Documentation 5.0
version 5
Index Requirements Installation requirements........................................................................................................... 1 Scanning requirements .............................................................................................................. 3
Installation Installing Lansweeper ................................................................................................................ 6 Accessing Lansweeper ..............................................................................................................13 Adding scanning servers ...........................................................................................................17
Licensing Lansweeper Purchasing a license .................................................................................................................20 Applying your license................................................................................................................21
Scanning credentials What are scanning credentials ..................................................................................................22 Creating scanning credentials....................................................................................................24
Scanning methods Active Scanning........................................................................................................................30 Workgroup Scanning ................................................................................................................38 IP Range Scanning ....................................................................................................................42 Scheduled Scanning..................................................................................................................51 Domain User Scanning..............................................................................................................58 Eventlog Scanning ....................................................................................................................64 LsPush .....................................................................................................................................73 LsClient....................................................................................................................................78
Scan frequency How often is specific data scanned ............................................................................................82
Managing assets Viewing scanned asset data ......................................................................................................85 Rescanning assets ....................................................................................................................89 Scanning additional data...........................................................................................................93 Adding data, comments and docs............................................................................................ 100 Performing administrative tasks .............................................................................................. 106 Changing asset types .............................................................................................................. 107
Grouping assets ..................................................................................................................... 112 Deleting assets ....................................................................................................................... 118 Excluding assets from scanning ............................................................................................... 120
Managing software Authorizing software .............................................................................................................. 123 Anti-virus software reports ..................................................................................................... 127
Managing licenses Scanning software serial numbers ........................................................................................... 129 Software license compliance ................................................................................................... 130 Operating system license compliance ...................................................................................... 133
Email alerts Setting up report alerts........................................................................................................... 136 Setting up event log alerts ...................................................................................................... 139
Actions Configuring your browser to run actions .................................................................................. 144 Remote Control...................................................................................................................... 149 Uninstall Software.................................................................................................................. 152
Customizing the web console Restricting access ................................................................................................................... 155 Setting the date format .......................................................................................................... 163
Back up, move, update Updating your installation....................................................................................................... 164
Support Knowledge base ..................................................................................................................... 168 Forum ................................................................................................................................... 168 Contact.................................................................................................................................. 169
www.lansweeper.com
Requirements Installation requirements
The Lansweeper software is agent-free. It only needs to be installed on one computer, which scans your entire network. No additional software is needed on the client machines you wish to scan. While a scanning agent is included in the software, using it is optional.
Lansweeper scans Linux, Unix, Mac and Windows, VMware servers and network devices, but must be installed on a Windows computer.
The Windows computer you install Lansweeper on must meet the requirements below. •
Architecture 32-bit or 64-bit
•
Operating system You can install the Lansweeper software on any of the operating systems listed below. Operating systems that are not listed are not supported. -
Windows XP, SP3
-
Windows Vista, SP2
-
Windows 7
-
Windows 8
-
Windows Server 2003, SP2
-
Windows Server 2003 R2, SP2
-
Windows Server 2008, SP2
-
Windows Server 2008 R2, SP1 For 2008 R2, this patch may be required: http://support.microsoft.com/kb/2401588
-
Windows Server 2012
1/169
www.lansweeper.com
•
Installed software -
.NET Framework 4.0, updated to the latest service pack
-
You don’t need to have database software installed to install Lansweeper. Should you choose to install Lansweeper in an existing SQL instance however, know that SQL Server 2000, SP3 and higher are supported.
If you do not already have .NET Framework 4.0 installed, the Lansweeper installer will automatically download and install this framework for you. If your machine does not have Internet access however, you will have to manually install the framework.
2/169
www.lansweeper.com
Scanning requirements Lansweeper scans Linux, Unix and Mac computers, VMware servers and other network devices. The requirements machines have to meet in order to be scanned are listed below.
Windows computers •
Architecture 32-bit or 64-bit
•
Operating system Windows 2000 or any more recent operating system
•
Firewall When using agent based scanning, configuring your firewalls is not required. When using non-agent based scanning, any firewalls present on your machines must be configured to allow WMI traffic. Step-by-step instructions on how to configure Windows Firewall can be found in this article: http://lansweeper.com/kb/6/firewall.html
•
Additional workgroup requirements When using agent based scanning, there are no further workgroup requirements. When using non-agent based scanning for Windows Vista and Windows 7 workgroup computers, User Account Control (UAC) must be disabled on the computers, at a minimum for the user account(s) you use to scan the machines. -
Open the Start menu on the computer you wish to scan and select Run.
-
In the input box, type regedit.exe and hit the OK button.
-
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Policies\System
-
Right-click and create a new DWORD Value called LocalAccountTokenFilterPolicy and give it the value 1.
3/169
www.lansweeper.com More info on handling remote connections under UAC can be found in the following Microsoft knowledge base article: http://msdn.microsoft.com/enus/library/aa826699(VS.85).aspx#handling_remote_connections_under_uac When using non-agent based scanning for workgroup computers, your security model must also be set to Classic. -
Open the Start menu on the computer you wish to scan and select Run.
-
In the input box, type secpol.msc and hit the OK button.
-
Navigate to Local Policies\Security Options
-
Double-click on Network access: Sharing and security model for local accounts, select Classic from the dropdown in the popup window and hit OK
-
•
Restart the computer.
Installed software If some of your machines have SQL Server 2000 installed and you would like Lansweeper to retrieve detailed information on these installations (SQL Server edition, database sizes etc.), you must run the SQLWMI80.MSI installer on the machines. This will install the SQL Server provider on your machines. The SQLWMI80.MSI installer can be found in the X86\OTHER\WMI subfolder of your SQL Server 2000 source folder.
Linux and Unix computers To scan Linux and Unix computers, SSH must be enabled on the computers and your scanning credential(s) must have access to the sudo command. HAL (Hardware Abstraction Layer) and dmidecode must also be installed on your machines.
Mac computers To scan Mac computers, SSH must be enabled on the computers and your scanning credential(s) must have administrative privileges on the computers.
4/169
www.lansweeper.com
VMware servers To scan VMware servers, the Managed Object Browser must be enabled on your servers. It is enabled by default. Your scanning credential(s) must also have read-only access to your servers. In order for Lansweeper to link any VMware guests to their hosts, the VMware Tools must also be installed on these guests.
Other network devices To scan other network devices such as printers and switches, one or more of the following protocols must be enabled on the devices: FTP, HTTP, HTTPS, JetDirect, SIP, SMTP, SNMP (SNMPv1 or SNMPv2), SSH or Telnet. If a device does not support any of the specified protocols, you can also manually add it to the Lansweeper web console.
5/169
www.lansweeper.com
Installation Installing Lansweeper The Lansweeper software consists of the following components:
•
Lansweeper service The Lansweeper service is a Windows service that performs all of the actual scanning of your network and sends the scanned data back to your Lansweeper database.
•
Lansweeper database The Lansweeper database stores all data that has been scanned, all data that you’ve manually submitted and all of your settings.
•
Lansweeper web console The web console connects to your database and displays scanned data in a comprehensible way. In addition, it allows you to make changes to your settings. By default, anyone within your domain or workgroup can access the web console. Access can also be restricted.
All software components are installed and configured automatically by the Lansweeper installer. No manual configuration is required. Components can be installed together on one machine or separately on different machines, depending on which Lansweeper license you have.
There are two main ways in which you can install the Lansweeper software. You can perform either an Easy or an Advanced Install. An Easy Install is sufficient for most users. Both installation methods are explained in further detail on the next few pages.
6/169
www.lansweeper.com
Performing an Advanced Install is only required if one or more of the following is true: •
Your Lansweeper license supports SQL Server and you have (or may have in the future) more than 750 Windows computers.
•
Your Lansweeper license supports SQL Server and you want to connect to your Lansweeper database using an external interface.
•
Your license supports SQL Server and you want to spread out the Lansweeper service, database and console over several machines.
•
You want to install the Lansweeper web console under IIS.
Performing an Easy Install To perform an Easy Install of the Lansweeper software, do the following: •
Download the latest Lansweeper installer, which can be found at the following URL: http://lansweeper.com/getfile50.aspx All Lansweeper versions use the same installer.
•
Run the installer on the Windows computer you wish to install Lansweeper on.
•
Hit the Next button, select I accept the agreement and hit Next again.
•
Select the Easy install option and hit Next
7/169
www.lansweeper.com
•
Optionally, you can choose a custom port to install the Lansweeper web console under. If you don’t choose a custom port, the installer will automatically install the web console under the first available port. Hit Next to continue.
•
Optionally, you can choose a custom folder to install Lansweeper under. Hit Install to start the installation process.
-
The Lansweeper service will be installed under Windows Services.
-
The Lansweeper database will be installed under SQL Server Compact, which will be installed and configured automatically. The database file will be called lansweeperdb.sdf and should not be renamed.
-
The Lansweeper web console will be installed under IIS Express, which will be installed and configured automatically. Your preferred port will be used.
•
When the installation has completed, you can enter a name and email address to subscribe to the Lansweeper newsletter. You can also post about your installation on Facebook, LinkedIn or Twitter. Tick the Skip Lansweeper newsletter subscription checkbox if you do not wish to subscribe to the newsletter and hit the Finish button to close the installer.
8/169
www.lansweeper.com
Performing an Advanced Install To perform an Advanced Install of the Lansweeper software, do the following: •
Download the latest Lansweeper installer, which can be found at the following URL: http://lansweeper.com/getfile50.aspx All Lansweeper versions use the same installer.
•
Run the installer on the Windows computer you wish to install Lansweeper on.
•
Hit the Next button, select I accept the agreement and hit Next again.
•
Select the Advanced install option.
•
Select the Lansweeper components you wish to install on the machine. If you will be spreading out the Lansweeper service, database and web console over several machines, the database and service must be installed first. The web console comes last.
9/169
www.lansweeper.com
•
If you are installing the Lansweeper database, select the database server you wish to install the database under. If you are performing an Advanced Install, your preferred server will most likely be SQL Server. Hit Next to continue.
Installing your database under SQL Server is required if: •
Your Lansweeper license supports SQL Server and you have (or may have in the future) more than 750 Windows computers.
•
Your Lansweeper license supports SQL Server and you want to connect to your Lansweeper database using an external interface.
•
Your license supports SQL Server and you want to spread out the Lansweeper service, database and console over several machines.
•
Select the SQL instance you wish to install the Lansweeper database under from the dropdown or type its name. If you don’t have an SQL Server, tick the checkbox No SQL Server available. The Lansweeper installer will then automatically install and configure SQL Server 2008 Express, which has a database size limit of 4GB.
To install the Lansweeper database under an existing SQL instance, your SQL Server must be set up for mixed (Windows and SQL) authentication.
10/169
www.lansweeper.com
•
Select the authentication method you wish to use to connect to SQL Server from the Authentication dropdown. You can choose Windows authentication or SQL Server authentication. If you opt to use SQL authentication, enter your username and password. Hit Next to continue.
•
If you are installing the Lansweeper web console, select the web server you wish to install the console under. Selecting Recommended will install the web console under IIS Express, selecting Advanced will install the web console under IIS.
•
Optionally, you can choose a custom port to install the Lansweeper web console under. If you don’t choose a custom port, the installer will automatically install the web console under the first available port. Hit Next to continue.
•
Optionally, you can choose a custom folder to install Lansweeper under. Hit Install to start the installation process.
11/169
www.lansweeper.com
-
The Lansweeper service will be installed under Windows Services.
-
The Lansweeper database will be installed under the database server of your choice. It will be called lansweeperdb and should not be renamed.
-
The Lansweeper web console will be installed under the web server of your choice. Your preferred port will be used.
•
When the installation has completed, you can enter a name and email address to subscribe to the Lansweeper newsletter. You can also post about your installation on Facebook, LinkedIn or Twitter. Tick the Skip Lansweeper newsletter subscription checkbox if you do not wish to subscribe to the newsletter and hit the Finish button to close the installer.
•
If you did not perform a full installation, run the installer on any other machine you wish to use to host Lansweeper. Click through the opening and license agreement screens and once again select the Advanced install option. Select the components (service and/or web console) you wish to install on the machine and proceed with the installation procedure. You will be asked to point the installer to your existing Lansweeper database.
12/169
www.lansweeper.com
Accessing Lansweeper Once you’ve installed Lansweeper, you can access the Lansweeper web console. The web console displays scanned data in a comprehensible way. In addition, it allows you to make changes to your settings. By default, anyone within your domain or workgroup can access the web console. Access can also be restricted.
Accessing the Lansweeper web console •
To access the Lansweeper web console on the machine hosting your Lansweeper installation, use the Lansweeper Web Console shortcut that was copied to your desktop and Start menu.
•
To access the Lansweeper web console from a machine other than the one hosting your Lansweeper installation, make sure you type the complete web console URL into your browser’s address bar. Localhost should be replaced with the NetBIOS name of the machine hosting your installation. Web console URLs are generally formatted as follows: http://(NetBIOS name of the machine hosting your web console):(port number)/
13/169
www.lansweeper.com
Going through the web console’s First Run Wizard When you access the Lansweeper web console for the first time, you are presented with a First Run Wizard, which allows you to set up scanning.
The First Run Wizard is only meant to get you started with scanning. You can make changes to your configuration and submit additional network segments for scanning once you’ve completed the wizard.
To go through the wizard, do the following: •
Depending on whether you’re in a domain or workgroup, choose whether you want to enable Active or Workgroup Scanning.
-
Active Scanning scans Windows computers. It contacts your domain controllers every 15 minutes for a list of newly logged on computers. Newly logged on computers that have not been scanned in the last 20 hours are then scanned by Active Scanning.
14/169
www.lansweeper.com -
Active Scanning can also import all of your Active Directory users into your Lansweeper database.
-
Workgroup Scanning scans Windows computers. Every 15 minutes, Workgroup Scanning retrieves a list of computers that are visible in the Network browser. Newly logged on computers that have not been scanned in the last 20 hours are then scanned by Workgroup Scanning.
•
Enter a Windows username and password into the available input boxes. This credential will be used by your Lansweeper installation to remotely access and scan your domain or workgroup computers. If you’re in a domain, use the format NetBIOS domain name\username. If you’re in a workgroup, use the format .\username
•
Choose whether you want to enable IP Range Scanning and enter a start and end IP into the available input boxes. IP Range Scanning scans Linux, Unix, Mac and Windows computers, VMware servers and other network devices.
If you will be scanning Linux, Unix or Mac computers, tick the Enable scanning checkbox and enter an SSH username and password into the available input boxes.
15/169
www.lansweeper.com If you will be scanning VMware servers, tick the Enable scanning checkbox and enter a VMware username and password into the available input boxes.
If you will be scanning network devices that have SNMP enabled, enter an SNMP community string into the available input box. The default string is public
•
Optionally, you can select a different date format from the Date format dropdown. This format will be used throughout the Lansweeper web console.
