Learn how to a build a cloud-first strategyRegister Now

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 247
  • Last Modified:

Network - Detecting who connects

Hello all.
We have a wireless infrastructure that we set up with two wireless networks.  A private (wpa) that has access to internal servers/computers, and a public (open) for just internet usage.  The WSS has access rules preventing guest ip range from accessing anything internal.

The connection out is filtered on both with reporting, but only IP reporting.  Is there software/scripts/etc that can be set up to record when someone queries DHCP or connects to the wireless that it will record information about that computer,  hostname/make/model of motherboard/etc?
1 Solution
I'm not sure exactly how you would automate it, but PSTools is a wonderful (free) suite of utilities containing a program called PSInfo.  This will give you hardware and software information for networked computers, and you can specify IP ranges for it to search through.

I have it set up via batch file to scan my whole IP range and dump the information into a text file, which I use to maintain my inventory.  You could schedule this to run at a regular interval, or if you figured out a way to trigger it on a DHCP event, possibly using IPSentry, you might be able to have it run for new connections.  

PSTools is a great collection, I use the various programs for at least a dozen tasks, and you can get it free from, brace yourself because you won't believe this, MICROSOFT!!!  For FREE!!!  It's a Christmas Miracle!!!  If you find a way to automate the data collection, let me know, I would be incredibly interested.
Kamran ArshadCommented:

You can checkout Spiceworks;

mubhcaeb78Author Commented:
We currently run spiceworks, but cannot see how to trigger it to scan when a new device connects.
With network health scan enabled at 5 minutes it throws an error trying to scan every 5 mins, so now its every half hour, and that is too long between, especially given the duration of the scanning it takes to go from start-finish.

Doesn't spiceworks also needs credentials to gather most of the information about the device?

It is great when you feed it the admin password of the computers though for sure.

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now