(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
: to our best knowledge this download comes from a website that is safe
(the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an antivirus
on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly report us problems with detail (click here to report)
, if any.
Inventory network computers, create the computer asset database. Watch and track hardware and software installed on your network computers, monitor changes and get email notifications on them. Generate professional-looking reports on hardware and software. Find out which processors are running in network computers, how much memory is installed, which HDD and DVD drives are used. Print reports on product and serial numbers, operating systems, etc.
(Network Inventory: monitor hardware and software installed on network computers
The program scans hardware and software configuration of your network computers and builds the computer asset database. Generate professional-looking reports on hardware and software installed on the network computers. Watch, log, and track changes in the computer hardware and software. Monitor the computer health (remote HDD S.M.A.R.T., antivirus database, and free disk space monitoring). Be notified via email about the critical events and failures.
View the remote computers' hardware configuration. Find out which processors are used in network computers, how much memory is installed, which HDD models and DVD drives are used. Create reports and plan upgrades.
Audit software installed on the remote computers. Get information on the installed applications (including information on operating system type, installed hotfixes, and programs included in the startup folder). Monitor and audit licenses and serial numbers. Find the unauthorized software installed.
Generate advanced cool-looking reports and save them in the PDF, RTF, XLS, XML, HTML, CSV, Open Document, JPG, GIF, BMP, and text file formats.
network program, inventory program, asset program, report program, computer program, hardware program