•
Hit Continue to start scanning and Continue again to proceed to the web console, which will display scanned data.
16/169
www.lansweeper.com
Adding scanning servers If your Lansweeper license supports multiple scanning servers, the Lansweeper service can be installed on multiple Windows computers that all report back to the same Lansweeper database. These computers will work together to scan your network and each can be configured separately. Having multiple scanning servers is recommended if you have several thousand assets or remote sites connected through TCP/IP or VPN connections. A multi scanning server setup allows the scanning load and network traffic to be divided between multiple machines.
To set up a multi scanning server Lansweeper installation, do the following: •
Perform an Advanced Install of the Lansweeper software by following the instructions on page 9 and make sure you select SQL Server as your database server.
SQL Server Compact does not allow other machines to remotely connect to its databases, so this database server cannot be used for a multi scanning server setup.
•
Run the Lansweeper installer on the Windows computer you wish to configure as a secondary scanning server.
•
Hit the Next button, select I accept the agreement and hit Next again.
•
Select the Advanced install option.
17/169
www.lansweeper.com
•
Select only the Lansweeper service for installation and also tick the Use an existing SQL Server checkbox. Hit Next to continue.
•
Select the SQL instance your Lansweeper database is installed under from the dropdown or type its name. Your secondary scanning server will connect to this Lansweeper database.
•
Select the authentication method you wish to use to connect to SQL Server from the Authentication dropdown. You can choose Windows or SQL Server authentication. If you opt to use SQL authentication, enter your username and password. Hit Next to continue.
•
Optionally, you can choose a custom folder to install Lansweeper under. Hit Install to start the installation process.
18/169
www.lansweeper.com -
The Lansweeper service will be installed under Windows Services and will connect to the Lansweeper database you’ve specified.
•
When the installation has completed, you can enter a name and email address to subscribe to the Lansweeper newsletter. You can also post about your installation on Facebook, LinkedIn or Twitter. Tick the Skip Lansweeper newsletter subscription checkbox if you do not wish to subscribe to the newsletter and hit the Finish button to close the installer.
•
Follow the same procedure to configure any additional Windows computers as secondary scanning servers for your Lansweeper installation.
•
Each scanning server can be configured to scan its own specific network segments. In the Configuration\Scanning Setup\Scanning Methods section of the Lansweeper web console, there will be a separate tab for each scanning server. More info on configuring scanning methods can be found on page 30, in the chapter Scanning methods.
19/169
www.lansweeper.com
Licensing Lansweeper Purchasing a license When you first install Lansweeper, a 20-day trial of the Lansweeper Premium version is initiated. When this trial runs out, the software reverts to freeware mode. No data is deleted from your database, which is still accessible, but you won’t be able to use any of Lansweeper’s paying features. You can then purchase a license to once again unlock all of your installation’s features.
The easiest way to purchase a license is through the Lansweeper store, which also provides an overview of available licensing plans and the features included in each. You can find the store at the URL below. http://www.lansweeper.com/purchase.aspx
Should you prefer to purchase through a reseller, you may contact sales@lansweeper.com for a list.
20/169
www.lansweeper.com
Applying your license When you’ve purchased a Lansweeper license, an email receipt is sent to you with a license key included. Use the link “click here to download your license” in your receipt to retrieve your license key. This key must be applied to your installation to unlock its paying features.
If you cannot locate your license key, contact sales@lansweeper.com and provide your Cleverbridge reference number, which is included in all billing related emails sent to you.
All of the Lansweeper licensing plans use the same installer. When upgrading from freeware, there is no need to reinstall the software. You can simply apply your key to unlock your installation’s paying features.
To apply your license and register your Lansweeper installation, do the following: •
Open the license.txt file linked in your receipt and copy the entire string contained within.
•
Hit the Show key button in the following section of the Lansweeper web console: Configuration\Scanning Setup\Your License
•
Paste the entire license string into the popup window and hit the Ok button.
21/169
www.lansweeper.com
Scanning credentials What are scanning credentials Scanning credentials are login/password combinations used by your Lansweeper installation to remotely access and scan network assets. The following asset types require a scanning credential in order to be scanned remotely: Linux, Unix and Mac computers, Windows computers, VMware servers and network devices (printers, switches…) that have SNMP enabled. The scanning credential you submit for an asset or asset group must have administrative privileges on that asset or within that asset group. Your Lansweeper installation allows you to submit an unlimited number of scanning credentials.
Windows computers can be scanned locally as well, using the LsPush scanning method. If you scan your Windows computers exclusively using LsPush, you do not need to submit Windows scanning credentials. Computers running a Home edition of Windows must be scanned using LsPush, as these machines cannot be accessed remotely.
There are four types of scanning credentials that can be used to remotely access and scan assets: •
Windows credentials Used for scanning:
computers running an edition of Windows other than Home
Login:
NetBIOS domain name\username (domain credentials) .\username (workgroup credentials)
Password:
your user account’s password
22/169
www.lansweeper.com
•
•
•
SNMP credentials Used for scanning:
network devices that have SNMP enabled
Login:
SNMP Community String (cannot be changed)
Password:
the SNMP community string used by your devices
SSH credentials Used for scanning:
Linux computers, Unix computers, Mac computers
Login:
SSH login
Password:
your SSH login’s password
VMware credentials Used for scanning:
VMware servers
Login:
SSH login
Password:
your SSH login’s password
23/169
www.lansweeper.com
Creating scanning credentials Creating one scanning credential per credential type You may only require one scanning credential of each credential type. If all of your SNMP enabled devices use the same community string for instance, you can use a single SNMP credential to remotely scan all of these devices. If you only require one scanning credential per credential type, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Credentials
•
In the Global Credentials section of the page, hit the pencil shaped edit button next to the credential type you would like to configure.
•
Enter a login and password into the Login and Password fields of the popup window and hit the Ok button. Formatting instructions and examples can be found on page 22. You can check the box Show password to view your password as you’re typing.
Once you’ve configured your global credentials, submit your assets for one or more of the scanning methods listed on page 30, in the chapter Scanning methods.
24/169
www.lansweeper.com
When Lansweeper encounters an asset of a certain type during remote scanning, it will try to scan the asset using the global credential you’ve submitted for that asset type. Your global Windows credential is also used for Domain User Scanning.
Global credentials cannot be deleted or renamed. If at a later date you require multiple credentials per asset type, follow the instructions below to create them. Lansweeper will then only use your global credentials if all other credentials of the same type have failed.
Creating multiple scanning credentials per credential type You may require multiple scanning credentials of each credential type. In a workgroup for instance, each computer may have its own administrative account, with its own username and password. If this is the case, you must use multiple Windows credentials to remotely scan all computers within the workgroup. If you require multiple scanning credentials per credential type, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Credentials
•
Hit the Add new Credential button in the Other Credentials section of the page.
•
Select the appropriate credential type from the Type dropdown in the popup window. You can create any credential: a Windows credential, an SNMP credential, an SSH credential or a VMware credential.
25/169
www.lansweeper.com
•
Enter a name for the credential into the Name field. You can assign any name you’d like.
•
Enter a login and password into the Login and Password fields of the popup window and hit the Ok button. Formatting instructions and examples can be found on page 22. You can check the box Show password to view your password as you’re typing.
-
To make changes to your credential once it’s created, hit the pencil shaped edit button next to the credential, make the necessary changes and hit Ok
-
To delete your credential, hit the red button next to the credential and then hit OK in the popup confirmation window.
Once you’ve created a scanning credential using the Add New Credential button, you must map the credential. When you map a scanning credential, you are telling Lansweeper when it should try to use your credential.
Windows credentials can be mapped to: •
Domains or workgroups
•
Individual Windows computers
•
Individual IP addresses, if you use IP Range Scanning
•
IP ranges, if you use IP Range Scanning
SNMP, SSH and VMware credentials can be mapped to: •
Individual IP addresses, if you use IP Range Scanning
•
IP ranges, if you use IP Range Scanning
Instructions on how to map scanning credentials can be found on the next page, in the chapter Mapping scanning credentials.
26/169
www.lansweeper.com
Mapping scanning credentials When you map a scanning credential, you are telling Lansweeper when it should try to use your credential. Any credential you create using the Add new Credential button must be mapped. Lansweeper cannot know when to use the credential otherwise. To map credentials, browse to the following section of the web console: Configuration\Scanning Setup\Scanning Credentials
To map a Windows credential to a domain or workgroup: •
Hit Map Credential to Domain/Workgroup in the Domain/Workgroup Credentials section of the following web console page: Configuration\Scanning Setup\Scanning Credentials
•
Enter a domain NetBIOS or workgroup name into the input box of the popup window.
•
Select one or more credentials you would like to map to the domain or workgroup and hit the Add button.
-
To map multiple credentials, hold down Shift and left-click the credentials you need.
-
When Lansweeper encounters a Windows computer that belongs to the domain or workgroup, it will try to scan the machine using the credentials you mapped.
-
Credentials are tried in the order in which they are displayed. In the example above, Lansweeper will first try to use the Windows2 credential to scan computers in workgroup, then the Windows1 credential.
27/169
www.lansweeper.com -
Once you’ve mapped your credentials, you can change the order in which they are tried by grabbing (left-click and hold) a credential in the Credentials column and dragging it to a new position in the credentials list.
-
To map additional credentials to the domain or workgroup, hit the green (+) button in the Credentials column and next to the domain or workgroup.
-
To unmap a specific credential from the domain or workgroup, hit the red button in the Credentials column and next to the credential you want to unmap.
-
To unmap all credentials from the domain or workgroup, hit the red button next to the Credentials column and next to the domain or workgroup.
•
Don’t forget to submit your domain or workgroup computers for one or more of the scanning methods listed on page 30, in the chapter Scanning methods.
To map a Windows credential to an individual Windows computer: •
Hit Map Credential to one Windows computer in the Unique Windows Credentials section of the following web console page: Configuration\Scanning Setup\Scanning Credentials
•
Enter the NetBIOS name of a Windows computer into the input box of the popup window.
•
Select the credential you would like to map to the computer and hit the Add button.
-
When Lansweeper encounters the specified Windows computer during scanning, it will try to scan the machine using the credential you mapped.
-
To unmap the credential from the Windows computer, hit the red button next to the Credentials column and next to the name of the Windows computer.
•
Don’t forget to submit your computer for one or more of the scanning methods listed on page 30, in the chapter Scanning methods.
28/169
www.lansweeper.com To map any credential to an individual IP address, do the following: •
Hit Map Credential to one IP address in the Unique IP Credentials section of the following web console page: Configuration\Scanning Setup\Scanning Credentials
•
Enter an IP address into the IP Address field of the popup window.
•
Select the credential you would like to map to the IP address and hit the Add button.
-
To unmap the credential from the IP address, hit the red button next to the Credentials column and next to the IP address.
•
Submit the IP range the IP address belongs to for IP Range Scanning. Instructions can be found on page 42, in the chapter IP Range Scanning. -
When Lansweeper encounters the specified IP address during IP Range Scanning, it will try to scan the IP address using the credential you mapped.
To map any credential to an IP range, follow the instructions on page 44, in the chapter IP Range Scanning. When Lansweeper scans your IP ranges, it will try to scan the ranges using the credentials you mapped.
29/169
www.lansweeper.com
Scanning methods Active Scanning
Active Scanning is unavailable in the freeware version of Lansweeper.
What is Active Scanning Active Scanning is an agentless scanning method suitable for scanning Windows computers that are part of a domain. It requires you to have an Active Directory and one or more domain controllers. Active Scanning allows you to scan an unlimited number of domains. It contacts their domain controllers every 15 minutes to retrieve a list of newly logged on computers. Newly logged on computers that have not been scanned in the last 20 hours are added to your scanning queue by Active Scanning. They are scanned when any previously initiated computer scans have finished.
Quick overview
ACTIVE SCANNING…
ASSET TYPES
NETWORK TYPES
scans computers running Windows 2000 or higher, any edition other than Home scans Windows Active Directory domains updates all Windows computer and user fields in
SCANNED DATA
the Lansweeper database, except for data you’ve disabled for scanning
AGENT/SOFTWARE
requires no agent or software on the computers you wish to scan • requires you to create and map one or more
CONFIGURATION
scanning credentials in the Lansweeper web console under Configuration\Scanning Setup\Scanning Credentials
30/169
www.lansweeper.com
• requires you to submit the DNS and NetBIOS names of your domains in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Active Scanning
SCAN FILTERS
• can be made to scan only specific OUs • can be made to contact only specific domain controllers in specific Active Directory Sites • contacts your domain controllers every 15
SCAN TRIGGERS
minutes for a list of newly logged on computers that require scanning • when you restart the Lansweeper service, scans computers that have logged onto your domain controllers in the last 14 days
SCAN FREQUENCY
rescans a unique computer once every 20 hours at most
Submitting trusted domains for Active Scanning To submit a domain for Active Scanning, do the following: •
Create (and map) one or more scanning Windows credentials. More info on credentials can be found on page 22, in the chapter Scanning credentials.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure Active Scanning for. If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
31/169
www.lansweeper.com
•
Check the box Enable Active Scanning in the Active Scanning section of the scanning server you would like to configure.
•
In the same web console section, hit the Add Domain button.
•
Enter your domain’s DNS and NetBIOS name into the popup window and hit the Ok button.
Submitting untrusted domains for Active Scanning If you wish to submit a domain for scanning other than the one your Lansweeper server is located in and there is no trust between these two domains, you will need to ensure that your Lansweeper server can correctly resolve the domain you wish to scan. Do the following: •
Follow the steps on the previous page to submit the domain for Active Scanning.
•
On your Lansweeper server, open your Start menu and select Run.
•
In the input box, type ncpa.cpl and hit the OK button.
•
Right-click on your network connection and choose the Properties menu item.
32/169
www.lansweeper.com
•
Select Internet Protocol Version 4 (TCP/IPv4) and hit the Properties button.
•
Hit the Advanced button and select the DNS tab.
•
Hit the upper Add button, enter the DNS server of the domain you wish to scan and hit Add.
•
Check Append these DNS suffixes (in order), hit the lower Add button, enter the DNS suffix of the domain you wish to scan and hit Add.
Finding your domains’ DNS and NetBIOS names If you’re unsure what your domain’s DNS or NetBIOS name is, you can find these names as follows: •
On one of your Windows Servers, open your Start menu and select Run.
•
In the input box, type dsa.msc and hit the OK button.
•
You should now be looking at your Active Directory Users and Computers configuration window.
33/169
www.lansweeper.com
•
Right-click on your domain in the left pane and choose the Properties menu item.
•
Your domain’s full DNS name is the first name listed in the General tab.
•
Your domain’s NetBIOS name is the pre-Windows 2000 entry in the same tab.
Adding Active Scanning OU filters By default, Active Scanning scans the domains you submit entirely. You can however specify that only certain computer containers or certain computer OUs should be scanned. Do the following: •
Submit your domains for scanning as outlined on page 31.
