Network Inventory Advisor is a program that scans your local network and helps to assemble an inventory of all computers with programs installed on each. It may represent a powerful tool to aid in internal audits of a company, keeping track of hardware and software purchased.
Basically it can be used to detect network specific information that is available to it. A good example of using this type of tool is for mapping a network and security audit or creating an inventory of it.
Interface and operation
The purpose of the program is to collect information about the machines that are on the network instead of getting traffic data arising therein. The program interface is composed similarly to new versions of Microsoft Office suite, tabbed and internal divisions to separate features.
On the main screen, you can view general information about the goods, software, hardware and system alerts, all in separate tabs. The tab “Summary” shows all elements found with the amount of them online, offline, new items and which network they were recognized.
The following tabs, “All software” and “All hardware” take care to show all programs and components, respectively. “All alerts” shows messages displayed by the application corresponding to events on the computer. Due to these characteristics, it can be used for managing updates, availability of a given service or monitoring.
On the toolbar, it has many functions in shape, how to schedule the scan, manage goods, export agent for manual scan, import information from manual process, sweeping the net, just scan the local computer, view reports, among other . On the “Reports” are available all reports that can be generated by the program.
Audit network is not always a simple task, especially if you do not choose to do it using a program. Network Inventory Advisor is an efficient way to automate the collection of information related assets of an enterprise, reaching across the network and installed machines.
Additionally, the characteristics of results, including the names of the programs installed, the application can also be useful in helping trace malware that may be on the network. It works correctly within the limitations of trial version, locating at the most 25 assets.
Although the developer of this program tries to do everything possible so that it is easy to use, even for beginners, it is not so simple. No doubt the GUI assists, but still it takes a little time to understand exactly how to perform the verification provided by the application, especially for those with little knowledge of the English language.