Solved

asset tags - importance

Posted on 2017-03-14
3
54 Views
Last Modified: 2017-03-16
can anyone elaborate on why asset tagging of laptops and desktops is so key to both asset management and desktop support. I have noticed a number of our devices (especially the older ones) the tag has either fallen off, or in some cases the engineer forgot the assign the label before it was issued. Realistically though what is the risk with this to a company? all devices obviously have a hostname that appears in AD etc  If management said we arent going to asset tag any end user devices, e,g desktop/laptop, where is the ultimate risk in such an approach? I am struggling to see the overall benefits in asset tagging and risks in not doing so?
0
Comment
Question by:pma111
3 Comments
 
LVL 16

Assisted Solution

by:John Tsioumpris
John Tsioumpris earned 125 total points
ID: 42047416
Asset tagging is used to track the useful lifespan of  a device from the date it got purchased to the day it went to recycle...
0
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 125 total points
ID: 42047598
The asset tag just makes life easier when doing inventory, equipment counts, finding a specific machine or figuring out who is assigned a  specific machine.  

The only other way is serial numbers which are never easy to find/read.  Asset tags, on the other hand, are usually in an easy to read location.

Then again, I may be misunderstanding the question.
0
 
LVL 12

Accepted Solution

by:
Natty Greg earned 250 total points
ID: 42048194
You do it for the following reasons

1.Asset Tracking/inventory
2.Remote access
3.who has what Device/configuration
4.Easy follow through on service life
5.With multi sites you'd assign certain asset tag to that site

where I used to work, we'd call tech support they would ask for asset tag, once we tell them they were inside our computer like magic

Not doing so is headache of manual tracking and writing down serial numbers of the who, have what device, and asset tags and serials can be found in the bios menu
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question