•
Hit the Add OU filter button in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Active Scanning
•
Enter a valid computer container or computer OU into the popup window and hit Ok
34/169
www.lansweeper.com
Adding an OU filter to Active Scanning does not automatically remove computers from your database that had already been scanned outside of the specified OU. If you wish to remove computers scanned outside of the specified OU, follow the instructions on page 118, in the chapter Deleting assets.
Adding Active Scanning Site filters Besides filtering by container or OU, you can also filter Active Scanning by Site. When you add a Site filter, Active Scanning will only contact domain controllers in the specified Active Directory Site for lists of newly logged on computers.
Whenever possible, it is recommended that you use OU filtering instead of Site filtering. Unless you are absolutely certain which domain controllers belong to which Site and which computers are managed by those domain controllers, do not use Site filtering.
35/169
www.lansweeper.com To add a Site filter to Active Scanning, do the following: •
Submit your domains for scanning as outlined on page 31.
•
Hit the Add Site filter button in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Active Scanning
•
Enter the name of a valid Active Directory Site and the NetBIOS name of the domain this Site belongs to into the popup window and hit Ok
Editing domains or filters submitted for Active Scanning To edit a domain or filter you’ve submitted for Active Scanning, do the following: •
Browse to the Configuration\Scanning Setup\Scanning Methods\Active Scanning section of the Lansweeper web console.
•
Place your cursor in the line you want to edit and make the desired change.
•
Hit Enter while your cursor is still present in the line to submit the change.
Removing domains or filters from Active Scanning To remove a domain or filter from Active Scanning, do the following: •
Browse to the Configuration\Scanning Setup\Scanning Methods\Active Scanning section of the Lansweeper web console.
•
Hit the red button next to the domain or filter you would like to remove.
Removing a domain from Active Scanning does not automatically remove computers from your database that had already been scanned for that domain.
36/169
www.lansweeper.com
If you wish to remove the computers as well, follow the instructions on page 118, in the chapter Deleting assets .
Troubleshooting Active Scanning problems Active Scanning may fail to detect a computer if: •
The computer does not report to a domain controller.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
Active Scanning may display a scanning error for a computer if: •
The computer is offline.
•
Your scanning credential does not have administrative privileges on the computer.
•
Your scanning credential’s password is incorrect or has expired.
•
The computer’s firewall is not properly configured for scanning.
•
The computer’s name cannot be resolved to the correct IP address.
•
DCOM is disabled on the computer or the computer’s DCOM permissions are incorrect.
•
Windows Management Instrumentation (WMI) is not running or corrupt on the computer.
37/169
www.lansweeper.com
Workgroup Scanning
Workgroup Scanning is unavailable in the freeware version of Lansweeper.
What is Workgroup Scanning Workgroup Scanning is an agentless scanning method suitable for scanning Windows computers that are part of a workgroup. Workgroup computers must be visible in your Network browser, which you can access using Windows Explorer, to be scanned by Workgroup Scanning.
Workgroup Scanning allows you to scan an unlimited number of workgroups. Every 15 minutes, Workgroup Scanning retrieves a list of computers that are visible in the Network browser and that belong to the workgroups you’ve submitted for scanning. Newly logged on computers that have not been scanned in the last 20 hours are added to your scanning queue by Workgroup Scanning. They are scanned when any previously initiated computer scans have finished.
Quick overview
WORKGROUP SCANNING…
ASSET TYPES
NETWORK TYPES
scans computers running Windows 2000 or higher, any edition other than Home scans Windows workgroups updates all Windows computer and user fields in
SCANNED DATA
the Lansweeper database, except for data you’ve disabled for scanning
38/169
www.lansweeper.com
AGENT/SOFTWARE
requires no agent or software on the computers you wish to scan • requires you to create and map one or more scanning credentials in the Lansweeper web
CONFIGURATION
console under Configuration\Scanning Setup\Scanning Credentials • requires you to submit the names of your workgroups in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Workgroup Scanning
SCAN FILTERS
SCAN TRIGGERS
does not have its own filtering options contacts your Network browser every 15 minutes for a list of newly logged on computers that require scanning
SCAN FREQUENCY
rescans a unique computer once every 20 hours at most
Submitting workgroups for Workgroup Scanning To submit a workgroup for Workgroup Scanning, do the following: •
Create (and map) one or more Windows scanning credentials. More info on credentials can be found on page 22, in the chapter Scanning credentials.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure Workgroup Scanning for.
39/169
www.lansweeper.com If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
•
Check the box Enable Workgroup Scanning in the Workgroup Scanning section of the scanning server you would like to configure.
•
In the same web console section, hit the Add Workgroup button.
•
Enter the name of your workgroup into the popup window and hit the Ok button.
Editing workgroups submitted for Workgroup Scanning To edit a workgroup you’ve submitted for Workgroup Scanning, do the following: •
Browse to the Configuration\Scanning Setup\Scanning Methods\Workgroup Scanning section of the Lansweeper web console.
•
Place your cursor in the line you want to edit and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Removing workgroups from Workgroup Scanning To remove a workgroup from Workgroup Scanning, do the following: •
Browse to the Configuration\Scanning Setup\Scanning Methods\Workgroup Scanning section of the Lansweeper web console.
40/169
www.lansweeper.com
•
Hit the red button next to the workgroup you would like to remove.
Removing a workgroup from Workgroup Scanning does not automatically remove computers from your database that had already been scanned for that workgroup. If you wish to remove the computers as well, follow the instructions on page 118, in the chapter Deleting assets .
Troubleshooting Workgroup Scanning problems Workgroup Scanning may fail to detect a computer if: •
The computer is not visible in your Network browser.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
Workgroup Scanning may display a scanning error for a computer if: •
The computer is offline.
•
Your scanning credential does not have administrative privileges on the computer.
•
Your scanning credential’s password is incorrect or has expired.
•
The computer’s firewall is not properly configured for scanning.
•
The computer is running Windows Vista, Windows 7 or Windows 8 and User Account Control (UAC) is enabled.
•
The computer’s security model is not set to Classic.
•
The computer’s name cannot be resolved to the correct IP address.
•
DCOM is disabled on the computer or the computer’s DCOM permissions are incorrect.
•
Windows Management Instrumentation (WMI) is not running or corrupt on the computer.
41/169
www.lansweeper.com
IP Range Scanning
IP Range Scanning is unavailable in the freeware version of Lansweeper.
What is IP Range Scanning IP Range Scanning is an agentless scanning method suitable for scanning Linux, Unix, Mac and Windows computers, VMware servers and other network devices. Examples of other network devices are NAS devices, printers, routers, switches etc. To scan network devices like printers and routers, one or more of the following protocols must be enabled on the devices: FTP, HTTP, HTTPS, JetDirect, SIP, SMTP, SNMP (SNMPv1 or SNMPv2), SSH or Telnet. Windows computers submitted for IP Range Scanning can belong to a domain or a workgroup. IP Range Scanning allows you to scan an unlimited number of assets in an unlimited number of IP ranges. You can submit your IP ranges for scanning and specify a separate schedule for each. At the scheduled times, IP Range Scanning adds the IP ranges you’ve submitted to your scanning queue. They are scanned when any previously initiated scans have finished.
Quick overview IP RANGE SCANNING…
• scans Linux and Unix computers • scans Mac computers ASSET TYPES
• scans computers running Windows 2000 or higher, any edition other than Home • scans VMware servers • scans other network devices
NETWORK TYPES
• scans IP ranges • scans Windows domains • scans Windows workgroups updates all asset fields in the Lansweeper
SCANNED DATA
database, except for data you’ve disabled for scanning
42/169
www.lansweeper.com
AGENT/SOFTWARE
requires no agent or software on the assets you wish to scan • requires you to submit one or more scanning
CONFIGURATION
credentials in the Lansweeper web console under Configuration\Scanning Setup\Scanning Credentials • requires you to submit the start and end IP of your IP ranges in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\IP Address Range Scanning
SCAN FILTERS
can be made to exclude certain IP addresses from scanning • scans your IP ranges based on the schedules
SCAN TRIGGERS
specified by you • can be made to perform an immediate scan of your IP ranges • will generally scan an asset once a day at most, if that asset is part of just one IP range
SCAN FREQUENCY
and you do not manually trigger scanning • can be made to scan an asset multiple times per day, if the asset is part of several IP ranges
Submitting IP ranges for IP Range Scanning To submit an IP range for IP Range Scanning, do the following: •
Create one or more scanning credentials. More info on scanning credentials can be found on page 22, in the chapter Scanning credentials.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
43/169
www.lansweeper.com
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure IP Range Scanning for. If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
•
Hit the Add IP Range button in the IP Address Range Scanning section of the scanning server you would like to configure.
•
Enter the IP address that starts the range and the IP address that ends the range into the popup window and hit the Ok button.
•
Hit the green (+) button in the Credentials column of the IP range, select one or more credentials you would like to map to the range and hit the Add button.
44/169
www.lansweeper.com -
To map multiple credentials, hold down Shift and left-click the credentials you need.
-
You can map credentials of any type: Windows credentials, SNMP credentials, SSH credentials and VMware credentials.
-
When Lansweeper scans the IP range, it will first determine the asset type of the assets it encounters. It will then try to scan the assets using the credentials that you mapped to the IP range and that match their asset type.
-
Credentials are tried in the order in which they are displayed. In the example below, Lansweeper will first try to use the Windows3 credential to scan Windows computers, then the Windows1 credential.
-
Once you’ve mapped your credentials, you can change the order in which they are tried by grabbing (left-click and hold) a credential in the Credentials column and dragging it to a new position in the credentials list.
-
To unmap a credential from an IP range, hit the red button in the Credentials column and next to the credential you want to unmap.
Editing IP ranges submitted for IP Range Scanning When you submit an IP range for IP Range Scanning in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\IP Address Range Scanning, you’ll notice that the range has the settings listed below. Enable Check/uncheck this box to enable/disable scanning of the specified IP range.
Unchecking this box is useful if you want to disable scanning of an IP range, without deleting the range from your configuration.
45/169
www.lansweeper.com Start IP This is the IP address that starts the IP range. To change this value: •
Place your cursor in the Start IP value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
End IP This is the IP address that ends the IP range. To change this value: •
Place your cursor in the End IP value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Time-out This value indicates the amount of time, in seconds, Lansweeper will spend trying to ping an IP address before deeming the IP address unreachable and moving on to the next IP.
In high traffic networks it is recommended that you increase the time-out value by several seconds.
No Ping When this option is checked, Lansweeper will try to scan all IP addresses in the IP range, regardless of whether or not they can be pinged.
It is recommended that you leave No Ping unchecked. Checking this option will slow down scanning.
No Windows When this option is checked, no Windows computers will be scanned for the IP range.
Checking No Windows is useful if you are already using other scanning methods to scan Windows computers.
46/169
www.lansweeper.com
You can then opt to use IP Range Scanning just to scan Linux, Unix and Mac computers, VMware servers and other network devices.
Schedule Hit the Show schedule button to show your IP range’s scanning schedule. This schedule determines when the specified range will be scanned. •
Check/uncheck the box in front of a weekday to disable scanning on that day.
•
Open the dropdown next to a weekday to select a different time for the scheduled scan.
IP Range Scanning buttons The Configuration\Scanning Setup\Scanning Methods\IP Address Range Scanning section of the Lansweeper web console includes the buttons listed below.
Add IP Range Hit this button to submit a new IP range for IP Range Scanning.
Scan all Enabled IP ranges now Hit this button to immediately add all IP ranges that are enabled to your scanning queue, regardless of what their schedules are. Your ranges’ IP addresses will be scanned when any previously initiated scans have finished.
An IP range whose Enabled checkbox is unchecked will not be added to your scanning queue.
47/169
www.lansweeper.com Disable all ipranges Hit this button to uncheck the Enabled checkbox for all of your IP ranges. Your ranges will no longer be scanned, but their configuration will not be removed from the Lansweeper web console. Expand all schedules Hit this button to expand the schedules of all of the IP ranges you’ve submitted, giving you a better overview and allowing for easy configuration. Add IP Address to exclude Hit this button to add an IP exclusion to IP Range Scanning. By default, IP Range Scanning scans the IP ranges you submit entirely. You can however specify that certain IP addresses should not be scanned. Do the following: •
Hit the Add IP Address to exclude button.
•
Enter an IP address into the popup window and hit the Ok button. Note that you can only add specific IP addresses to your exclusions; you cannot exclude IP ranges.
Removing IP ranges from IP Range Scanning To remove an IP range from IP Range Scanning, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods\IP Address Range Scanning
•
Hit the red button next to the Schedule column and next to the range you want to remove.
Removing an IP range from IP Range Scanning does not automatically remove assets from your database that had already been scanned for that IP range.
48/169
www.lansweeper.com
If you wish to remove the assets as well, follow the instructions on page 118, in the chapter Deleting assets.
Troubleshooting IP Range Scanning problems IP Range Scanning may fail to detect a Linux, Unix, Mac computer or VMware server if: •
The asset is offline at the time of the scheduled IP range scan.
•
SSH is not enabled on the asset.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
IP Range Scanning may display a scanning error for a Linux, Unix, Mac computer or VMware server if: •
The SSH credential submitted for the asset is invalid.
•
Your SSH credential’s password has changed.
IP Range Scanning may fail to detect a Windows computer if: •
The computer is offline at the time of the scheduled IP range scan.
•
The computer’s firewall is not properly configured for scanning.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
IP Range Scanning may display a scanning error for a Windows computer if: •
The computer is offline at the time of the scheduled IP range scan.
•
Your scanning credential does not have administrative privileges on the computer.
•
Your scanning credential’s password is incorrect or has expired.
•
The computer’s firewall is not properly configured for scanning.
•
The computer is in a workgroup, running Windows Vista, Windows 7 or Windows 8 and User Account Control (UAC) is enabled.
•
The computer is in a workgroup and its security model is not set to Classic.
•
DCOM is disabled on the computer or the computer’s DCOM permissions are incorrect.
•
Windows Management Instrumentation (WMI) is not running or corrupt on the computer.
49/169
www.lansweeper.com IP Range Scanning may fail to detect other network devices if: •
The device is offline at the time of the scheduled IP range scan.
•
None of the following protocols are enabled on the device: FTP, HTTP, HTTPS, JetDirect, SIP, SMTP, SNMP (SNMPv1 or SNMPv2), SSH or Telnet.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
50/169
www.lansweeper.com
Scheduled Scanning
Scheduled Scanning is unavailable in the freeware version of Lansweeper.
What is Scheduled Scanning Scheduled Scanning is an agentless scanning method suitable for scanning Windows computers that are part of a domain or a workgroup. Scheduled Scanning allows you to scan an unlimited number of Windows computers. You submit computer OUs or individual (domain or workgroup) computers for scanning and can specify a separate schedule for each scan target. At the scheduled times, Scheduled Scanning adds the computer OUs and individual computers you’ve submitted to your scanning queue. They are scanned when any previously initiated scans have finished.
