Systemwalker Desktop Patrol User's Guide - Microsoft(R) Windows (R) - |
Contents Index |
Chapter 3 Systemwalker Desktop Patrol Functions | > 3.1 Asset Management Function |
Inventory information can be collected in two modes:
Installing "Systemwalker Desktop Patrol CT" on the client machine allows automatic collection of the latest information and this information is populated in the database presenting a true picture of IT assets.
"Systemwalker Desktop Patrol CT" transfers the collected inventory information to the connection server in accordance with the client policies established in the "Desktop Patrol Main Menu" or the "MC Window". Inventory information collected on the "Systemwalker Desktop Patrol CT" is ultimately transferred to the highest-order "Systemwalker Desktop Patrol CS" and populated in the database.
To perform inventory collection on a PC disconnected from network or on a network which is really slow, the command mode is used.
The command mode allows collection of inventory information, even if the Systemwalker Desktop Patrol CT is not installed on that PC from which information is being collected.
The following two command modes are available:
By executing this command, inventory information is collected and an inventory information file ("User ID + PC name") is created in the current directory. Inventory information can be captured by storing the created file in the specified directory of the "Systemwalker Desktop Patrol CS" or the "Systemwalker Desktop Patrol DS".
Using this command, inventory information can be collected and inventory information file ("User ID + PC name") will be sent to "Systemwalker Desktop Patrol CS" or "Systemwalker Desktop Patrol DS" by email.
The information collected with different collection methods is different. The information can be collected is shown as follows.
Collection Information |
How to Collect |
|
Agent Mode |
Command Mode |
|
Hardware information |
||
Software information |
||
Unapplied Patches Information |
||
Software operation status |
||
Application log file collection |
||
Security audit information: |
||
Security audit information: |
||
Security audit information: |
: Can be collected : Cannot be collected
Contents Index |