Ga naar hoofdinhoud

Windows Inventory

Windows Inventory Event Monitor

The Windows Inventory Event Monitor collects inventory data for your Windows devices.

notitie

Overview

The Windows Inventory Event Monitor scans the systems you select and collects or refreshes inventory data for each of them. Inventory data includes the number of CPU cores, their frequencies, lists of partitions, installed RAM, installed applications, installed packages and more. This information is made available on the Inventory tab of each of your network devices and in the inventory reports.

The event monitor works automatically by connecting to your network devices using the credentials that you select and gathering inventory data so it has very few required settings.

info

Use Cases

  • Automatically collecting Windows inventory data
  • Populating the inventory tab for Windows devices

Monitoring Options

This event monitor provides the following options:

  • Don't warn if the device cannot be contacted: Select this option to tell the event monitor not to warn if it can't contact a selected network device. It's usually a good idea to enable this option because your monitoring configuration will likely have another event monitor to warn if systems are down. If a system is down, its inventory data can be refreshed on the next run.
  • Alert with [Info/Warning/Error/Critical] if the detected applications list has changed since the last run: Use this option to receive an alert about any change to the list of detected applications compared to the last run.
    • Applications to ignore: Enter a comma-separated list of the full or partial names of applications to exclude from this monitoring option.
  • Alert with [Info/Warning/Error/Critical] if the detected applications changed versions since the last run: Enable this option to receive an alert if any detected application changed its version since the last run.
    • Applications to ignore: Enter a comma-separated list of the full or partial names of applications to exclude from this monitoring option.

Authentication and Security

The account used for authentication must have permission to search the registry and have access to the keys and values being monitored.

Protocols

Data Points

  • This event monitor does not generate any data points.

Sample Ouput

Sample Output