to your Storage will be handled
automatically.

Importing a database

If you've used Software asset management in earlier TNI versions, TNI 3 will detect the old database and prompt you to import data from it.

Click the Start import button. The list of available items will appear.

It contains important information (i.e. tags and license keys). Click Import next to each item that you want imported into the new database.
Software management
To access the Software management screen, click the Software tab on the screen selector:

This screen has all the tools necessary for browsing, searching, filtering, organizing and inspecting software items and separate software
installations.

1. The main software list


2. Software filters
3. Software publishers
4. The Details panel
Related topics:

Browsing, searching and filtering software


Inspecting a software item
Browsing, searching and filtering software
Searching software
Filtering software
The list of publishers
Disabling software filters

The Main software list displays every software item installed in your network.

The following information is displayed in the columns of the list:

Title & version: the name and publisher of each software item, as well as its platform: TNI analyzes both Windows and Mac OS X software. T
ags, comments and tracking status will also be displayed here.

Copies: the number of installations of each software item discovered in your network.

Licensing: compliance status for items that have licenses linked to them. Read about licensing in the License management section.

Searching software

Use the search bar on the top-right of the workspace or press Ctrl + F to activate instant search. Start entering a software item title or a
publisher name to narrow down the list.
Filtering software

Available software filters can be found to the left of the list. To apply one of the filters, click it and select its mode from the menu:

OS filter: to display only the software made for a specific platform;


Licensing filter: to display only the software with a specific compliance status (see License management);
Tracking filter: to bring only the items that are tracked to attention, or only the ones that violate the tracking policy (see Tracking);
Asset filter: to display only the software that’s installed or not installed on one or a group of computers selected in the Network tree;

In the Copies column's cells two numbers are displayed: X/Y, where X is the number of installations on selected computers
and Y is the overall number of installations.

Tag filter: to display only the software with a specific tag (see the Inspecting a software item section to learn about tags);

Saved searches: to save frequently used search terms and quickly apply them to the software list; to add a search term, choose Add fr
om the filter menu.

Choose a title for your saved search and enter the desired term. You can also choose to create a regular expression to find items that
satisfy a complex condition.

Active filters are highlighted in blue. To deactivate a filter, click it and choose No filter from the menu.

The list of publishers

Under the list of filters is the list of publishers. Next to each publisher is the number of software items released by them that are currently
visible in the main list.

The list can be used as a publishers filter. Click a publisher title to narrow down the software list. Click Clear publishers filter to deactivate the
filter.

You can select several publishers with your mouse and/or Ctrl and Shift keys. This could be useful when a single publisher is listed under
several slightly different titles:
Use the search bar above the list to quickly find publishers.

You can pin an important publisher to the top of the list by hovering over an item and clicking the little pin icon to the left of it.

You may use all filters described above in any combination.

An indicator next to the screen selector displays the number of currently visible software items at all times.

Disabling software filters

Whenever a filter is applied to the software list, a filter deactivator appears below the list. All filters can be cleared at once as well.

Filters can also be deactivated from their respective menus.


Inspecting a software item
Tags
Installations
Comments
Additional features

Select one or several software items in the Software list to inspect them in the Details panel.

Tags

Click Add tag in the header of the Details panel to assign a tag to a software item. From the menu, choose one of the available tags or add a
new one. A corresponding tag icon will appear as an indication that the tag has been assigned (it will appear in the software list as well as in
the Details panel).

You may assign an arbitrary number of tags to a software item. You may also assign a tag to multiple software items at once by first
selecting them in the software list.

To remove a tag from the software, click the X on the tag icon.

To delete a tag completely, you have to remove it from all software items that have it. An easy way to achieve this is to use the Tag filter to
select all such items and then remove the tag from all of them at once.

Installations

The Details panel opened in the Installation mode displays a complete list of installations of the selected software and contains the following
information:

Computer where a copy was discovered;


Installation date;
Date of detection by TNI;
Comment: you may add an arbitrary comment to any installation of any software.

