Solved

Finding user by computer serial number

Posted on 2011-09-13
5
330 Views
Last Modified: 2013-12-07
Hi ,

My guys have receive this order for a PC for a user and I updated in my inventory database base on serial number of the PC. But months later, 1 of my guy spotted the user still with the old PC.
I have search practically everywhere for the the particular PC base on the serial number.
Is there a freeware that I can quietly search for that particular serial number on the network without alarming any other department.  Or is there a script where I can run on my PC  and search the serial number. I wish to find the PC out before the audit comes and I do not wish to escalate the problem to higher management.

thanks for your help
0
Comment
Question by:huhuman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 36528077
I found there is bug in the code provided in the above url. so i made required corrections and attached here. please download and rename it to vbs and execute. this should help.

users.txt
0
 

Author Comment

by:huhuman
ID: 36528100
H Shasunder,

I had written similar script before, but the script that I wrote requires me to broadcast to all the users in my email. and each individual user to execute the script on their computer.  Is there a way I can "secretly" sniff their computer detail's without them acknowledgement? As I have over 500 users over here, and I had did 1 round of major broadcasting of the emails before the arrival of this lost PC.

Thanks alot.
0
 
LVL 17

Accepted Solution

by:
Shanmuga Sundaram earned 500 total points
ID: 36528466
have you used this tool
0
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 36528476
since i believe this also will help.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question