|2. Add Computers and Groups|
|3. Get Inventory Data|
|4. Create Reports|
|7. Purchase and registration|
Trogon Network Inventory is a network inventory discovery and explore software which scans your network and display information about hardware and software installed on the network computers. There is no need to install any agents on the computers, all scanning is done by Windows build-in services. Trogon Network Inventory have flexible and powerful report builder and other useful asset management tools.
To use Trogon Network Inventory you need:
All you need to do is to follow instructions of Installation Wizard. There is no need to reboot, so you can run the program right after it is installed on your system.
On the Windows Control Panel, select Programs and Features item, find Trogon Network Inventory and click the Remove button.
Select File menu and click Add Group... or select any group in the groups and computers list, right click and select Add Group... in the context menu.
Then enter group name and select computers in the list. This computers will be added to the new group.
Select File menu and click Add Computer... or select any group in the groups and computers list, right click and select Add Computer... in the context menu or click button Add on the toolbar. Then enter computer name, network address and select user that have administrator privileges on this computer. New computer will be added to the selected group.
Select File menu and click Find Computer and select Add From The Network Neighborhood... or select any group in the groups and computers list, right click and select Add Computers From The Network Neighborhood... in the context menu or click button Scan on the toolbar and then click Add From The Network Neighborhood.... Then select workgroups and domains you need to scan and click Next button. Select computers from the list and set Create Groups checkbox if you want create groups for every workgroup and add computers to this groups. Click Finish button.
Select File menu and click Find Computer and select Import From Active Directory... or select any group in the groups and computers list, right click and select Import From Active Directory... in the context menu or click button Scan on the toolbar and then click Import From Active Directory.... Enter Active Directory connection settings: server, user name, password. Select computers from the list and set Add to Group checkbox if you want add computers to the existed or new group. Click Finish button.
Select File menu and click Find Computer and select Add From Local Subnet... or select any group in the groups and computers list, right click and select Add From Local Subnet... in the context menu or click button Scan on the toolbar and then click Add From Local Subnet.... Select local subnet to scan. Select computers from the list and set Add to Group checkbox if you want add computers to the existed or new group. Click Finish button.
To get inventory data click Collect Data button on the toolbar or Data\Collect... menu item or Collect Data item on the context menu of the computer's view. Select computers to get data on the computers list and click Next button. Then select data categories you want to update. You can select data on the list or select data type from the Data Volume combobox or click Select All button. To start update press Next button.
To update data on current data category (shown on the main view window at that time) click button Refresh or Data\Refresh menu item or Refresh context menu item on the data categories view or press F5 button.
If you get an error during data collection process, it is usually because WMI does not configured properly.
Read the WMI Troubleshoot document if you experience some problems with WMI.
|Operating System||List of computers sorted by operating system type|
|Hot Fixes||Updates and hotfixes installed on computers|
|Installed Applications||Applications sorted by vendor and version|
|Installed Applications (by computers)||Applications sorted by vendor and version (with computers)|
|Report on Availability of Particular Application||List of computers sorted by application version|
|Report on Certain Application Not Installed||List of computers without application|
|Installed Applications (detailed)||Installed applications (detailed information)|
|Installed Antivirus Software||Antivirus software installed on computers|
|Report on Prohibited Applications||Prohibited applications installed on computers|
|Report on Authorized Applications||Authorized applications installed on computers|
|Report on Unauthorized Applications||Unauthorized applications installed on computers|
|Computers With Outdated Antivirus Databases||Computers with antivirus databases are need to be updated|
|Computers Without Antivirus Software||Computers with no antivirus software installed|
|Summary Hardware Report||Information on basic hardware items|
|Computer Serial Numbers Reports||Motherboard serial numbers|
|Disk Drives||List of computers sorted by hard drive model|
|CD/DVD||List of computers sorted by cd/dvd drive model|
|Memory||List of computers sorted by memory size|
|Monitors||List of computers sorted by monitor model|
|Network Adapters||List of computers sorted by network adapter model|
|Printers||List of computers sorted by printer model|
|Processor||List of computers sorted by CPU model|
|Video Controller||List of computers sorted by video controller model|
|Processor||Processors installed on computers|
|HDD||Hard drives installed on computers|
|Free Space||Free disk space on computers|
|Monitors||Monitors installed on computers|
|Network Adapters||Network adapters installed on computers|
|Video Controller||Video controllers installed on computers|
|CD/DVD||CD/DVD drives installed on computers|
|Memory||Memory installed on computers|
|Logical Disks||Disk partitioning into logical drives|
|Network Drives||List of mapped network drives|
|Startup Commands||Startup commands on computers|
|Shared Folders||Shared folders on computers|
|Environment Variables||Environment variables on computers|
|Processes||Processes started on computers|
|System Drivers||System drivers installed on computers|
|Services||Services installed on computers|
|Routing table||Routing tables on computers|
|Current Users||Current users on computers|
Click Reports menu item and select the report what you want to create. Select computers to add to the report and click Next. You will see the report's preview window. Then you can print the report or save to a file with buttons on the toolbar.