The text displayed in the Computer column is the same as in the Network tree. Use the Network tree display menu to change it.

The search bar allows to find installations by computer or by previously added comment.
Click On selected computers and make a selection in the Network tree to narrow down the installations list. Click All installations to clear the
filter.

You can select any number of rows and press Ctrl + C to copy them in plaintext format.

Click Installations summary for a quick printable report on all displayed installations.

Comments

Select Comment in the list of Details panel modes. A text field will appear on the right. You can type arbitrary text in it and it will be attached
to the software item when you switch away.

An icon in the software list indicates the presence of a comment. Hover over it to read the comment. Click it to go to the comment editor.

To delete a comment, simply erase the text.

Additional features

To quickly find out about unfamiliar software, click Google this software on the bottom-left.

If the publisher has specified the software website, the link will be available on the bottom-left.

Related topics:

Tracking software installations


Merging software items
Tracking software installations

Switch to the Tracking mode on the Details panel to access the tracking policy editor.

Tracking is used to mark software as must-have or forbidden on all or only specific computers. Computers that violate the policy are easy to spot
and build reports on. Also, you can easily see the tracking summary for separate software items you choose to track.

By default, a software item is neither must-have nor forbidden: the corresponding lists in the policy editor are empty.

You may specify tracking rules of either kind (or both) by dragging assets or groups from the Network tree into the lists.

The Must-have list contains computers that are obliged to have the software installed on them. If a copy of the software is not found, a
violation is registered.
The Forbidden list contains computers that are prohibited from having the software installed on them. If a copy of the software is found,
a violation is registered.

Immediately after adding computers to a list, you can see all violations at a glance.

You can apply the policy to all computers at once by selecting for all from the drop-down menu in the header of each list.

Click the X next to a computer in the list to stop tracking it. In the for all mode, removing a computer creates an exception: the computer will not
be reported as violating the policy regardless of the situation. To cancel the exception, remove the computer from the exceptions list.

Tracked software items are marked with a crosshair icon that appears to the right of its title in the software list and indicates its tracking status.
You can limit the software list to only tracked at any time by applying the tracking filter.

To see all computers that violate tracking policy for any software item, use the Tracked software storage assistant.

For a quick printable report on tracking status of single software, click Tracking status or Tracking violations to the right of the tracking lists.
Merging software items

Some software items may represent different versions of the same software. Having duplicate records for the same entity is not always
convenient or acceptable (e.g. you can only link a license to a single software item, whereas in reality it could cover all versions of this software).
In most cases, a publisher will fill the software info in such a way that a single item can be recognized with different versions in different
installations. Merging is the tool designed to deal with other situations.

Select all versions of the software in the main list. Use search and filters to find them faster. To make a multiple selection, drag your mouse or
use Shift-clicking and Ctrl-clicking.

In the Details panel, select Merge.

If necessary, enter the title and select the publisher from the drop-down list, check the list of versions again, tick the safety checkbox and click
the Merge selected software button. This is what a merged software looks like in the main list:

This feature is NOT a replacement for groups. Do not merge software by kind, by purpose, by publisher, etc. You can use tags in these
cases. Only use merging for combining different versions of the same software into a single item.

You can later add new items to the merged software in the same way.

To remove an item, switch to the Merged tab and click the X next to the item you want to remove.

Click Unmerge to break up the merger.


License management
The licensing model in TNI
The License management screen

The licensing model in TNI

License is a separate entity within TNI 3.

To keep track of licensed software, create a license, connect it to a software item and assign it to separate installations. You can also set up
rules for each license to use in order to determine compliance status of these installations.

License key is another entity within a license. Creation of license keys allows for easy management, simple visual representation of all
connections and detection of new licensed installations on the fly.

TNI does not provide support for fixed licensing models due to a large variety thereof. What TNI provides instead are the uniform tools that
help to fit the rules of any specific license to most real-life situations.

