The following two modes can be used to collect the Inventory information.
Agent mode
This method is not realized by the user and causes no burden.
It also can collect the information about software execution status.
Command mode
Information can be collected via the external medium, e.g. USB memory.
Information collection can be realized via the sending command of E-mail attachment (the command automatically operating from collection of Inventory information till E-mail sending).
Agent mode
Automatic collection of latest information and construction of PC information database can be realized through installation of CT in the PC.
According to the Client policy set in the main menu, CT collects Inventory information and sends it to the connected server. Inventory information collected by CTs will be finally transmitted to the highest-level CS and registered in the CS database.
Command mode
Command mode can be applied to collect Inventory information on such situations as network disconnection between PC and Master, and the slower network.
Command mode can be applied to collect Inventory information even if CT is not installed.
Command mode is classified as the following two types:
After executing the command, collect Inventory information, and create the Inventory file ("User ID + PC Name") in the present directory. Inventory information can be obtained via saving the created file to the specified directory of CS or DS.
Collect Inventory information and send the Inventory information file ("User ID + PC Name") to CS or DS via the E-mail.
Collection items
Collection information is variable with different collection methods. Collectable information is shown in the following table.
Collect Information | Collectable | |
---|---|---|
Agent Mode | Command Mode | |
Basic Information (OS Information, Hardware Information) | Y | Y |
Software Information | Y | Y |
Anti-Virus Software | Y | Y |
Product Information | Y | Y |
User Information | Y | Y |
EXE Information | Y | Y |
Registry Information | Y | Y |
Unapplied Patch Information | Y | Y |
Security Information: | Y | Y |
Security Information: | Y | N |
Power saving auditing information: | Y | Y |
Power saving auditing information: | Y | N |
Software Operation Status | Y | N |
Files Collection | Y | N |
Simple operation logs | Y | N |