Inventory Discovery Scanners

After defining requirements, the next step in an IT asset inventory is to collect data. The data is collected by Scanners.

You configure and generate scanners using the Scanner Generator. Scanners are configured according to the specifications determined in the planning stage of the inventory.

The Scanner Generator is used to both configure and define the level of information to be collected. One or more scanner executable programs with the desired configuration are then generated and subsequently run across a computer population. 

The Scanner Generator also provides a set of options for controlling the behavior of the scanner as it scans each computer, under both normal and exceptional conditions (such as when an error occurs).

Scanner Modes

The scanner is run across the computer population to collect inventory data in one of the following ways:

  • Enterprise Mode (default). Automatically collects an inventory using the Universal Discovery's scheduling and launching capabilities.

  • Manual Deployment Mode. Scans are launched manually. For example,scans are schedule and launched from login scripts or on non-networked machines.

Components of a Scanner

A scanner consists of the following files:

The scanner executable file

This file is an executable file. It contains the constant parts of the scanner:

  • strings
  • data files
  • the scanner executable code
The scanner configuration file

The configuration file is a compressed XML file containing the settings for the scanner you are currently configuring.

When the scanners are used in Enterprise Mode, they read the configuration from a separate configuration file. This is a binary file with a .cxz extension. The typical size of the configuration file is about 3K. As the size of the configuration file is significantly smaller than the size of the complete scanner, a separate scanner configuration is useful for repetitive inventory collection when the configuration of the scanner has been altered. In this case, only a small configuration file is delivered to the user’s computer to run with the original scanner instead of delivering the entire new scanner.

Note When used in Manual Deployment Mode, the Scanner Generator generates self-contained scanner executables that consist of a combination of the scanner executable and configuration file.

What Information Does the Scanner Collect?

Scanners can collect several types of information and can be configured to collect any or all of them. The details recorded for each computer within each main category depend on the options and settings selected when the scanner is generated and the configuration of the computer.

Scanners can collect the following information:

Information Description
Hardware and Configuration Information

Hardware information is detected automatically. The scanners collect and store from 100 to 900 hardware items for a computer, depending on the type and manageability options available on the computer.

The Scanner Generator allows a subset of the hardware collection to be disabled. Normally this is not required, but it may be desirable to decrease the scan file size or scan time.

The hardware details that can be defined and recorded by the scanner include the following:

  • The processor type and BIOS details.
  • The memory size and configuration details.
  • The computer bus type and details of the attached cards.
  • The hard disk drive specifications (including the total size and free space).
  • The network type and ID (if applicable). This hardware item cannot be disabled in Enterprise Mode.
  • Comprehensive detection of network settings, including detection of multiple network adapters, TCP/IP settings, gateways, DNS servers, subnet masks, DHCP status.
  • The monitor and video display adapter details.
  • The type of keyboard and mouse driver installed and details of the I/O ports.
  • The Operating System version and other details.
  • The expansion (or adapter) cards detected.
  • The hardware data information from System Management BIOS (SMBIOS).
  • Running software processes.
Software Information Software information is scanned automatically, and consists of detailed information about the files and directories on the drives scanned. The information collected about files can be defined (including the file types and the level of information collected). It is possible to define the drives that are to be scanned based on either the media or format of the drive, or to use the targeted scanning option to scan just a set of directories. Specific files can be collected (that is, stored in the scan file) for further analysis or for error recovery purposes. It is also possible to configure the level of file detail stored in the scan file and filters can be set up that specify directories or files to be included or excluded from being stored.
User or Asset Information User or asset information consists of configurable fields that can be collected automatically. It usually includes the asset number which is used to uniquely identify each computer. Asset data fields are automatically populated from the data extracted from text files, the Windows registry/WMI and environment variables.
Software Utilization

Universal Discovery can gather information about the software that is being used on the machines in your network. This is referred to as Software Utilization. The information collected can be used to optimize software license cost, for example by eliminating unused or under-utilized software installations.

From a software recognition perspective, any files that are Unknown and are shown to have a high Utilization should be marked for teaching.

Software utilization data shows the number of days that an application was used (as a percentage) over a period of time. This period of time is known as the Utilization Period.

As a guideline the Utilization Periods are as follows:

  • Month (31 days)
  • Quarter (90 days)
  • Year (365 days)

Related Topics Link IconRelated Information