The License management screen

To access the License management screen, click the Licenses tab of the Screen selector:

This screen provides the tools for creating and managing software license assets, setting up licensing rules and keeping track of the licensing
status of your software.
1. The main list of licenses
2. The list of licensed software
3. The Details panel
Related topics:

Creating a license
Sorting out auto-detected license keys
Licensing software installations
Editing a license
Creating a license

The most common way to create a license is to use the corresponding button under the Screen selector.

A window will appear:

Name the license and use the search field or the list to find the software item to attach the license to, then click Select next to its title. In some
cases, the software will be selected automatically.

Fill in the license properties. The most important are the Keys are mandatory/optional switch and the number of activations.

When the setting is Keys are mandatory, the number of copies that a single key activates needs to be specified. The most common scenarios are:

Several keys, each activating one installation;


One key that activates several installations (a.k.a. Volume License Key, VLK).

However, you're free to create a license with several volume keys or just one single-activation key. Any combination will work.

In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.
In this mode, a software copy is considered non-compliant if it's not assigned a valid key that belongs to its license.

Copy the license keys into the License keys field, each key on a separate line. You will be able to add or remove keys later, either by editing this
list or by manipulating key entities directly.

When the setting is Keys are optional, the total number of activations the license allows needs to be specified. License keys will be ignored. A
software installation is considered non-compliant if the activation limit of the license is exceeded.

In any mode, click the activations field to see the ∞ (infinity) button. By setting the activation number to infinity, an unlimited capacity license is
created.

In any mode, set the activations to 0 to create a pirate license. Use these to track unwanted installations. You may also store known pirate
license keys in them.

You can assign several different licenses to a single software item.


Sorting out auto-detected license keys

TNI will automatically detect licensed installations of certain software along with the corresponding license keys. After switching to the Licenses sc
reen, you may see the following item at the top of the main area:

Click the item to display all detected licensed copies in the Details panel, sorted by software title and keys. From here, you can quickly find the
installations you're interested in and create licenses for them (or select from the existing ones) by selecting from corresponding action menus.

If the same key is detected in several installations, the corresponding row may be expanded to display the list of computers.

Sometimes, identical license keys are found in installations of different software items. This may be an indicator that those items are different
versions of the same software and should be merged. A special case hint will appear: click it and all suspected software items will be selected and
you'll be offered to merge them before creating a common license.

Pressing New license for this software will bring up the license creation window.
Licensing software installations
Assigning licenses to new installations
Managing installations under a license
Managing licensed installations for a software item

Assigning licenses to new installations

Select a license in the main list and go to the Installations page of the Details panel.

For a newly-created license, the list of licensed copies is empty. On the left, click Installations without license to display all unlicensed
installations of the affected software.

Click Add to this license next to each installation that belongs to this license (or select all needed installations and click once). You may also
want to use the Computers & keys search field to find installations.

Managing installations under a license

Select a license in the main list and go to the Installations page of the Details panel. Click Installations under this license on the
left to view the status of licensed copies.

The information on this page depends on the way you've set up the licensing rules. The illustration shows one of the possible cases. You can
see that the first key was used on four computers while the rules only allow for one activation per key. Thus, the remaining three copies are
marked as being Over limit.

Note that TNI considers the first of the four copies to be Compliant. If you know that is incorrect, you can use status switches to change it.
Click the green switch to turn it red: all copies will be Non-compliant, and all the red switches will be unlocked. Now click the switch on the
legit installation to turn it green.

If, for any reason, you want a copy to be considered Non-compliant despite the fact that it does not violate the licensing rules, you can
simply switch it to red and leave it that way. Your decision will affect the overall compliance status of the license and of the software item.

Managing licensed installations for a software item

On the Software screen, select one software item and go to the Licensing page in the Details panel. From here, you can create and manage
licenses, assign installations to them, etc.

