icon-bg
icon-bg
icon-bg

Blog

IT administrators play an indispensable role in managing the technology basis and digital infrastructure enabling modern enterprises to function smoothly. To excel at meeting the multifaceted responsibilities that come with securing complex corporate IT environments and supporting numerous end users, the staff needs to be equipped with specialized software tools. This article highlights the essential software for network administrators, providing them with the tools necessary to meet the demands of their critical role.

The Importance of IT Administrators in Modern Corporate Structures

In the modern digital world, robust and seamless technology infrastructure is crucial for maintaining business operations. From cloud …

Educational institutions contain volumes of sensitive personal data making them prime targets for cybercriminals seeking to steal valuable information. Advanced monitoring software for schools and universities can better defend their infrastructure through centralized visibility, rapid threat detection, and automated protections. This article explores escalating risks in educational organizations and how the right tools can enable robust cybersecurity even with limited IT resources.

Cybersecurity Threats in the Educational Sector

The educational sector, with its vast repositories of personal and research data, has become a prime target for cybercriminals. The variety and frequency of these cyber threats have escalated, demanding a robust …

Hello, friends!

Do you remember our pre-summer post about the new SAM features? Well, that was just the first stage. Get ready to see the final version of the Software accounting and Licenses tabs!

We admit that the interface of Software accounting used to scare away rather than amaze with its functionality. When you first opened the tab, you experienced something similar to the experience of an airplane passenger who was put in the pilot’s seat and asked to sort out the controls. Now everything looks completely different.

All the data in a single report

One long-requested feature was the …

Hey, Hi, and Hello to all who reads our blog! Without further ado, let’s cover the features we’ve prepared for you this time.

Collecting of information about the installed Microsoft Store apps

We noticed that the popularity of MS Store apps has been growing every month. So we’ve taught TNI to collect this information and display all the apps in a separate category:

Detecting TPM Chips and BitLocker Drive Encryption Status

The TPM Chips and BitLocker Drive Encryption Status can no longer hide from our scanner. You will find the key information about the chip under the “System” category in …

Not everyone knows and uses such a killer feature of Total Network Inventory as table conditions, so today we would like to remind you about it and provide some usage examples, so you can see how it can make your work much easier.

First one is simple: imagine that you need a list of computers with less than 10GB free space left on the C drive before installing some huge OS update or a new software product. This can be achieved rather quickly:
Open the Table reports tab, copy the existing Logical disks template or create a similar one. …

Part 2: “Filters”.

And we are continuing our series of tutorials. As we promised, today we’re going to describe the most popular filters and advise how to apply them best.

All filters are located right under the “Software” and “Licenses” tabs and have the following form:

While filters are not enabled, the main list will display all of the software from all scanned workstations.

Use “Asset filter” to display a list of software on specific workstations. Select a device, several devices (make sure that the “Multiple selection” box is checked) or a group in the network tree to …