icon-bg
icon-bg
icon-bg

Blog

On July 6 and 7, patches were released by Microsoft for all current versions of Windows after a critical vulnerability has been discovered with its Print Spooler service. Microsoft has also released the patch for Windows 7 which ended full support last year but remains in extended support. The vulnerability, dubbed PrintNightmare, allows attackers to remotely execute commands with system-level privileges.

Total Network Inventory will help you quickly discover which computers on your network are already patched. For example, here’s the situation for KB5004945 and KB5004954:

To be able to collect this information, the Windows updates scan must …

Hello, friends!

Do you remember our pre-summer post about the new SAM features? Well, that was just the first stage. Get ready to see the final version of the Software accounting and Licenses tabs!

We admit that the interface of Software accounting used to scare away rather than amaze with its functionality. When you first opened the tab, you experienced something similar to the experience of an airplane passenger who was put in the pilot’s seat and asked to sort out the controls. Now everything looks completely different.

All the data in a single report

One long-requested feature was the …

Hey, Hi, and Hello to all who reads our blog! Without further ado, let’s cover the features we’ve prepared for you this time.

Collecting of information about the installed Microsoft Store apps

We noticed that the popularity of MS Store apps has been growing every month. So we’ve taught TNI to collect this information and display all the apps in a separate category:

Detecting TPM Chips and BitLocker Drive Encryption Status

The TPM Chips and BitLocker Drive Encryption Status can no longer hide from our scanner. You will find the key information about the chip under the “System” category in …

Not everyone knows and uses such a killer feature of Total Network Inventory as table conditions, so today we would like to remind you about it and provide some usage examples, so you can see how it can make your work much easier. First one is simple: imagine that you need a list of computers with less than 10GB free space left on the C drive before installing some huge OS update or a new software product. This can be achieved rather quickly: Open the Table reports tab, copy the existing Logical disks template or create a similar one.…

Part 2: “Filters”.

And we are continuing our series of tutorials. As we promised, today we’re going to describe the most popular filters and advise how to apply them best. All filters are located right under the “Software” and “Licenses” tabs and have the following form: While filters are not enabled, the main list will display all of the software from all scanned workstations. Use “Asset filter” to display a list of software on specific workstations. Select a device, several devices (make sure that the “Multiple selection” box is checked) or a group in the network tree to…
Usually, when someone visits the “Software accounting” tab for the first time, he just doesn’t know from where to start. Well, software and license accounting in networks has never been too easy. We decided to release a series of blog posts for those who have just begun to use this module or avoided using it for some reason. We are going to advise you from where to start and what kind of information may prove to be most useful.

Part 1: “Getting Started”.

First, you need to pay attention to the menu in the upper left corner. This is where…