If a software item has a license attached, then, by default, all installations are expected to be assigned to it and to comply with its licensing
rules. Any installation not assigned to a license is considered Unlicensed and is displayed as problematic. But there might be instances where
you'd like these to be green. In that case, just tick the Consider compliant checkbox in the header of the Unlicensed group.
you'd like these to be green. In that case, just tick the Consider compliant checkbox in the header of the Unlicensed group.
Editing a license
Editing the license properties
Custom fields
Comments
Deleting a license

Select a license in the main list.

Editing the license properties

Click the Edit license button in the Details panel header to open the License editor window. This window is similar to the License creation win
dow and lets you change the affected software item, modify licensing rules, specify the price, purchase and expiration dates for the license or
edit assigned license keys in text mode.

Custom fields

You can add any information to a license by creating custom fields. In the Details panel, switch to the Custom fields page.

Among other available field types is the File attachment. You may attach any number of files to a license; the files will be copied into your
Storage and archived, available later at any moment by accessing the Custom fields page.

Comments

The Comment page of the Details panel allows you to attach an arbitrary text to a license. This is a convenient place for the EULA in case you
need to store it.

To remove a comment, erase all the text.

Deleting a license

To delete a license, select it in the main list and click Delete license in the Details panel.

Before they're deleted, TNI will ask you if you want to copy the license keys.

License deletion is irreversible. Its rules, license keys, custom fields and attached files will be lost.
Reports
General plain-text/CSV export
Quick reports
Advanced reports

General plain-text/CSV export

Throughout the Software accounting tab, you can select data in any mode and right-click to access the copy/export menu (or press Ct
rl + C):

This results in creating easy-to-process plaintext tables of data. The feature is available in:

the main software list;


the main list of licenses;
the list of software installations;
the list of licensed installations;
the list of new licensed installations and other sections.

Quick Export to XLSX (MS Excel) is available from the copy/export buttons next to the main search bar.

Quick reports

You will find quick report links on most pages in the Details panel:

Use these to build instant reports ready to be printed and exported.

Advanced reports

TNI features a Software report builder for creating advanced customizable reports that cover user-specified items.
See Report builder.
Report builder
Creating a report
Creating templates

To open the Report builder, click the Report builder button in the Sidebar.

The Report builder will be displayed in place of the Details panel.

1. Report type
2. Report description and properties
3. Report content

Creating a report

1. Select a type of report from the list;


2. If a report of the selected type can be customized, do it using the middle panel;
3. In the Report content area, fill each section with items that need to be included in the report by dragging them from the main lists.
You may switch between the Software and Licenses screens while in the Report builder mode.

Click Build report. A print preview will be displayed. You may then print or export it using the buttons on the top right. Available export
formats:

Plain text
Rich text, RTF
PDF
HTML
Open document file, ODF
MS Excel file, XLSX

Creating templates

Click Save as template in the Report description and properties area to add a link to the report to the Sidebar. You can use it later to quickly
build the report.
Change log
The concept
Reading a change log
Log summary, searching, filtering and printing

This mode is activated by clicking the corresponding tab over the main area of TNI's window or by pressing Ctrl + 5.

In this mode, you can choose an asset or a group of assets in the Network tree to see all the changes detected by TNI in their hardware,
software and other parameters over the inventory period.

The concept

Every time an asset is scanned, TNI creates a snapshot of it and places it into the Storage alongside the previous snapshots. You can switch
between various snapshots in the Viewer & reports mode using the date/time box next to the asset name:

You can manage snapshots from the corresponding section of the Edit tab. The auto-deletion policy can be set up in Options / Scanner. By
default, TNI stores up to 10 snapshots per asset and removes the ones that are more than 90 days old (except for the oldest one).

See Snapshots.

In order to build the change log, TNI compares the existing snapshots. The change log is not saved anywhere and is always built on the fly
from available snapshots.

Reading a change log

To build a log, select one or several assets or a group thereof in the Network tree.

TNI displays the result of snapshot comparison in the form of a nested list.

