Solved

A Handy Utility

Posted on 2013-01-10
2
257 Views
Last Modified: 2013-01-10
Hi,

Does anyone know a piece of software that can gather the staff's pc information, such as IP/MAC address, what software is running on that pc....?

Thanks a lot!
0
Comment
Question by:lgallion
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Accepted Solution

by:
Thomas Grassi earned 500 total points
ID: 38762938
I use this one Network Inventory Advisor

http://www.clearapps.com/

Works great scans all nodes on network can be scheduled to do so.

Gives you reports txt spreadsheets

Check it out.
0
 

Author Comment

by:lgallion
ID: 38762945
Thanks a lot! I will downloand and give a try!
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Scan Mac for security breach? 5 82
Windows Security Pop-Up 7 71
Using GMail for Scanning 5 46
Powershell 3.0 - Add Group/Username and Enable Full Control permissions 2 36
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question