Quick overview SCHEDULED SCANNING…
ASSET TYPES
NETWORK TYPES
scans computers running Windows 2000 or higher, any edition other than Home • scans Windows domains • scans Windows workgroups updates all Windows computer and user fields in
SCANNED DATA
the Lansweeper database, except for data you’ve disabled for scanning
AGENT/SOFTWARE
requires no agent or software on the computers you wish to scan • requires you to create and map one or more
CONFIGURATION
scanning credentials in the Lansweeper web console under Configuration\Scanning Setup\Scanning Credentials
51/169
www.lansweeper.com
• requires you to submit computer OUs or NetBIOS names of individual computers in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Scheduled Computer Scanning • is a filtered scanning method, only scanning the specific computer OUs and individual SCAN FILTERS
computers you’ve submitted for scanning • when you submit the correct path, can be made to scan an entire domain • scans your computer OUs and individual
SCAN TRIGGERS
computers based on the schedules specified by you • can be made to perform an immediate scan of a scan target • will generally scan an asset once a day at most, if that asset is part of just one scan
SCAN FREQUENCY
target and you do not manually trigger scanning • can be made to scan an asset multiple times per day, if the asset is part of several targets
Submitting computer OUs or individual computers for Scheduled Scanning To submit a computer OU or individual computer for Scheduled Scanning, do the following: •
Create (and map) one or more Windows scanning credentials. More info on scanning credentials can be found on page 22, in the chapter Scanning credentials.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
52/169
www.lansweeper.com
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure Scheduled Scanning for. If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
•
Hit the Add Target button in the Scheduled Computer Scanning section of the scanning server you would like to configure.
•
•
Select the appropriate scan type from the Scantype dropdown in the popup window. -
ADSI path is for scanning domain computer OUs.
-
Computer is for scanning individual domain or workgroup computers.
Enter one of the combinations below into the Target and Domain fields and hit Ok -
Computer OU and NetBIOS name of the domain this OU belongs to
-
NetBIOS name of a computer and NetBIOS name of the computer’s domain
-
NetBIOS name of a computer and name of the computer’s workgroup
53/169
www.lansweeper.com
When you submit an OU for Scheduled Scanning, Lansweeper scans that OU and any OUs contained within it at the scheduled time.
Editing scan targets submitted for Scheduled Scanning When you submit a computer OU or individual computer in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Scheduled Computer Scanning, you’ll notice that the scan target has the settings and options listed below.
Enable Check/uncheck this box to enable/disable scanning of the specified scan target.
Unchecking this box is useful if you want to temporarily disable scanning of a scan target, without deleting the target from your configuration.
Scan This is the scan type of the scan target you’ve submitted. Your scan type value can either be Computer or ADSI path.
You cannot change a scan target’s type once you’ve submitted the scan target. If you wish to change a scan target’s type, delete the target and create a new target instead.
54/169
www.lansweeper.com Target This is the computer OU or computer NetBIOS name you’ve submitted for scanning. To change this value: •
Place your cursor in the Target value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Domain (Netbios) This is the (NetBIOS) name of the domain or workgroup your computer OU or individual computer belongs to. To change this value: •
Place your cursor in the Domain value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Schedule Hit the Show schedule button to show your scan target’s scanning schedule. This schedule determines when the specified target will be scanned. •
Check/uncheck the box in front of a weekday to disable scanning on that day.
•
Open the dropdown next to a weekday to select a different time for the scheduled scan.
Scan now Hit the Scan now button to immediately add the specified OU or individual computer to your scanning queue. The scan target will be scanned when any previously initiated scans have finished.
55/169
www.lansweeper.com
Scheduled Scanning buttons The Configuration\Scanning Setup\Scanning Methods\Scheduled Computer Scanning section of the Lansweeper web console includes the following buttons: Add Target Hit this button to submit a new scan target for Scheduled Scanning. Expand all schedules Hit this button to expand the schedules of all of the scan targets you’ve submitted, giving you a better overview and allowing for easy configuration.
Removing scan targets from Scheduled Scanning To remove a scan target from Scheduled Scanning, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods\Scheduled Computer Scanning
•
Hit the red button next to the Schedule column and next to the target you want to remove.
Removing a scan target from Scheduled Scanning does not automatically remove computers from your database that had already been scanned for that target. If you wish to remove the computers as well, follow the instructions on page 118, in the chapter Deleting assets .
Troubleshooting Scheduled Scanning problems Scheduled Scanning may fail to detect a computer if: •
The computer is offline at the time of the scheduled scan.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
56/169
www.lansweeper.com Scheduled Scanning may display a scanning error for a computer if: •
The computer is offline at the time of the scheduled scan.
•
Your scanning credential does not have administrative privileges on the computer.
•
Your scanning credential’s password is incorrect or has expired.
•
The computer’s firewall is not properly configured for scanning.
•
The computer’s name cannot be resolved to the correct IP address.
•
DCOM is disabled on the computer or the computer’s DCOM permissions are incorrect.
•
Windows Management Instrumentation (WMI) is not running or corrupt on the computer.
57/169
www.lansweeper.com
Domain User Scanning
Domain User Scanning is unavailable in the freeware version of Lansweeper.
What is Domain User Scanning Domain User Scanning is an agentless scanning method suitable for scanning user OUs that are part of a Windows Active Directory domain. Domain User Scanning only scans users, not computers. Domain User Scanning allows you to scan an unlimited number of user OUs in an unlimited number of domains. You submit user OUs for scanning and can specify a separate schedule for each. At the scheduled times, Domain User Scanning scans the users present in the user OUs you’ve submitted.
Quick overview DOMAIN USER SCANNING…
ASSET TYPES
NETWORK TYPES
SCANNED DATA
AGENT/SOFTWARE
only scans users, not computers scans Windows Active Directory domains updates all Windows user fields in the Lansweeper database requires no agent or software on your domain controllers • requires you to create and map one or more
CONFIGURATION
scanning credentials in the Lansweeper web console under Configuration\Scanning Setup\Scanning Credentials • requires you to submit user OUs in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Domain User Scanning
58/169
www.lansweeper.com
• is a filtered scanning method, only scanning the specific user OUs you’ve submitted for scanning
SCAN FILTERS
• when you submit the correct target, can be made to scan all users in a domain • scans your user OUs based on the schedules SCAN TRIGGERS
specified by you • can be made to perform an immediate scan of a user OU • will generally scan a user OU once a day at most, if that OU is part of just one scan target
SCAN FREQUENCY
and you do not manually trigger scanning • can be made to scan a user OU multiple times per day, if this OU is part of several OUs you’ve submitted for scanning
Submitting user OUs for Domain User Scanning To submit a user OU for Domain User Scanning, do the following: •
Create (and map) one or more Windows scanning credentials. More info on credentials can be found on page 22, in the chapter Scanning credentials.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure Domain User Scanning for. If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
59/169
www.lansweeper.com
•
Hit the Add Target button in the Domain User Scanning section of the scanning server you would like to configure.
•
Enter a user OU into the ADSI Path field and the NetBIOS name of the domain this user OU belongs to into the Domain field and hit the Ok button.
When you submit a user OU for Domain User Scanning, Lansweeper scans that OU and any OUs contained within it at the scheduled time.
Editing user OUs submitted for Domain User Scanning When you submit a user OU in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Domain User Scanning, you’ll notice that the user OU has the settings and options listed below.
60/169
www.lansweeper.com Enable Check/uncheck this box to enable/disable scanning of the specified user OU.
Unchecking this box is useful if you want to temporarily disable scanning of a user OU, without deleting the OU from your configuration.
Target This is the user OU you’ve submitted for scanning. To change this value: •
Place your cursor in the Target value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Domain (Netbios) This is the NetBIOS name of the domain the user OU you’ve submitted belongs to. To change this value: •
Place your cursor in the Domain value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Schedule Hit the Show schedule button to show your user OU’s scanning schedule. This schedule determines when the specified user OU will be scanned. •
Check/uncheck the box in front of a weekday to disable scanning on that day.
•
Open the dropdown next to a weekday to select a different time for the scheduled scan.
61/169
www.lansweeper.com Scan now Hit the Scan now button to immediately scan the specified user OU.
Domain User Scanning buttons The Configuration\Scanning Setup\Scanning Methods\Domain User Scanning section of the Lansweeper web console includes the following buttons:
Add Target Hit this button to submit a new user OU for Domain User Scanning.
Expand all schedules Hit this button to expand the schedules of all of the user OUs you’ve submitted, giving you a better overview and allowing for easy configuration.
Viewing scanned domain user information You can review scanned domain user information in several ways: •
By typing a username into the Lansweeper web console search bar. Clicking the search result will take you to the specified user’s Lansweeper webpage.
•
In the built-in Active Directory User Departments and Active Directory Users OU widgets.
•
In the built-in domain user reports.
•
By building a custom report. Scanned domain user information is stored in the tblADusers database table.
62/169
www.lansweeper.com
Troubleshooting Domain User Scanning problems Domain User Scanning may fail to detect a domain user if: •
Your domain controller cannot be reached.
•
Your scanning credential does not have read-only access to Active Directory.
•
Your scanning credential’s password is incorrect or has expired.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
63/169
www.lansweeper.com
Eventlog Scanning
Eventlog Scanning is unavailable in the freeware version of Lansweeper.
What is Eventlog Scanning Eventlog Scanning is an agentless scanning method suitable for scanning the event log entries of Windows domain or workgroup computers. Eventlog Scanning only scans event log information; it does not scan any other computer data.
To keep your database as small as possible, Eventlog Scanning and other Windows scanning methods only scan error events by default. If you wish to scan additional event types, follow the instructions on the next page, in the chapter Enabling event types for scanning.
While all Windows scanning methods scan event log entries, most of these methods rescan your computers once a day at most. Eventlog Scanning can scan your machines as often as once a minute. This allows you to constantly monitor important Windows servers or workstations. You can review events as they happen and optionally configure real-time email alerts for certain events. You submit computer OUs or individual (domain or workgroup) computers for Eventlog Scanning and can specify a separate scan interval for each scan target. At the scheduled times, Eventlog Scanning adds the computer OUs and individual computers you’ve submitted to your scanning queue. The computers’ event logs are scanned when any previously initiated scans have finished.
Quick overview
EVENTLOG SCANNING…
ASSET TYPES
scans computers running Windows XP or higher, any edition other than Home
64/169
www.lansweeper.com
NETWORK TYPES
SCANNED DATA
AGENT/SOFTWARE
• scans Windows domains • scans Windows workgroups only scans Windows event log entries; no other data is included for scanning requires no agent or software on the computers you wish to scan • requires you to create and map one or more
CONFIGURATION
scanning credentials in the Lansweeper web console under Configuration\Scanning Setup\Scanning Credentials • requires you to submit computer OUs or NetBIOS names of individual computers in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Scheduled Eventlog Scanning
SCAN FILTERS
is a filtered scanning method, only scanning the specific computer OUs and individual computers you’ve submitted for scanning scans your computer OUs and individual
SCAN TRIGGERS
computers based on the scan intervals specified by you has flexible scanning schedules, allowing you to
SCAN FREQUENCY
scan a unique computer once a minute, once an hour, once a day…
Enabling event types for scanning To keep your database as small as possible, Eventlog Scanning and other Windows scanning methods only scan error events by default. If you wish to scan additional event types, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Server Options
65/169
www.lansweeper.com
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure. If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
•
Tick the boxes of the event types you would like to enable, in the Eventlog Scanning section of your scanning server.
Enabling additional event types can greatly increase the size of your database over time and negatively impact performance. It is recommended that you leave as many event types disabled as possible.
Submitting computer OUs or individual computers for Eventlog Scanning To submit a computer OU or individual computer for Eventlog Scanning, do the following: •
Create (and map) one or more Windows scanning credentials. More info on scanning credentials can be found on page 22, in the chapter Scanning credentials.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
66/169
www.lansweeper.com
•
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the scanning server you would like to configure Eventlog Scanning for. If you do not own a Lansweeper Enterprise license, you can only have one scanning server and you do not need to select a tab.
•
Hit the Add Target button in the Scheduled Eventlog Scanning section of the scanning server you would like to configure.
•
•
Select the appropriate scan type from the Scantype dropdown in the popup window. -
ADSI path is for scanning domain computer OUs.
-
Computer is for scanning individual domain or workgroup computers.
Enter one of the combinations below into the Target and Domain fields and hit Ok -
Computer OU and NetBIOS name of the domain this OU belongs to
-
NetBIOS name of a computer and NetBIOS name of the computer’s domain
-
NetBIOS name of a computer and name of the computer’s workgroup
67/169
www.lansweeper.com
When you submit an OU for Eventlog Scanning, Lansweeper scans that OU and any OUs contained within it at the scheduled time.
Editing scan targets submitted for Eventlog Scanning When you submit a computer OU or individual computer in the Lansweeper web console under Configuration\Scanning Setup\Scanning Methods\Scheduled Eventlog Scanning, you’ll notice that the scan target has the settings listed below.
Enabled Check/uncheck this box to enable/disable scanning of the specified scan target.
Unchecking this box is useful if you want to temporarily disable scanning of a scan target, without deleting it from your configuration.
Recurring and M/H These settings determine how often the scan target is scanned. You can scan a computer OU or individual computer as often as once a minute or as infrequently as once every few hours.
68/169
www.lansweeper.com
•
To scan a target once every few hours, select Hour from the M/H dropdown.
•
To scan a target once every few minutes, select Minutes from the M/H dropdown.
•
To specify how many hours or minutes Lansweeper should wait to scan the target again, place your cursor in the Recurring value, type a number and hit Enter to save your change.
Looking at the screenshot on the previous page, we can see that computer LAN-001 will be scanned once a minute, computer XP32 will be scanned once every 3 hours. Scan This is the scan type of the scan target you’ve submitted. Your scan type value can either be Computer or ADSI path. You cannot change a scan target’s type once you’ve submitted the scan target. If you wish to change a scan target’s type, delete the target and create a new target instead.
Target This is the computer OU or computer NetBIOS name you’ve submitted for scanning. To change this value: •
Place your cursor in the Target value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Domain (Netbios) This is the (NetBIOS) name of the domain or workgroup your computer OU or individual computer belongs to. To change this value: •
Place your cursor in the Domain value and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
Removing scan targets from Eventlog Scanning To remove a scan target from Eventlog Scanning, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods\Scheduled Eventlog Scanning
69/169
www.lansweeper.com
•
Hit the red button next to the Schedule column and next to the target you want to remove.
Removing a scan target from Eventlog Scanning does not automatically remove event log information from your database that had already been collected for that target.