The timeline is divided into Intervals sorted from the most recent to the least recent. Each interval has a starting and ending date and time
from adjacent snapshots. It also shows at a glance how many changes have been detected in this period of time.

Intervals contain Events grouped by object types.

Events represent elements that have been:

Added,

Removed or

Changed.

These are examples of Change log events:


Almost every piece of data within the snapshots is monitored for changes. Still, some kinds of changes in the actual devices may
not be reflected in the log.

Log summary, searching, filtering and printing

Before generating a log, you can change the history depth value to view the changes from a certain number of snapshots, or select specific
objects on the Sidebar to only view the changes for these objects. Decreasing the history depth value or selecting less objects can
significantly increase the speed of generation if you store a large number of snapshots or if a large number of assets is selected.

After the log is generated, the Sidebar displays a full summary of logged changes.

Numbers on the right indicate how many elements of the corresponding type are present in the change log.

To hide all events of a certain type, untick its checkbox.


To hide all events of a certain type, untick its checkbox.

To only view events of a certain object type, hover your mouse cursor over the corresponding type and click the Hide the rest/Show all butto
n on the right. Click it again to quickly reveal the full log.

Use the instant search to narrow the log down: press Ctrl + F or click the search bar at the top and enter a search term.

Click Printable reports next to the search bar to print the change log. The printable version will respect all active filters.
Storage properties
Basic properties
Inventory number generator

The properties of the current Storage can be edited by switching to the Edit mode (Ctrl + 6) and selecting the Storage properties page in the
Sidebar.

Basic properties

A Storage name is its current title displayed in the Network tree, storage summary report and other places.

A Company name and a Company logo can be displayed in the header of a printable report.

To add a logo:

1. Prepare an image (JPEG, BMP or GIF);


It's advisable to have a logo of reasonably good quality and with a white background.
2. Click Add and select the prepared file;
3. Crop unnecessary parts of the image in the editor that appears;
4. Click OK.

Use buttons to the right of the logo to load another image or remove the logo.

Inventory number generator

TNI 3 can generate inventory numbers for the network assets automatically.

The inventory number template may contain arbitrary text and the following macros:

# : unique counter. This number will be unique among inventory numbers built with this template only;
#* : globally unique counter (unique for the Storage);

To add leading zeroes, put several # symbols in a row.


For example, if a template "#" generates "3", then "###" generates "003".

%TYPE% : a short declaration of the device type (WIN, MAC, LINUX etc);
%HOSTNAME% : asset's network name;
%IP% : asset's IP address;
%IP.Х% : values of a particular octet in the IP address (X is a number between 1 and 4).

You can quickly add macros from the macros menu (the button to the right of the template string).

Generate for all generates new inventory numbers using the specified template for all assets in the Storage.

Automatically generate numbers for new assets: if this box is checked, the inventory numbers will be generated for all assets added to the
Storage.

Reset counters: after resetting, the numbers generated and assigned using # and #* templates will start from 1 again.

You can assign arbitrary inventory numbers to assets without using templates or the generator by manually specifying their numbers on the
Network node properties screen.
Network node properties
Network properties
Asset properties
Inventory number

To edit the properties of the selected network node, switch to the Edit mode (Ctrl + 6) and select Properties on the Sidebar.

To save the changes that were made on this page, you can do the following:

1. Click Apply changes at the top of the page (you can also discard unsaved changes by clicking Undo);

These buttons will only show up if any changes were made.


2. Select other assets in the Network tree;
3. Leave the page (for example, by switching to a different mode).

You can edit the properties of several assets at the same time by selecting several network nodes or a group of nodes in the Network tree.

Be careful when editing the properties for several nodes at the same time. It's impossible to revert to the previous state
automatically after applying the changes. Recovering lost data may take a lot of time.

A handy way of editing several network nodes in succession is by using hotkeys for selecting the next or previous network node: Al
t + Up/Down arrow. The changes are applied automatically in this case.

Network properties

You can change the network node name and IP address here.