Click Reports toolbar button or select Reports\Create Report... menu item. Select computers to add to the report and click Next. Then select report and click Next again. If you want to export report to the file(s) click Batch Report Creation, if you want preview the report do not set this checkbox. If you select batch report creation, select format of the files to export the report and directoriesies with file names for saving this report. Press Finish button.
To create inventory log report open log window by Log button on the toolbar or Tools\Inventory Log... menu item. Click Select button to configure log filter settings. Press Report button.
Click Data\Relevance of Information... menu item. Select time period for the report and click Show button. Click Report button.
To show the inventory log window click Log button on the toolbar or Tools\Inventory Log... menu item.
Press Select button to set log filter settings. Set date period that you want in Date and Time group. Select computers or group in the Computers group. Select data categories that you want see in the log by selecting items in the Data control. Select Find Text checkbox and write some text, if you want to see log records wich contains this string only.
Click Report button to create report (contains only records, that you enabled by filter settings).
If you want remove all records from the log click Clear button.
Summary hardware table window opens by Summary toolbar button or Report\Create Summary Table... menu item.
Click Computers to select computers or group what you want to see the summary table for.
You can also create summary hardware report for selected computers by clicking Report button.
If you want to see how long time ago you updated information about certain computers, select Data\Relevance of Information... menu item. Enter days number for show computers that has not been updated for this time period and click Show button.
Click Report button to create report with selected computers or click Collect Data button to update data for selected computers or group.
This tool finds text in the information about computers. Press Find button on the toolbar or select Data\Find... menu item or press Ctrl+F shortcut to open Find window. Enter text and click Find button.
If this text was found, computer and data category was shown on the list. Select item in the list and click Go To button to show this computer information in the main view.
Click Settings button or Tools\Settings... menu item, then select General tab page on the settings window.
You can change WMI connection timeout or path to the inventory database.
Click Settings button or Tools\Settings... menu item, then select Inventory Changes Log tab page on the settings window.
To enable inventory logging set Track inventory changes check box. Select data categories to logging in the list or click Default button to select default logged data items.
Click Settings button or Tools\Settings... menu item, then select Prohibited Software tab page on the settings window.
To add application to the prohibited software list click Import... or New... button. Select applications from the list or enter application's name in the next dialog.
To edit application name, select application and click Edit... or double click list item.
If you want remove application from the prohibited software list, select application from the list and click Delete....
Click Settings button or Tools\Settings... menu item, then select Authorized Software tab page on the settings window.
To add application to the authorized software list click Import... or New... button. Select applications from the list or enter application's name in the next dialog.
To edit application name, select application and click Edit... or double click list item.
If you want remove application from the authorized software list, select application from the list and click Delete....
To connect to the remote computers you can set administrator user accounts. For every computer you can select user account (name and password).
Select Tools\User Accounts... to open User Accounts window. You can add, delete or edit user accounts.
Open Help menu, then click on Buy Full Version.
A site page opens, after that follow our instructions. After purchasing our product, you will be sent an e-mail with the serial number.
Next, you can register the product.
After purchasing the product, you can register it.
Open Help menu, press Register... and enter the serial number which you received on purchase.
Trogon Network Inventory will be registered.
To register, your computer must be on-line. Otherwise, or in case of error during the registration, you should contact us by e-mail firstname.lastname@example.org