Viewing scanned event log information You can review scanned event log information in several ways: •
In the Event log tab of a Windows computer’s Lansweeper webpage. More info on finding specific assets can be found on page 85, in the chapter Viewing scanned asset data.
•
In the built-in Chart report, Event Filter and Event Summary widgets.
•
By building a custom report. Scanned event log information is stored in the tblNtlog, tblNtlogFile, tblNtlogMessage, tblNtlogSource and tblNtloguser database tables.
Setting up email event log alerts Your Lansweeper installation allows you to set up email event log alerts. When an event of your choice is scanned, an email will be sent to one or more email addresses. If you rescan event log information once a minute, using Eventlog Scanning, this means that you’ll receive nearinstantaneous notifications when an important event occurs. Instructions on how to configure email event log alerts can be found on page 139, in the chapter Setting up event log alerts.
70/169
www.lansweeper.com
Ignoring event log entries during scanning By default, Eventlog Scanning and other Windows scanning methods scan all events of the type(s) you’ve enabled. When you begin scanning, you may notice certain recurring events that you are not interested in reporting on however. To ignore certain events during scanning, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Custom Scanning
•
Hit the Add event to ignore button in the Eventlog ignore section.
•
Select the event you would like to ignore in the popup window and hit the Ok button. The specified event will no longer be scanned and will no longer be added to your database.
-
To stop ignoring an event, hit the red button next to the EventID column and next to the event you want to stop ignoring.
-
To edit an event you’re ignoring, place your cursor in the EventSource or EventID value, make the desired change and hit Enter while your cursor is still present in the line to save the change.
If you wish to ignore an event that hasn’t been scanned yet, add a scanned event to the Eventlog Ignore section of the web console. Then change its EventSource and EventID to what you need them to be.
71/169
www.lansweeper.com
Troubleshooting Eventlog Scanning problems Eventlog Scanning may fail to scan a computer’s event log information if: •
The computer is offline at the time of the scheduled scan.
•
Your Lansweeper service has stopped.
•
Your Lansweeper database is full.
Eventlog Scanning may display a scanning error for a computer if: •
The computer is offline at the time of the scheduled scan.
•
Your scanning credential does not have administrative privileges on the computer.
•
Your scanning credential’s password is incorrect or has expired.
•
The computer’s firewall is not properly configured for scanning.
•
The computer’s name cannot be resolved to the correct IP address.
•
DCOM is disabled on the computer or the computer’s DCOM permissions are incorrect.
•
Windows Management Instrumentation (WMI) is not running or corrupt on the computer.
72/169
www.lansweeper.com
LsPush This scanning method is not available in the freeware version of Lansweeper.
The LsPush.exe can be used on client machines to initiate a scan. It takes a full local inventory of the client machine by itself and does not rely on the Lansweeper service to perform the scan. This makes it ideal for scanning the computers of your remote workers. LsPush is best deployed using a logon script or GPO. Scan results can automatically be integrated into the database through a direct server connection with the Lansweeper service. They can also be sent through email or stored in a file to be imported into the database later. LsPush can automatically open the default mail program on the computer, attaching the scan results to a new email message.
This scanning method offers many advantages: -
No administrative privileges required. No more problems with inbound firewalls or RPC server unavailable.
-
No more remote “access denied” problems. Works with Windows Home versions. Can be used in logon scripts/scheduled jobs/custom scripts… A full scan takes only 40KB of traffic.
How does it work? During installation, the LsPush.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Client
73/169
www.lansweeper.com Using LsPush with direct server connection Syntax lspush.exe “servername” “port” /showresult “servername” This refers to the name of the server where the Lansweeper service is installed. “port” This is optional. The default port is 9524. /showresult Used for testing purposes. You will get a message back, “Success” or “Failed”, based on whether or not the connection to the server could be established. Some examples, to be run from a command prompt: C:\>”Program Files\Lansweeper\Client\lspush.exe” myserver C:\>”Program Files\Lansweeper\Client\lspush.exe” myserver 9500 C:\>”Program Files\Lansweeper\Client\lspush.exe” 192.168.1.50 /showresult
Using LsPush with email Run the LsPush.exe without any extra parameters. You will see a progress window for the scan being performed.
When the scan completes, MAPI is used to open the default mail program and attach the scan results to a new email message.
The administrator can copy the file to his Lansweeper import folder, where the service will process it. The path is: %Program Files%\Lansweeper\Service\import
74/169
www.lansweeper.com
Using LsPush with file export Run the LsPush.exe with the parameter /file Example: C:\>”Program Files\Lansweeper\Client\lspush.exe” /file You will see a progress window for the scan being performed.
After the scan completes, the temporary folder will be opened with the result.
The administrator can copy the file to his Lansweeper import folder, where the service will process it. The path is: %Program Files%\Lansweeper\Service\import
Using LsPush with direct copy to folder Run the LsPush.exe with the parameter /folder Example: C:\>”Program Files\Lansweeper\Client\lspush.exe” /folder “c:\temp\foldername” C:\>”Program Files\Lansweeper\Client\lspush.exe” /folder “\\servername\sharedfolder”
Using LsPush in a standard logon script In this example the startup script is called “startup.cmd”.
75/169
www.lansweeper.com
Example contents of the startup.cmd: %logonserver%\netlogon\lspush.exe myserver
Now copy the LsPush.exe to your netlogon folder.
Deploying LsPush using a GPO More technical information can be found in this knowledge base article: http://support.microsoft.com/kb/322241/en-us
Make sure you use a logon script instead of a startup script, because this is running in the context of the user.
76/169
www.lansweeper.com
A vbs script that runs LsPush hidden could look like this: Set WshShell = CreateObject(“Wscript.Shell”) WshShell.run “%logonserver%\netlogon\lspush.exe myserver”,0
77/169
www.lansweeper.com
LsClient This is the only scanning method available in the freeware version of Lansweeper.
The LsClient.exe can be used on client machines to initiate a scan and is in that regard similar to LsPush. The difference is that, although the name would suggest otherwise, LsClient is no real client or agent. Basically it just sends a message to the server “hello, I’m here, scan me on this IP address” and stops working. The service queues this request and starts scanning the client when ready. All the scanning is done by the Lansweeper service. Wherever possible, we recommend using LsPush instead of LsClient. Since LsPush performs scans locally, it is much less vulnerable to access denied and firewall issues. Read about the other advantages of LsPush on page 32 of this documentation.
How does it work? During installation, the LsClient.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Client Syntax lsclient.exe “servername” “port” /showresult
78/169
www.lansweeper.com “servername” This refers to the name of the server where the Lansweeper service is installed. “port” This is optional. The default port is 9524. /showresult Used for testing purposes. You will get a message back, “Succeeded” or “Failed”, based on whether or not the connection to the server could be established. /scanonip This is a new option. You can use it if you have VPN clients and want to scan them on the IP address they currently have without the need to have DNS updated. Some examples, to be run from a command prompt: C:\>”Program Files\Lansweeper\Client\lsclient.exe” myserver C:\>”Program Files\Lansweeper\Client\lsclient.exe” myserver /showresult
Using LsClient in a standard logon script In this example the startup script is called “startup.cmd”.
Example contents of the startup.cmd: %logonserver%\netlogon\lsclient.exe myserver
Now copy the LsClient.exe to your netlogon folder.
79/169
www.lansweeper.com
80/169
www.lansweeper.com Deploying LsClient using a GPO More technical information can be found in this knowledge base article: http://support.microsoft.com/kb/322241/en-us
Make sure you use a logon script instead of a startup script, because this is running in the context of the user.
A vbs script that runs LsClient hidden could look like this: Set WshShell = CreateObject(“Wscript.Shell”) WshShell.run “%logonserver%\netlogon\lsclient.exe myserver”,0
81/169
www.lansweeper.com
Scan frequency How often is specific data scanned To avoid unnecessary network traffic during non-agent based scanning, not all Windows computer data is rescanned all the time. Each scan item runs on its own schedule. Examples of scan items are: BIOS, memory, software, operating system and processor information. Since your computer’s operating system does not change on a regular basis, it makes sense for instance not to rescan this data on a daily basis. By default, operating system data is rescanned once every 3 days at most. You can however reconfigure how often specific scan items are scanned.
To configure how often scan items are scanned, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Item Wait Time
•
Place your cursor in the Refresh (X days) value of a particular scan item, make the desired change and hit Enter while your cursor is still present in the line to save the change.
-
A value of 5 means that, when a Windows computer is rescanned, the specified scan item will only be scanned if it hasn’t been updated in the last 5 days.
-
A value of 1 means that, when a Windows computer is rescanned, the specified scan item will only be scanned if it hasn’t been updated in the last day.
82/169
www.lansweeper.com -
A value of 0 means that, when a Windows computer is rescanned, the specified scan item will always be scanned.
-
Scan items marked in red are disabled and will never be scanned. You can tick the Enable checkbox to enable them.
•
Scan items marked in gray cannot be disabled.
When you browse to a Windows computer’s Lansweeper webpage and open the Scan time tab, you can see when a specific scan item was last rescanned for that computer.
•
The scanning methods listed below take scan item schedules into account. When Active Scanning rescans a Windows computer for instance, it will (by default) only scan OS information if that data hasn’t been updated in the last 3 days.
•
-
Active Scanning
-
Workgroup Scanning
-
IP Range Scanning
-
Scheduled Scanning
-
LsClient
The scanning methods listed below DO NOT take scan item schedules into account. When LsPush rescans a Windows computer for instance, it will always scan all scan items, regardless of what their schedules are. -
Domain User Scanning, as it only scans users
-
Eventlog Scanning
-
Rescan
-
LsPush
Item schedules only dictate which data is updated when a Windows computer is rescanned. If a computer is no longer submitted for scanning, it will not be rescanned and its scan items will not be updated.
83/169
www.lansweeper.com
Make sure your computers are submitted for a scanning method listed on page 30, in the chapter Scanning Methods.
There are no item schedules for Linux, Unix and Mac computers, VMware servers and network devices. Data collected for these machines is always completely rescanned when the machine is rescanned.
84/169
www.lansweeper.com
Managing assets Viewing scanned asset data Each asset (computer, server or network device) has its own page within the Lansweeper web console, where you can review scanned data and perform administrative tasks. You can locate asset pages by performing a search or browsing one of the asset overviews. In addition, you can use reports or one of the many available widgets to look at your network as a whole.
If you can’t find a particular asset in the Lansweeper web console, make sure it is submitted for one or more of the scanning methods listed on page 30, in the chapter Scanning methods. The asset may also still be queued for scanning.
Searching for asset pages To locate a specific asset page within the Lansweeper web console, do the following: •
Enter any of the following asset information into the web console search bar: - (NetBIOS) name - IP address - MAC address - Serial number - Asset tag - Local Windows computer description - Domain or workgroup name - Domain computer OU - Bar code (manually submitted) - Order number (manually submitted) - Any value present in the Custom1 through Custom20 fields (manually submitted)
85/169
www.lansweeper.com
•
Click on one of the search results in the dropdown list.
•
Alternatively, you can hit Enter while your cursor is present in the search bar to view a more comprehensive list of search results and click a result from there.
•
You will be presented with the asset’s Lansweeper webpage. This page provides a detailed overview of scanned asset information, in several tabs, though additional data can be retrieved through reports. A list of available administrative tasks is also displayed on the left.
Browsing asset overviews The Lansweeper web console automatically sorts your assets into various overviews. Hover over the Assets link at the top of the Lansweeper web console to see the available overviews. A short explanation of each overview can be found on the next page.
86/169
www.lansweeper.com
•
Domains This overview sorts Windows computers into the various domains and workgroups they belong to. Click on the name of a domain or workgroup to see a list of Windows computers contained within and some basic information on them. From a domain list, you can click through to a specific asset webpage by clicking on the name of the asset.
•
Asset types This overview sorts all of your assets into their various asset types. Click on an asset type to see a list of assets of that type and some basic information on them. From an asset type list, you can click through to a specific asset webpage by clicking on the name of the asset. Lansweeper automatically tries to identify an asset’s type during scanning by pulling data from various protocols. You can however manually override scanned asset type information. More info on this topic can be found on page 107, in the chapter Changing asset types.
•
Asset groups This overview sorts all of your assets into the various asset groups you’ve created. Click on the name of a group to see a list of assets contained within and some basic info on them. From an asset group list, you can click through to a specific asset webpage by clicking on the name of the asset. If you haven’t created any groups, all assets are listed under Default group. More info on creating and managing custom asset groups can be found on page 112, in the chapter Grouping assets.
•
IP locations This overview sorts all of your assets into the various IP locations you’ve created. Click on a location to see a list of assets contained within and some basic information on them. From an IP location list, you can click through to a specific asset webpage by clicking on the name of the asset.
87/169
www.lansweeper.com When you create an IP location, you assign a name to a particular IP range. If you haven’t created any IP locations, all assets are listed under Undefined. More info on creating and managing IP locations can be found on page 116, in the chapter Grouping assets.
Other ways to view scanned asset data Instead of looking at individual asset webpages, you can also use reports or widgets to review scanned data. Your Lansweeper installation comes packed with many reports and widgets. You can also build your own.
88/169
www.lansweeper.com
Rescanning assets If your assets are submitted for one or more of the scanning methods listed on page 30, in the chapter Scanning methods, they will automatically be rescanned on a periodic basis. The scan frequency depends on the exact scanning methods you have enabled and, where applicable, the schedules you have defined for a scanning method. If you’ve made any configuration changes to an asset however, you may wish to immediately rescan the asset, without waiting for any scheduled scans to kick in. Rescanning assets is quick and easy through the Lansweeper web console.
Rescanning individual assets To rescan just one specific asset, do the following: •
Browse to the asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Rescan Asset button on the left side of the web console, under Asset Options
•
After a few seconds, the asset’s scan status will update to either Queued: (number) or Scan in progress
89/169
www.lansweeper.com -
If the asset’s scan status is Queued: (number), that means the asset cannot immediately be rescanned because other scans are in progress that have priority. The number included in the scan status indicates the asset’s position in the queue. Looking at the example on the previous page, we can see that computer LAN-001 was initially at position 7 in the queue. Six other assets needed to be scanned before LAN-001 could be rescanned.
-
The asset’s scan status will update to Scan in progress after a while, indicating that the asset is being scanned.
•
When the scan has completed, the asset page will automatically refresh to show the asset’s most recently scanned information.
-
If the asset’s last seen date has updated to the current date and time, the asset was successfully rescanned.
-
If the asset’s last seen date has not updated, the asset could not be rescanned. It is likely offline and you can try rescanning at a later time.
Rescanning multiple assets To rescan multiple assets at once, do the following: •
Click the Assets link at the top of the Lansweeper web console. You will be presented with a list of all scanned assets.
90/169
www.lansweeper.com
•
Tick the checkboxes in front of the assets you would like to rescan.
-
You can perform a search on one of the columns to more easily find specific assets. In the example above, we filtered the Domain column to only list assets within the lansweeper domain.