Click one of the Resolve buttons to get the network name by IP address or vice versa.

Check the Static IP address box to access the asset by its IP address. Otherwise, the network name will be used for the access.

Asset properties

Device type determines the asset's icon in the Network tree and can be included in the table report.

Virtual type specifies the virtualization platform. Its icon will be included in the reports and displayed next to the node name in the Network
tree. Specifying any value other than Physical device marks the asset as virtual.

You can hide all the virtual assets in the Network tree or, conversely, display only the virtual assets. There is a special assistant for
this.

Usually, you won't need to set the virtual type manually. TNI 3 automatically detects popular virtualization platforms.

An alias is an arbitrary computer name. It can be displayed in the Network tree instead of the actual network name or used in the reports.

Description is the computer description obtained from the system properties of the asset.

A Note is a comment left by user. There's a special assistant that works with notes. Notes can be added or edited in the Common reports mo
de.

For more details, see Viewing and adding notes, Note contents assistant.

Inventory number

The items in this section work in the same way as in Storage properties.

The Generate button creates an inventory number using the specified template.

Arbitrary text can be entered into the Inventory number field without the use of the generator when a single asset is selected.
You can set up the template for automatic assignment of inventory numbers to new assets in the Storage properties.

Inventory numbers can be displayed in the Network tree as an additional field or in place of node names. They can be searched
and filtered as well. For more details, see Information display settings and Searching in the Network tree sections.
Alerts
List of alerts
Disk space alert
Antivirus problems
Firewall problems
Auto-update status
Service Pack is out of date
Track software presence / absence
Using alerts

Alerts in TNI 3 are used to discover problems with the assets.

List of alerts

Disk space alert

One or more logical partitions on the asset are low on free space.

In the alert settings, you can specify the threshold for the disk space alert in gigabytes or as a percentage of the total disk space.

Antivirus problems

Antivirus software is not found or disabled, or its database is out of date.

Firewall problems

Firewall is not found or disabled.

Auto-update status

Auto-update is disabled.

Service Pack is out of date

...or not installed at all.

Track software presence / absence

Shows the list of tracked software.

Software tracking can be managed from the Software accounting mode.

Using alerts

The Alerts page in the Settings window allows to disable each of the alert types and specify additional settings for the disk space alert.

Alerts can be viewed in the Common reports mode:

Group summary contains a complete list of alerts for the computers in the group. All alerts in the Storage can be viewed in the
summary for the root group.
The Alerts category in the report on selected assets displays all alerts for the selected asset or assets. The number of alerts for the
selected assets is displayed to the right of the category in the Sidebar. The shortcut to the Alert settings becomes available when you
hover a mouse cursor over the category.

Alert messages can be included in the Table report when creating a custom template.

The Alerts presence assistant displays the number of alerts in the Network tree and allows to view a list of alerts for each asset in a hint, as
well as to hide all the devices that don't have any alerts.
When building a report on alerts, use this assistant to hide assets that don't have any alerts.
Snapshots
Viewing snapshot contents
Snapshot auto-deletion policy
Deleting snapshots manually

A new configuration snapshot is created following each successful scan. Each snapshot contains information about the state of hardware and
software on the asset at the moment of scanning.

Viewing snapshot contents

Information collected at different times can be viewed in the Common reports mode. Use the snapshot list at the top of the main area to
browse different snapshots.

The other modes display information from the newest snapshot.

Snapshot auto-deletion policy

Generally, any number of snapshots can be stored for each asset.

In the Scanner settings, you can do the following:

Limit the number of stored snapshots: old snapshots will be deleted when the new ones are created;
Specify maximum snapshot age: all snapshots older than the specified number of days will be automatically deleted.

The newest snapshot will never be automatically deleted. You can also make the oldest snapshot exempt from automatic deletion.

Deleting snapshots manually

To manage snapshots, switch to the Edit mode (Ctrl + 6) and select the Snapshots page.

