?
Solved

Finding user by computer serial number

Posted on 2011-09-13
5
Medium Priority
?
333 Views
Last Modified: 2013-12-07
Hi ,

My guys have receive this order for a PC for a user and I updated in my inventory database base on serial number of the PC. But months later, 1 of my guy spotted the user still with the old PC.
I have search practically everywhere for the the particular PC base on the serial number.
Is there a freeware that I can quietly search for that particular serial number on the network without alarming any other department.  Or is there a script where I can run on my PC  and search the serial number. I wish to find the PC out before the audit comes and I do not wish to escalate the problem to higher management.

thanks for your help
0
Comment
Question by:huhuman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 36528077
I found there is bug in the code provided in the above url. so i made required corrections and attached here. please download and rename it to vbs and execute. this should help.

users.txt
0
 

Author Comment

by:huhuman
ID: 36528100
H Shasunder,

I had written similar script before, but the script that I wrote requires me to broadcast to all the users in my email. and each individual user to execute the script on their computer.  Is there a way I can "secretly" sniff their computer detail's without them acknowledgement? As I have over 500 users over here, and I had did 1 round of major broadcasting of the emails before the arrival of this lost PC.

Thanks alot.
0
 
LVL 17

Accepted Solution

by:
Shanmuga Sundaram earned 2000 total points
ID: 36528466
have you used this tool
0
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 36528476
since i believe this also will help.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this article, we’ll look at how to deploy ProxySQL.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month9 days, 20 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question