-
You could also tick the checkbox at the very top to select all assets.
•
Hit the Rescan button on the left side of the web console, under Options
•
You can view the progress of the scans you’ve initiated in your scanning queue, found in the following section of the web console: Configuration\Scanning Setup\Scanning Queue
•
When a scan has completed, the asset’s page will automatically refresh to show the asset’s most recently scanned information.
-
If an asset’s last seen date has updated to the current date and time, the asset was successfully rescanned.
91/169
www.lansweeper.com -
If an asset’s last seen date has not updated, the asset could not be rescanned. It is likely offline and you can try rescanning at a later time.
92/169
www.lansweeper.com
Scanning additional data Your Lansweeper installation scans a variety of asset data by default. For Windows computers for instance, scanned data includes manufacturer, model, operating system, processor, memory, disks, event log entries, software, serial numbers, uptime information and much more! For Windows computers, it is also possible to retrieve additional data by scanning for specific files or registry values. File scanning allows you to check various properties (version, company, size, creation date, last accessed date and last modified date) of a specific file and registry scanning allows you to check what a specific registry value is set to across your Windows computers. Since many settings are stored in a computer’s registry, there are an endless number of things you can report on.
Scanning files In the example below we want to retrieve the file version of iexplore.exe, an Internet Explorer executable, across our various Windows computers. We already know that the executable’s file path is the one below, but want to retrieve the file’s properties across our entire network. PROGRAM FILES (X86)\INTERNET EXPLORER\IEXPLORE.EXE
To scan for this specific file, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Item Wait Time
93/169
www.lansweeper.com
•
Make sure that the Enabled checkbox is ticked for the FILES item, indicating that file scanning is enabled.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Custom Scanning
•
Hit the Add files to scan button in the File Scanning section of the page.
•
Enter the file path of the file you want to scan into the popup window and hit Ok
You can use the parameters below in your file path to make Lansweeper search for the Program Files, Program Files (x86) or Windows directory in any drive on your machines. %programfiles% %programfiles(x86)% %windir%
94/169
www.lansweeper.com
If you use the %programfiles(x86)% parameter and an asset’s OS is 32bit, scanned file information will be the same as if you were using the %programfiles% parameter. To scan files in any directory other than Program Files, Program Files (x86) or the Windows directory, you must submit the exact file path, drive included.
•
Rescan your assets. More info on how to do this can be found on page 89, in the chapter Rescanning assets.
•
To view the scan results for a single asset, browse to the following section of the asset’s Lansweeper webpage: Config\Scanned info\File info More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
-
If a file’s Found value is set to True, that means the file was found on the asset and you can view the file’s properties.
•
If a file’s Found value is set to False, that means the file was not found on the asset.
To view the scan results for all of your assets, run the report on the next page and replace iexplore.exe with the name of any file you’ve submitted for scanning.
95/169
www.lansweeper.com
Select Top 1000000 tsysOS.Image As icon, tblAssets.AssetID, tblAssets.AssetUnique, tblAssets.Domain, tblFileVersions.Found, tblFileVersions.FilePathfull, tblFileVersions.FileVersion, tblFileVersions.CompanyName, tblFileVersions.Filesize, tblFileVersions.CreationDate, tblFileVersions.LastAccessed, tblFileVersions.LastModified, tblFileVersions.Lastchanged From tblAssets Inner Join tblFileVersions On tblAssets.AssetID = tblFileVersions.AssetID Inner Join tsysOS On tsysOS.OScode = tblAssets.OScode Where tblFileVersions.FilePathfull Like '%iexplore.exe' Order By tblAssets.AssetUnique, tblFileVersions.FilePathfull
Scanning registry values In the example below we want to retrieve the version number of our Firefox browser’s Flash plugin, for all Windows computers. We know that this information is stored in the Version value of the registry key below, but want to retrieve the data stored in this value, 11.5.502.135 for instance. HKEY_LOCAL_MACHINE\SOFTWARE\MOZILLAPLUGINS\@ADOBE.COM/FLASHPLAYER
To scan for this specific registry value, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Item Wait Time
96/169
www.lansweeper.com
•
Make sure that the Enabled checkbox is ticked for the REGISTRY item, indicating that registry scanning is enabled.
•
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Custom Scanning
•
Hit the Add registry key to scan button in the Registry Scanning section of the page.
•
You will be presented with a popup window. Select the registry value’s root key from the Rootkey dropdown. Enter the remainder of the registry path into the Regpath field. Enter the name of the registry value into the Regvalue field and hit Ok
97/169
www.lansweeper.com
To scan a (Default) registry value, leave the Regvalue field blank when submitting your registry scan.
•
Rescan your assets. More info on how to do this can be found on page 89, in the chapter Rescanning assets.
•
To view the scan results for a single asset, browse to the following section of the asset’s Lansweeper webpage: Config\Scanned info\Registry keys More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
-
If a registry key is displayed on the page, that means the key was found on the asset and you can view the key’s value.
-
If a registry key is not displayed on the page, that means the key was not found on the asset.
•
To view the scan results for all of your assets, run the report on the next page. Replace SOFTWARE\MozillaPlugins\@adobe.com/FlashPlayer and Version with any Regpath and Regvalue you’ve submitted for scanning.
98/169
www.lansweeper.com
Select Top 1000000 tsysOS.Image As icon, tblAssets.AssetID, tblAssets.AssetUnique, tblAssets.Domain, tblRegistry.Regkey, tblRegistry.Valuename, tblRegistry.Value, tblRegistry.Lastchanged From tblAssets Inner Join tsysOS On tsysOS.OScode = tblAssets.OScode Inner Join tblRegistry On tblAssets.AssetID = tblRegistry.AssetID Where tblRegistry.Regkey Like '%SOFTWARE\MozillaPlugins\@adobe.com/FlashPlayer' And tblRegistry.Valuename = 'Version' Order By tblAssets.AssetUnique
99/169
www.lansweeper.com
Adding data, comments and docs Your Lansweeper installation allows you to not only scan asset information, but manually add data to assets as well. A number of database fields are reserved for manual data insertion, some of which can be renamed to your liking. You can also manually override scanned data in a number of fields. In addition, you can add comments and link purchase or other documents to assets.
Adding data To manually add data to an asset, do the following: •
Browse to the asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Edit asset button on the left side of the web console, under Asset options
•
Enter data into any of the available fields and hit the Save asset button on the left side of the web console, under Asset options
•
An asset’s state is set to Active by default. Assets with a state other than Active are excluded from most reports. Assigning a different state to an asset is therefore a good way to “ignore” the asset, without actually deleting it.
100/169
www.lansweeper.com
•
If there’s a checkbox next to a field, that means this field ordinarily contains scanned data, which you can manually override. To manually override scanned data, enter data into the field and make sure the checkbox next to the field is checked. This will prevent your changes from being overwritten when the asset is rescanned.
•
The web console display names of the Custom1 through Custom20 fields can be changed to your liking. Click the edit display names link below the Custom20 field, place your cursor anywhere in the Display Name column of the resulting page, make the desired change and hit Enter while your cursor is still present in the line to save the change.
101/169
www.lansweeper.com
•
To build a report that lists the custom data of all of your assets, you need to include the tblAssetCustom database table. A sample report can be seen below.
You can change the web console display names of the Custom1 through Custom20 fields, but you should not rename these fields within the Lansweeper database. Renaming fields will lead to issues. Assign an alias to a field instead to change its display name within a report. More info on this topic can be found in the chapter Reports.
Select Top 1000000 tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.AssetID, tblAssets.AssetName, tblAssets.Domain, tblState.Statename As State, tsysAssetTypes.AssetTypename As Type, tblAssets.IPAddress, tblAssetCustom.Manufacturer, tblAssetCustom.Model, tblAssetCustom.Serialnumber, tblAssetCustom.Warrantydate, tblAssetCustom.Contact, tblAssetCustom.Location, tblAssetCustom.BarCode, tblAssetCustom.OrderNumber, tblAssetCustom.LastPatched, tblAssets.Description, tblAssetCustom.Comments, tblAssetCustom.Custom1, tblAssets.Lastseen From tblAssets Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype Inner Join tblAssetCustom On tblAssets.AssetID = tblAssetCustom.AssetID Inner Join tblState On tblState.State = tblAssetCustom.State Order By tblAssets.IPNumeric
102/169
www.lansweeper.com
Adding comments To add comments to an asset, do the following: •
Browse to the asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Add comment button in the Comments section of the page.
•
Enter a comment into the popup window and hit the Ok button.
•
To build a report that lists the comments of all of your assets, you need to include the tblAssetComments database table. A sample report can be seen below.
Select Top 1000000 tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.AssetID, tblAssets.AssetName, tblAssets.Domain, tsysAssetTypes.AssetTypename As Type, tblAssets.IPAddress, tblAssetComments.Comment, tblAssetComments.Added, tblAssetComments.AddedBy, tblAssets.Lastseen From tblAssets Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype Left Join tblAssetComments On tblAssets.AssetID = tblAssetComments.AssetID Order By tblAssets.IPNumeric, tblAssetComments.Added Desc
103/169
www.lansweeper.com
Adding docs To link documents to an asset, do the following: •
Browse to the asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Add document button in the Docs section of the page.
•
Hit the Browse… button in the popup window to launch Windows Explorer. Select your file and hit Open.
•
Enter a name for the document into the Display Name field of the popup window and hit Ok
Uploaded files are stored in the folder below, found on the computer hosting your Lansweeper web console. Program Files (x86)\Lansweeper\Website\Docs
•
You can open a document you’ve uploaded by clicking on its display name in the Docs section of an asset’s Lansweeper webpage.
•
To build a report that lists the files attached to all of your assets, you need to include the tblAssetDocs database table. A sample report can be seen on the next page.
104/169
www.lansweeper.com
Select Top 1000000 tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.AssetID, tblAssets.AssetName, tblAssets.Domain, tsysAssetTypes.AssetTypename As Type, tblAssets.IPAddress, tblAssetDocs.Docname As Doc, tblAssetDocs.Added, tblAssetDocs.AddedBy, tblAssets.Lastseen From tblAssets Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype Left Join tblAssetDocs On tblAssets.AssetID = tblAssetDocs.AssetID Order By tblAssets.IPNumeric, tblAssetDocs.Added Desc
105/169
www.lansweeper.com
Performing administrative tasks Your Lansweeper installation allows you to perform administrative tasks from an asset’s webpage. These tasks are called “actions” within Lansweeper. You can ping, reboot, perform a Wake-on-LAN and much, much more! There are dozens of built-in actions and you can create your own as well.
To run an action on an asset, do the following: •
Configure your browser to run actions. Your browser must be properly configured in order to run actions. Configuration instructions can be found on page 144, in the chapter Actions.
•
Browse to the asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit one of the buttons under Basic actions or Advanced actions. A Wake-on-LAN action can also be found under Network wake on lan. (Each network card has its own WOL button.)
Actions are executed locally on the machine from which you are accessing the web console. They are run in the security context of the user initiating the action. If an action requires administrative privileges on an asset, the user who clicked the action must have those privileges. The Remote Control and Uninstall Software actions have their own specific sets of requirements, which are listed on page 149.
106/169
www.lansweeper.com
Changing asset types When Lansweeper scans an asset, it automatically tries to determine the asset’s type: Windows computer, Linux computer, Mac computer, VMware server, NAS, printer, switch etc. It does this by looking at open ports and information pulled from the following protocols: FTP, HTTP, HTTPS, JetDirect, SIP, SMTP, SNMP (SNMPv1 or SNMPv2), SSH and Telnet. You may at times want to override scanned asset type information however. There are two main ways in which you can do this: by editing the asset’s webpage or by remapping the asset’s OID. Remapping OIDs is useful if you have many assets of the same model whose type you wish to change.
You cannot change an asset’s type from Windows to something else or vice versa. Other asset type changes can be made without issue. During non-agent based scanning, an asset is automatically identified as a Windows computer if port 135 is open on the asset and if you’ve submitted a valid scanning credential for the asset.
Editing asset types on asset pages To manually override an asset’s type, do the following: •
Browse to the asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Edit asset button on the left side of the web console, under Asset options
•
Select an asset type from the Asset Type dropdown and make sure the box next to the dropdown is checked, indicating that your changes won’t be overridden during scanning. If none of the asset types suit your needs, follow the steps on page 110 to add your own.
107/169
www.lansweeper.com
•
Hit the Save asset button on the left side of the web console, under Asset options
Changing asset types by remapping OIDs To automatically have assets reassigned to your preferred asset type based on their OID, those assets must support SNMP. Do the following: •
Browse to an asset’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Copy the OID listed on the page. If there is none, the asset either does not support SNMP or the SNMP community string used for scanning is incorrect. You can rescan the asset using a different string by following the steps on page 42, in the chapter IP Range Scanning. You could also manually change the asset’s type by following the steps on the previous page.
•
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Asset Mapping
108/169
www.lansweeper.com
•
Paste the OID into the Snmp OID search box, found in the Device Snmp OID lookup section of the page. We want to verify whether the OID is already present in our database.
•
If there is a search result, the OID is present in your database and you can simply change the asset type assigned to it by selecting a different option from the Type dropdown. If none of the choices suit your needs, follow the steps on the next page to add your own. You can change the model assigned to the OID by placing your cursor in the Model column, making the necessary change and hitting Enter while your cursor is still present in the line.
•
If there are no search results, the OID is not present in your database. You can add it by hitting the Add Snmp OID button. Paste the OID into the Snmp OID field of the popup window, select an option from the Devicetype dropdown, type the asset’s model in the Model field and hit Ok. If none of the device type choices suit your needs, follow the steps on the next page to add your own.
109/169
www.lansweeper.com
•
Any asset of the specified OID will automatically be reassigned to the asset type of your choice, when the asset is rescanned. You can wait for a scheduled scan to kick in or immediately rescan your assets by following the instructions on page 89, in the chapter Rescanning assets.
Creating asset types To create your own asset type, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Asset Mapping
•
Hit the Add Asset type button in the Asset types section of the page.
•
Enter an asset type name into the Name field of the popup window.
•
Optionally, you can link your own icons to the asset type by placing them in the folder below, found on the computer hosting your Lansweeper web console. Icons should be in the PNG or JPG format and must be stored in the following resolutions: 10x10, 16x16 and 48x48 pixels. PROGRAM FILES (X86)\LANSWEEPER\WEBSITE\IMAGES
110/169
www.lansweeper.com
•
Hit the Ok button. The asset type is now included in any asset type list in the web console.
•
You can also edit existing asset types by placing your cursor in the Name or Icon columns of the following web console section, making a change and hitting Enter while your cursor is still present in the line: Configuration\Website Management\Asset Types Gray items are system items and cannot be edited.