Snapshots in the main area can be grouped in two different ways: by assets or by date. To switch between them, click one of the buttons at
the top of the main area. Click the same button again to reverse the sorting order.

When hovering the mouse cursor over an asset, date or snapshot, a little arrow button appears. Click it to display the pop-up menu for deleti
ng snapshots.

When hovering over the menu commands, the snapshots to be deleted are highlighted red.
Custom fields
Managing custom fields
Custom fields in the reports

Custom fields are additional pieces of data that can be attached to individual assets in the Storage. Any custom field consists of a field name
and its value. Values can contain arbitrary information of different type: text, numbers, prices or dates.

Managing custom fields

To manage custom fields, switch to the Edit mode (Ctrl + 6) and select one of the two pages in the Custom fields category:

Common fields: fields created here will be shared by all the assets in the Storage (each asset has its own value);
Special fields: fields for the asset(s) selected in the Network tree.

To create a new field or a folder for fields, click Add.

If you hover the mouse cursor over any field or folder of fields, the X button to delete the item appears on the right.

To rename a field or folder, double-click its name.

You can change the order of fields and folders, as well as move items between groups, by dragging them using the mouse. Folders can be
nested infinitely, but are available for common fields only.

You can select several nodes in the Network tree to change the values of their common field(s) simultaneously. If multiple nodes are selected
and their values for the same common field are different, a Different values label will appear in place of the value. To replace these values
with the same value, click this label and set a new, common value. The same is applicable to Special fields if the field name is the same for
the selected assets.

Custom fields in the reports

In Common reports, you can include all the custom fields in a report by selecting the Custom information category.

You can also add any individual common field as a table report column when creating a custom template.
Logins
Management of Storage logins
Assigning logins to network nodes

A login in TNI is a set containing a username and a password (or a community string for SNMP), which are used to access remote assets
during scanning.

Management of Storage logins


Each TNI 3 Storage may contain a set of logins for all 5 protocols: Windows, SSH, SNMP, Telnet, VMWare.

To display it, switch to the Edit mode (Ctrl + 6) and click All logins on the Sidebar.

By default, there are only two standard logins in this set:

Current user: login of the Windows user running TNI 3;


public: public SNMP community.

The standard logins cannot be changed or deleted.

To create a new login for one of the protocols, click the Add button below that protocol's list.

When adding a new login, an alias should also be specified along with the username and password (or community string for SNMP). An alias
is a unique identifier that will be used when working with a particular login in TNI 3. Aliases enable adding logins with the same usernames.

The added login is displayed in its protocol's list.

To edit a username or password, click on its field in the list. To change an alias, double-click it.
You can specify the default login for each protocol by clicking the option button to the left of it. This login will be used when scanning assets
for which no logins have been specified explicitly.

Logins can be added and edited in the Scanner mode right before scanning. For details, see the Managing added tasks - Setting
logins section.

Assigning logins to network nodes


If a network node is always scanned with the same login, it can be assigned to it.

To do this, select the asset in the Network tree, switch to the Edit mode (Ctrl + 6) and click Logins on the Sidebar.

All logins for the protocol that can be used to scan the selected asset will be shown. To assign one of them to the asset, click the small chain
icon to the left of the alias. The linked chain icon and blue highlighting indicate that this login is assigned to the selected asset.

Any login can be assigned to several network nodes at once. To do this, select the nodes or their group in the Network tree and select the
assigned login in the list.

When remote assets are scanned for the first time, logins that successfully provided access are automatically assigned to them.
Users
Viewing and editing users
Adding, deleting and renaming users
Editing user information
Searching users
Assigning users to assets
Displaying information about assigned users

TNI 3 allows to store information about your network users: their photos, names, addresses, contact information etc.

During the network scan, this information can be automatically obtained from Active Directory entities and user account settings on network
computers. Furthermore, you can create a new user record manually.

