Print reports on product and serial numbers, operating systems, etc. As far as reports go, 10-Strike Network Inventory Explorer offers you the possibility to generate a very large number of them.
How to install the program: Download the program using the above links. All found computers and switches are placed on a diagram. Now you can import computers and organization structure from AD. Updated the agent files to the v5.6. Â * 5.5 * August 2013 – Added gathering data on local administrators (accounts and groups). – Added a report on local administrators. – Added exporting the “Unauthorized software”, “Denied software” data groups to a database. – Made the Excel and RTF reports easier for editing. – Fixed some bugs. Â * 5.42 * July 2013 – Added some changes for exporting data to Oracle databases. – Enhanced the client logging. Â * 5.41 * June 2013 – Updated the client files to the v5.41. We offer another network scanning and diagramming program (it’s cheaper because it does not have the monitoring functions): – It has more advanced graphics engine, vector device icons, and better visual quality.
In previous versions, the database was stored in the program files (Program Files10-Strike Network Inventory Explorercfg). Now you can configure accounts for accessing the web interface. – Added importing computer network addresses from a text file. – Added the antivirus version detection for Windows Vista and newer OS. – Fixed some bugs in the scheduled gata gathering (the automatic inventory monitoring function). – Updated the agent files to the v4.1. – Updated the client files to the v4.1. Â * 4.0 * December 2010 – Added the web interface which allows you to access the inventory database remotely and watch the list of computers and their inventory data. – Added ability to watch the file system structure on remote computers. – Added ability to watch the registry on remote computers. – Added auditing computers for software allowed only for some computers in the License Manager. – Added the client data file importing via e-mail and FTP. Â * 3.9 * October 2010 – Added new reports on software: “Authorized software”, “Authorized, denied, unknown software”, “Unknown software (detailed)”, “Denied software (detailed)”. – Added detecting SATA CD/DVD drives. – Added selecting multiple groups in the group editor. – Added the following data groups to the report designer: “Authorized software”, “Denied software”, “Unknown software”. – Updated the agent files to the v3.9. – Updated the client files to the v3.9. Â * 3.83 * October 2010 – Fixed the “Invalid filename” error on the program start. Â * 3.82 * September 2010 – Fixed collecting the mapped drives information. – Updated the agent files to the v3.8. – Updated the client files to the v3.83. Â * 3.81 * September 2010 – Updated the client files to the v3.82. Â * 3.8 * September 2010 – Changed the group selection logics. We take your privacy seriously and use the SSL encryption to process all orders.