111/169
www.lansweeper.com
Grouping assets From the Lansweeper web console, you can group various assets, making it quick and easy to look at specific network segments. An asset can belong to an unlimited number of groups. There are two main ways in which you can group assets. You can do so manually, by selecting any number of random assets and adding them to a group you’ve created. You can also automatically group, by assigning a name to an IP range. Any asset that belongs to the specified range will be placed in the corresponding IP location you’ve created.
Grouping and ungrouping random assets To group any number of random assets, do the following: •
Click the Assets link at the top of the Lansweeper web console. You will be presented with a list of all scanned assets.
•
Tick the checkboxes in front of the assets you would like to group.
-
You can perform a search on one of the columns to more easily find specific assets. In the example above, we filtered the Domain column to only list assets within the lansweeper domain.
-
You could also tick the checkbox at the very top to select all assets.
112/169
www.lansweeper.com
•
Hit the Add to group button on the left side of the web console, under Options
•
If you haven’t created any groups yet, hit the Add new group button in the popup window, type a group name in the Group Name field and hit Ok
•
Select the group you want to add the assets to from the list presented in the popup window and hit the Add To Group button.
•
If a group contains assets, it will be listed in the Asset Groups overview you see when hovering over the Assets link at the top of the web console. Click on the name of a group to see a list of assets contained within and some basic info on them. From an asset group list, you can click through to a specific asset webpage by clicking on the name of the asset.
The Default group is a built-in group that contains all of your assets. It cannot be renamed or deleted.
113/169
www.lansweeper.com
•
To build a custom report that lists the groups your assets belong to, you need to include the tblAssetGroups and tblAssetGroupLink database tables. A sample report can be seen below.
Select Top 1000000 tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.AssetID, tblAssets.AssetName, tblAssets.Domain, tsysAssetTypes.AssetTypename As Type, tblAssets.IPAddress, tblAssetGroups.AssetGroup, tblAssets.Lastseen From tblAssets Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype Inner Join tblAssetGroupLink On tblAssets.AssetID = tblAssetGroupLink.AssetID Inner Join tblAssetGroups On tblAssetGroups.AssetGroupID = tblAssetGroupLink.AssetGroupID Order By tblAssets.IPNumeric, tblAssetGroups.AssetGroup
To change the name of a group you’ve created, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Asset Groups
•
Place your cursor in a value of the Group Name column, found in the Asset Groups section of the page, and make the desired change.
•
Hit Enter while your cursor is still present in the line to save the change.
114/169
www.lansweeper.com
To remove one or more assets from a group, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Asset Groups
•
Select the group you want to edit in the Group Name column, found in the Asset Groups section of the page.
•
To the right of the Group Name column will be a list of assets that belong to the group. Tick the checkboxes in front of the assets you would like to remove from the group and then hit the Remove selected assets button.
115/169
www.lansweeper.com
•
You could also delete a group entirely by hitting the red button next to the Group Name column and next to the group you want to delete. All assets will be removed from the group and the group name will be deleted, but the assets themselves will remain in your database.
Grouping assets based on IP address To group assets based on their IP address, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Asset Groups
•
Hit the Add IP range location button in the IP Address Range locations section of the page.
•
Enter a start IP, end IP and IP location name into the popup window and hit the Ok button. Any asset that belongs to the specified IP range will be placed in the IP location.
•
If an IP location contains assets, it will be listed in the IP Locations overview you see when hovering over the Assets link at the top of the web console. Click on a location to see a list of assets contained within and some basic information on them. From an IP location list, you can click through to a specific asset webpage by clicking on the name of the asset.
116/169
www.lansweeper.com
If an asset doesn’t belong to any IP location you’ve created, it is automatically added to the built-in Undefined group. This group cannot be renamed or deleted.
•
To build a custom report that lists the IP locations your assets belong to, you need to include the tsysIPLocations database table. A sample report can be seen below.
Select Top 1000000 tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.AssetID, tblAssets.AssetName, tblAssets.Domain, tsysAssetTypes.AssetTypename As Type, tblAssets.IPAddress, tsysIPLocations.IPLocation, tblAssets.Lastseen From tblAssets Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype Left Outer Join tsysIPLocations On tblAssets.IPNumeric >= tsysIPLocations.StartIP And tblAssets.IPNumeric <= tsysIPLocations.EndIP Order By tblAssets.IPNumeric, tsysIPLocations.IPLocation
117/169
www.lansweeper.com
Deleting assets You may wish to delete certain assets from your Lansweeper database after a while, particularly if those assets have been decommissioned and can no longer be reached. By default, your Lansweeper installation does not delete any assets from your database or web console. You must instruct your Lansweeper installation to delete assets. You can either have an automatic cleanup performed every 24 hours or manually remove any unwanted assets from your database and web console.
Automatically deleting unwanted assets If you are looking to delete assets that have been decommissioned and can no longer be reached, the easiest way to do this would be through your cleanup options, found in the Lansweeper web console under Configuration\Scanning Setup\Server options
Manually deleting unwanted assets To manually delete one or more assets from your database and web console, do the following: â&#x20AC;˘
Click the Assets link at the top of the Lansweeper web console. You will be presented with a list of all scanned assets.
â&#x20AC;˘
Tick the checkboxes in front of the assets you would like to delete.
118/169
www.lansweeper.com -
You can perform a search on one of the columns to more easily find specific assets. In the example on the previous page, we filtered the Domain column to only list assets within the lansweeper domain.
â&#x20AC;˘
You could also tick the checkbox at the very top to select all assets.
Hit the Delete button on the left side of the web console, under Options
When you delete an asset, it is removed from your Lansweeper database and web console. This operation cannot be undone. Make sure youâ&#x20AC;&#x2122;ve selected the correct assets before hitting the Delete button.
Deleting an asset does not prevent it from being rescanned. If the asset is still submitted for one or more scanning methods, it will be rescanned and added to the web console again. To prevent the asset from being rescanned, follow the instructions on page 120, in the chapter Excluding assets from scanning.
119/169
www.lansweeper.com
Excluding assets from scanning Excluding assets from scanning prevents your Lansweeper installation from ever attempting to scan these assets again. You can exclude Windows computers by NetBIOS name and Linux, Unix and Mac computers, VMware servers and other network devices by IP address.
Excluding an asset only prevents any future scan attempts from taking place. If the asset was already scanned prior to excluding, it will not automatically be removed from your database. You can manually remove the asset by following the steps on page 118, in the chapter Deleting assets. Another option is that you perform an automated database cleanup.
Excluding Windows computers from scanning To exclude a Windows computer from scanning, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
•
Hit the Add Windows Computer Exclusion button in the Windows Computer Scan Exclusions section of the page.
•
Enter the NetBIOS name of the Windows computer you would like to exclude into the popup window and hit the Ok button.
120/169
www.lansweeper.com
You can use the following as a wildcard: % •
Entering LAN% into the popup window excludes any Windows computer whose name starts with the word “LAN” from scanning.
•
Entering %LAN into the popup window excludes any Windows computer whose name ends in the word “LAN” from scanning.
•
Entering %LAN% into the popup window excludes any Windows computer whose name contains the word “LAN” from scanning.
Excluding other assets from scanning Linux, Unix and Mac computers, VMware servers and other network devices can only be excluded from scanning based on IP address. To exclude one of these assets from scanning, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Scanning Methods
•
Hit the Add IP Address to exclude button in the IP Address Range Scanning section of the webpage.
121/169
www.lansweeper.com
â&#x20AC;˘
Enter the IP address of the asset you would like to exclude into the popup window and hit the Ok button.
If you add a Windows computer to your IP exclusions, the computer will only be excluded from IP Range Scanning. If it is still submitted for other scanning methods, those will continue to scan the machine.
122/169
www.lansweeper.com
Managing software Authorizing software Windows software can be marked as authorized, unauthorized or neutral (unrated). When you’ve configured software authorization, you can use one of the built-in Lansweeper reports to keep track of unauthorized software installations in your network. ActiveX controls can also be marked as authorized. A default list of authorized ActiveX controls is included in your Lansweeper installation, but can be customized to suit your needs. Unauthorized ActiveX controls can once again be listed by running a built-in Lansweeper report.
Authorizing Windows software To authorize or unauthorize Windows software, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Software\Authorization
•
Click once on a bullet in the Approved column to mark the software package as authorized, click twice on a bullet to mark the software package as unauthorized.
-
You can perform a search on one of the columns to more easily find specific software packages. In the example above, we filtered the Publisher column to only list software packages published by Adobe.
123/169
www.lansweeper.com -
You can hit the Approve all results or Deny all results button to authorize or unauthorize all software packages. If you filtered the Name, Publisher or Approved column, only the software included in your search results will be affected.
•
-
A green bullet means that the software is authorized.
-
A red bullet means that the software is unauthorized.
-
A gray bullet means that the software is unrated.
-
Any new software detected in your network is automatically marked as unrated.
When you browse to a Windows computer’s Lansweeper webpage and open the Software tab, authorization bullets will be displayed next to the names of the software packages.
•
You can also use the built-in reports below, found in the Lansweeper web console under Dashboard\Reports\All Reports, to list authorized, unauthorized or unrated software detected across your entire network. Software: Approved software Software: Unauthorized software Software: Unrated software
•
To build a report that lists the authorization status of your Windows software, you need to include the tblSoftware and tblSoftwareUni database tables. A sample report can be seen on the next page.
124/169
www.lansweeper.com
Select Top 1000000 tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.AssetID, tblAssets.AssetName, tblAssets.Domain, tsysAssetTypes.AssetTypename As Type, tblAssets.IPAddress, tblSoftwareUni.softwareName As Software, tblSoftware.softwareVersion As Version, tblSoftwareUni.SoftwarePublisher As Publisher, Case tblSoftwareUni.Approved When 1 Then 'approved' When 2 Then 'unapproved' When 0 Then 'unrated' End As [Authorization], tblAssets.Lastseen From tblAssets Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype Inner Join tblSoftware On tblAssets.AssetID = tblSoftware.AssetID Inner Join tblSoftwareUni On tblSoftwareUni.SoftID = tblSoftware.softID Where tblAssets.Assettype = -1 Order By tblAssets.Domain, tblAssets.AssetName, tblSoftwareUni.softwareName, tblSoftware.softwareVersion
Authorizing ActiveX controls To authorize ActiveX controls, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Software\Allowed Active-X
•
Hit the Add allowed Active-X button.
125/169
www.lansweeper.com
•
Enter an ActiveX GUID into the first field of the popup window. Optionally, you can comment on what kind of control it is in the Remark field. Hit the Ok button.
•
You can use the built-in report below, found in the Lansweeper web console under Dashboard\Reports\All Reports, to list unauthorized ActiveX controls detected across your entire network. If there is a control you would like to authorize, copy its GUID and follow the three previous steps to add it to your authorized ActiveX controls. IE: unauthorized ActiveX control
•
You can see a full list of installed ActiveX controls by looking at the Config\Internet Explorer\ActiveX section of a Windows computer’s Lansweeper webpage.
126/169
www.lansweeper.com
Anti-virus software reports The built-in reports below, found in the Lansweeper web console under Dashboard\Reports\All Reports, list Windows servers and workstations that do and do not have anti-virus software installed. Server: All servers with Anti-virus Server: All servers without Anti-virus software Workstation: All workstations with Anti-virus software Workstation: All workstations without Anti-virus software
To determine whether a Windows computer has anti-virus software installed, Lansweeper compares the software scanned for the computer against a built-in list of known anti-virus software. This list can be customized to suit your needs.
Below, as an example, you can see computer LAN-001. The report Workstation: All workstations without Anti-virus software indicates that this computer does not have anti-virus software installed.
To mark one of computer LAN-001â&#x20AC;&#x2122;s installed software packages, CCleaner for instance, as anti-virus software, do the following: â&#x20AC;˘
Browse to the following section of the Lansweeper web console: Configuration\Software\Anti-Virus
127/169
www.lansweeper.com
•
Hit the Add Anti-Virus software button.
•
Enter the name of the software package you would like to mark as anti-virus software into the popup window and hit Ok. Any Windows computer that has the specified software installed, including computer LAN-001, will now be deemed to have anti-virus software.
You can use the following as a wildcard: % •
Entering ccleaner% into the popup window marks any software whose name starts with “ccleaner” as anti-virus software.
•
Entering %ccleaner into the popup window marks any software whose name ends in “ccleaner” as anti-virus software.
•
Entering %ccleaner% into the popup window marks any software whose name contains “ccleaner” as anti-virus software.
128/169
www.lansweeper.com
Managing licenses Scanning software serial numbers Lansweeper automatically scans the Windows computers in your network for installed software serial numbers. Hundreds of serial numbers are scanned by default from your Windows computersâ&#x20AC;&#x2122; registries. You can also submit additional registry locations for scanning. A list of scanned serials can be found in the Configuration\License Compliance\Product Keys section of the web console.
Scanned serial number information can be found at the bottom of the Software tab of your computersâ&#x20AC;&#x2122; Lansweeper webpages. A complete list of scanned serials can also be viewed in the builtin report License: Software licensekey overview, found in the Dashboard\Reports\All Reports section of the web console.
129/169
www.lansweeper.com
Software license compliance Your Lansweeper installation allows you to track any software licenses you’ve purchased. You can create a license item that consists of just one software package or group several packages together as one license item. Additional information can then be submitted, such as number of licenses purchased, license type, price per license, expiration date and order details. Purchase and other documents can be uploaded and linked to license items as well. When you’ve configured license compliance for Windows software, Lansweeper will also compare the number of licenses you’ve indicated were purchased against the number of software installations in your network. A calculation is made of the number of missing licenses as well as the cost of filling in these missing licenses.
To create a license item, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\License Compliance\License Tracking
•
Hit the Add new License button in the Software License Tracking section of the page.
•
Select a software package you want to track from the available list in the popup window and hit the Ok button. You can perform a search on one of the columns to more easily find specific software packages.
130/169
www.lansweeper.com
•
Optionally, you can add more software to the license item by hitting the Add software button in the item’s Software tab. Note that you can edit the license item’s name as well.
You can track all versions of a software package by placing your cursor in the Version column, typing % and hitting Enter.
•
You can now add additional info in the Information tab. Don’t forget to hit Save when done.
-
Enter the price per license and select the license type from the available dropdown.
-
Optionally, add comments regarding the license type.
-
If the license item is subscription based, tick the License contract checkbox and enter a license expiration date into the available field.
•
Optionally, enter a contact, owner and comments into the available fields.
In the Orders tab, add info on any license orders you’ve placed by hitting the Add order button. In the popup window, enter the number of licenses purchased, the price per license and hit Ok. Optionally, you can add an order number, comment and license key.
131/169
www.lansweeper.com
•
In the Docs tab, hit the Add document button to upload any related purchase or other documents. Hit the Browse… button in the popup window to launch Windows Explorer. Select your file and hit Open. Enter a display name for the file into the Document Name field and, optionally, add a comment to the file. Hit Ok when done.