Viewing and editing users


The information about users which has been extracted from a domain or created manually is stored in the currently opened Storage. If a user
is created based on a local user account, its information will be stored in the inventory file of the asset where it has been found.

To manage users, switch to the Edit mode (Ctrl + 6) and select the Users page from the Sidebar.

The user list will show up on the left side of the main area, with the information about the selected user on the right side. The user list is
divided into categories by type: Domain users, Local users and Added manually.

The users of the currently selected asset are displayed in the Local users category. This category is hidden if multiple assets are selected.

Adding, deleting and renaming users

To create a new user, click Add (+) over the user list and enter the username.

To delete a user, click the X to the right of the username in the list. To rename a user, double-click the username in the list.

Only manually added users can be deleted or renamed.

Editing user information

After selecting a user in the list, you can see related information to the right: a photo, personal and contact info and addresses. This
information can be edited.

You can upload an avatar or a photo here. To upload an image, click Add in the Photo group and browse to a JPEG, BMP, GIF or PNG file. In
the next window, select the square area of any size in the image and click Done.

Searching users

To find a user in the list, enter the keyword in the Find users field. The list will be filtered as you type, highlighting the text that matches the

query.
query.

The search will be performed not only in user names but in all other information fields (e.g. phone numbers, e-mail addresses and
notes). After the search, when one of the users is selected, the matching text will be highlighted in the information area.

Assigning users to assets


Each asset in the Storage can be assigned to a single user. Each network asset is by default assigned to the local user that was logged into
the system during its first scan.

Any asset can be assigned one of its local users, any domain user, or any manually added user. Assigning a local asset user to another asset
is not allowed.

To assign a user to an asset or several assets, select them in the Network tree and click the small chain icon next to the assigned user.

The linked chain indicates the assigned user.

Displaying information about assigned users

Information about the assigned user can be viewed in the Common reports mode (category Users). Furthermore, the photo, full name and
contact info of the user assigned to the selected asset can be displayed in the Sidebar.

Any user information field can be added as a column in the Table report (see the Creating a template section).
Options
General
Scanner
Reports
Alerts
Auto-import
Logon script
Scan scheduler
Actions
SNMP
Resident agent

The Options window can be opened by clicking the corresponding button in the right part of the main menu bar.

General

Check the online status of assets periodically: automatic pinging of network nodes every few seconds can be disabled.

Scanner

Settings that control the scanner's behavior and the snapshot auto-deletion policy.

Reports

Here, the settings for printable reports are presented.

The company title and logo printed into the header are part of the Storage properties.

Alerts

On this page, you can enable, disable and set up the individual alerts.

More on alerts.

Auto-import

periodically updated re
The settings for automatic data import are available here. It may be used to import logon script scan results or
sults of external network scans in cases where no access to these networks is available from the current
location. This page allows you to set up automatic import of data when the program starts or at regular
intervals.

More on data import.

Logon script

This page serves as a tool for exporting the standalone scanner and for generating a command line for the Logon script scan.

Scan scheduler

Settings that control the scheduler, a list of scheduled scan tasks and their configuration tools are available here.

See Scan scheduler.

Actions

Choose the way in which the Action list (available from the Network tree context menus) behaves and access the editable custom actions file.
Also, here you'll find a summary of all templates and keywords of the action definition syntax: click to copy or hover with your mouse to view
a hint.

See Actions.
SNMP

Enable or disable the full SNMP scan from this page. This mode allows to collect complete SNMP information from SNMP-enabled devices (i.e.
perform an SNMPWalk). When this mode is disabled, only some basic information from the system and interfaces sections is collected.

Also, you can add MIB files from your equipment vendors on this page. When an appropriate MIB file is added, you will be able to see
meaningful names for values instead of OIDs when viewing the information in the SNMP tree section. TNI supports automatic downloading of
missing dependency MIBs from a couple of online MIB databases.

Resident agent

Configure the resident agent for deployment to remote Windows computers or export it for manual installation from this page.
More about the Resident agent here.

S-ar putea să vă placă și