Uploaded license files are stored in the folder below, found on the computer hosting your Lansweeper web console. Program Files (x86)\Lansweeper\Website\Docs\licenses
•
You can verify whether you’re exceeding the number of licenses purchased by hitting the License report button in the Software License Tracking section of the page. The resulting page lists the number of software installations detected in your network, the number of licenses you’ve purchased and the number of licenses that are missing. It also calculates the cost of filling in any missing licenses, based on the price per license you submitted.
132/169
www.lansweeper.com
Operating system license compliance Your Lansweeper installation allows you to track any operating system licenses you’ve purchased. You can create a license item that consists of just one specific OS or group several operating systems together as one license item. Additional information can then be submitted, such as number of licenses purchased, price per license and order details. Purchase and other documents can be uploaded and linked to license items as well. When you’ve configured Windows OS license compliance, Lansweeper will also compare the number of licenses you’ve indicated were purchased against the number of OS installations in your network. A calculation is made of the number of missing licenses as well as the cost of filling in these missing licenses.
To create a license item, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\License Compliance\License Tracking
•
Hit Add new License in the Windows Operating System Licenses section of the page.
•
Select an operating system you would like to track from the available list in the popup window and hit the Ok button. You can perform a search to more easily find specific operating systems.
133/169
www.lansweeper.com
•
Optionally, you can add more operating systems to the license item by hitting Add Operating System in the Operating Systems tab. Note that you can edit the license item’s name as well.
•
•
You can now add additional info in the Information tab. Don’t forget to hit Save when done.
-
Enter the price per license.
-
Optionally, enter a contact, owner and comments into the available fields.
In the Orders tab, add info on any OS orders you’ve placed by hitting the Add order button. In the popup window, enter the number of licenses purchased, the price per license and hit Ok. Optionally, you can add an order number, comment and license key.
•
In the Docs tab, hit the Add Document button to upload any related purchase or other documents. Hit the Browse… button in the popup window to launch Windows Explorer. Select your file and hit Open. Enter a display name for the file into the Document Name field and, optionally, add a comment to the file. Hit Ok when done.
134/169
www.lansweeper.com
Uploaded license files are stored in the folder below, found on the computer hosting your Lansweeper web console. Program Files (x86)\Lansweeper\Website\Docs\licenses
â&#x20AC;˘
You can verify whether youâ&#x20AC;&#x2122;re exceeding the number of licenses purchased by hitting the License report button in the Windows Operating System Licenses section of the page. The resulting page lists the number of OS installations detected in your network, the number of licenses youâ&#x20AC;&#x2122;ve purchased and the number of licenses that are missing. It also calculates the cost of filling in any missing licenses, based on the price per license you submitted.
135/169
www.lansweeper.com
Email alerts Setting up report alerts You can have reports listed in the Lansweeper web console under Dashboard\Reports\All Reports mailed to you on a daily basis. This is useful if you use reports to track important network information and want to review any changes that occurred on a regular basis. At the scheduled times, the reports will be mailed to one or more email addresses specified by you.
To have reports mailed to you, do the following: â&#x20AC;˘
Browse to the following section of the Lansweeper web console: Configuration\Reports & Alerts\Email Alerts
â&#x20AC;˘
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the server you would like to send email alerts from. If you do not own an Enterprise license, you can only have one server and you do not need to select a tab.
136/169
www.lansweeper.com
•
Check the box Enable report mailing on this server in the E-mail Servers section of the scanning server you selected.
•
Enter your SMTP server, port number, the email address you would like to send from and its display name into the correct input boxes. Optionally, you can enable SSL or authentication by checking Use SSL connection (for Gmail smtp server) or Server requires authentication
•
If you haven’t done so already, hit the Add E-mail Group button in the E-mail groups section of the page. An email group is a collection of email addresses your reports will be sent to. Enter a name for the group into the upper input box of the popup window. In the second input box, enter one or more email addresses, separated with colons. Then hit Ok. You can create multiple email groups to send various reports to.
•
Hit the Add report button in the E-mail reports section of the page. Select one or more reports you want mailed and hit Add. You can use the search box to find specific reports.
137/169
www.lansweeper.com
â&#x20AC;˘
For each report, select the mail group you want to send the alerts to.
â&#x20AC;˘
Configure your mailing schedule, which determines when all of your reports are mailed.
-
Check/uncheck the box in front of a weekday to disable report alerts on that day.
-
Open the dropdown next to a weekday to select a different time for the alerts. A report is only mailed if it has results. Empty reports are not mailed.
â&#x20AC;˘
You can immediately have all reports mailed as well by hitting the Mail selected reports now button in the E-mail Servers section of the page. Report results are attached in Excel format.
138/169
www.lansweeper.com
Setting up event log alerts You can have email alerts sent to you for specific events that occur on the Windows computers in your network. This is useful if you want to monitor errors for instance on important servers or workstations. As soon as the specified event is scanned, an email is sent to one or more email addresses specified by you.
To have event log alerts mailed to you, do the following: â&#x20AC;˘
Browse to the following section of the Lansweeper web console: Configuration\Reports & Alerts\Email Alerts
â&#x20AC;˘
If you own a Lansweeper Enterprise license and have set up multiple scanning servers, select the tab of the server you would like to send email alerts from. If you do not own an Enterprise license, you can only have one server and you do not need to select a tab.
139/169
www.lansweeper.com
•
Check the box Enable eventlog alerts on this server in the E-mail Servers section of the scanning server you selected.
•
Enter your SMTP server, port number, the email address you would like to send from and its display name into the correct input boxes. Optionally, you can enable SSL or authentication by checking Use SSL connection (for Gmail smtp server) or Server requires authentication
•
If you haven’t done so already, hit the Add E-mail Group button in the E-mail groups section of the page. An email group is a collection of email addresses your alerts will be sent to. Enter a name for the group into the upper input box of the popup window. In the second input box, enter one or more email addresses, separated with colons. Then hit Ok. You can create multiple email groups to send various alerts to.
•
Hit the Add event filter button in the E-mail Eventlog alerts section of the page. Select an event you want mailed from the list of scanned events and hit Ok.
140/169
www.lansweeper.com
â&#x20AC;˘
You can modify the criteria the event has to meet in order to generate an alert. Hit the pencil shaped edit button next to the alert and then Add Filter in the resulting popup.
-
Once youâ&#x20AC;&#x2122;ve added a filter, select the filter type from the Compare dropdown. Computer: NetBIOS name of the computer generating the event Example: LAN-001 Domain: (NetBIOS) name of the domain/workgroup the event originates from Example: lansweeper EventID: numeric code identifying the event Example: 100006 Eventtype: the type of event Possible values: Error, Warning, Information, FailureAudit, SuccessAudit Logfile: specific log the event belongs to Example: System Source: source of the event Example: DistributedCOM User: username of the user who was logged on when the event occurred Example: lansweeper\administrator
141/169
www.lansweeper.com Message: comment included in the event Example: An account was logged off. -
Once you’ve selected your filter type, select the operator from the Operator dropdown, type a filter in the Filter column and hit OK Equal: only send an alert when the event matches the following criterion exactly Example: EventID Equal 5 only generates an alert when the even ID is 5 Not Equal: only send an alert when the event does not match the following criterion Example: EventID Not Equal 5 only generates an alert when the event ID is not 5 Like: only send an alert when the event includes the following criterion Example: EventID Like %5% only generates an alert when the event ID includes the number 5. This operator only works if you place % around your filter. Not Like: only send an alert when the event does not include the following criterion Example: EventID Not Like %5% only generates an alert when the event ID does not include the number 5. This operator only works if you place % around your filter.
•
For each event, select the mail group you want to send the alerts to.
•
As soon as the specified event is scanned, an email is sent to the mail group of your choice.
Event alerts are best used in combination with Eventlog Scanning.
142/169
www.lansweeper.com
Eventlog Scanning is the only scanning method that can be made to scan events as often as once a minute, ensuring that you receive your alerts near-instantaneously. More info on Eventlog Scanning can be found on page 64, in the chapter
Scanning Methods .
143/169
www.lansweeper.com
Actions Configuring your browser to run actions Actions are administrative tasks you can perform from an asset’s or user’s Lansweeper webpage. There are dozens of built-in actions and you can create your own as well.
In order to run actions from the Lansweeper web console, your browser must be properly configured. Internet Explorer, Mozilla Firefox and Google Chrome are supported. Internet Explorer requires a few configuration changes, Firefox and Chrome require a plugin to be installed.
Configuring Internet Explorer To configure Internet Explorer to run actions, do the following: •
Open Internet Explorer on your computer, browse to the Lansweeper web console and copy the console’s URL. Web console URLs are generally formatted as follows: http://(NetBIOS name of the machine hosting your web console):(port number)/
144/169
www.lansweeper.com
•
Select the Internet options menu item and open the Security tab of the popup window.
•
Click the Trusted sites icon and hit the Sites button.
•
Paste your web console URL into the upper input box, hit Add and then Close
•
Hit the Custom level… button.
•
Set Run ActiveX controls and plug-ins to Enable, in the ActiveX controls and plug-ins section of your settings.
145/169
www.lansweeper.com
•
Set Initialize and script ActiveX controls not marked as safe for scripting to either Enable or Prompt, also in the ActiveX controls and plug-ins section of your settings. Then hit OK twice.
•
Restart Internet Explorer.
•
If you still see the message below when attempting to launch an action, there may be a conflict between the configuration changes you made and your other security settings. You can try resetting your trusted sites’ security settings by selecting the Internet options menu item, selecting Trusted sites in the Security tab and hitting the Default level button. Once again configure Internet Explorer to run actions afterwards.
146/169
www.lansweeper.com
Configuring Mozilla Firefox To configure Mozilla Firefox to run actions, do the following: •
Download the Lansweeper Firefox plugin through the following link: http://www.lansweeper.com/files/firefox.zip
•
Unzip the file and copy the nplansweepershellexec.dll contained within.
•
Paste the file into whichever folder exists of the folders listed below. PROGRAM FILES\MOZILLA FIREFOX\PLUGINS PROGRAM FILES (X86)\MOZILLA FIREFOX\PLUGINS
•
Restart Firefox if it was running.
•
You can check to see if the plugin is installed by accessing the Add-ons menu in Firefox. You can access it directly by using the Ctrl+Shift+A shortcut. You can disable/re-enable the plugin from here as well.
Configuring Google Chrome To configure Google Chrome to run actions, do the following: •
Download the Lansweeper Chrome plugin through the following link: http://www.lansweeper.com/files/chrome.zip
147/169
www.lansweeper.com
•
Unzip the file and copy the nplansweepershellexec.dll contained within.
•
Paste the file into whichever folder exists of the folders listed below. %LOCALAPPDATA%\GOOGLE\CHROME\APPLICATION\PLUGINS (paste in directory bar and hit Enter) PROGRAM FILES\GOOGLE\CHROME\APPLICATION\PLUGINS PROGRAM FILES (X86)\GOOGLE\CHROME\APPLICATION\PLUGINS
•
If none of the folders listed above exist, locate one of the folders below instead, create a folder called Plugins within and paste the nplansweepershellexec.dll file in the Plugins folder. %LOCALAPPDATA%\GOOGLE\CHROME\APPLICATION (paste in directory bar and hit Enter) PROGRAM FILES\GOOGLE\CHROME\APPLICATION PROGRAM FILES (X86)\GOOGLE\CHROME\APPLICATION
•
Restart Chrome if it was running.
•
You can check to see if the plugin is installed by accessing the Plug-ins menu in Chrome. You can access it directly by typing about:plugins in the address bar and hitting Enter. You can disable/re-enable the plugin from here as well.
148/169
www.lansweeper.com
Remote Control Remote Control is an action you can run from a Windows computer’s Lansweeper webpage and that allows you to control the machine’s screen. This is particularly useful if you want to give remote support. Performing a Remote Control of a machine does not require any software on the target machine itself. Certain requirements must be met however, which are outlined below.
Remote Control requirements To perform a Remote Control of a machine, the following requirements must be met: •
The machine initiating the session and the target must be running Windows 2000 or higher.
•
The machine initiating the session and the target must be in trusted domains.
•
The user initiating the session must have administrative privileges on the target machine.
•
TCP ports 139, 445 and 5900 must be open on the target machine.
•
The Server service, found in Windows Services, must be started on the target machine.
•
The Remote Registry service, found in Windows Services, must be started on the target.
•
The administrative shares C$ and ADMIN$ must be available on the target machine.
To launch the Remote Control action from the Lansweeper web console, you must ensure that: •
The lsremote.exe (Remote Control executable) is present in the folder below, found on the machine hosting your Lansweeper service. If it isn’t, download it through the following link and place it in the specified folder: http://lansweeper.com/premiumtools.aspx PROGRAM FILES (X86)\LANSWEEPER\ACTIONS
•
The Action Path listed in the Lansweeper web console under Configuration\Website Management\Asset Pages is correct.
149/169
www.lansweeper.com The Action Path indicates where the Lansweeper web console will try to locate the Remote Control executable. By default, the Lansweeper installer shares the folder below as lansweeper$ and uses that as the Action Path. PROGRAM FILES (X86)\LANSWEEPER\ACTIONS
•
Your browser is configured to run actions. Your browser must be properly configured in order to run actions. Configuration steps can be found on page 144, in the chapter Actions.
Performing a Remote Control Once you’ve verified that your machines and Lansweeper installation are configured correctly, do the following to perform a Remote Control session: •
Browse to the computer’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Remote control button under Advanced actions and then hit OK if you are prompted to confirm. When a Remote Control session is initiated, the free VNC service is automatically pushed to the target machine. It is removed again when the session has ended.
150/169
www.lansweeper.com
â&#x20AC;˘
Optionally, you can ask the target machine for permission before starting the Remote Control session. To do so, browse to the Configuration\Website Management\Asset Pages section of the web console, add /AP to the Remote Control action in the Asset Actions section of the page and hit Enter while your cursor is still present in the line to save the change.
-
If you add /AP (Ask Permission) to the Remote Control command, the target machine is asked for permission before starting the Remote Control session.
-
If you add /NP (No Permission) to the Remote Control command, the target machine is not asked for permission before starting the Remote Control session.
â&#x20AC;˘
Instead of running the Remote Control tool from the Lansweeper web console, you can also run it directly from the PROGRAM FILES (X86)\LANSWEEPER\ACTIONS folder, found on the machine hosting your Lansweeper service, or the command line. A sample command can be seen below. Replace LAN-001 with the NetBIOS name, FQDN or IP address of the machine you wish to remote control. C:\>LSREMOTE.EXE LAN-001 /AP
151/169
www.lansweeper.com
Uninstall Software Uninstall Software is an action you can run from a Windows computer’s Lansweeper webpage and that allows you to remotely uninstall software from the machine. Performing an Uninstall Software of a machine does not require any Lansweeper software on the target machine itself. Certain requirements must be met however, which are outlined below.
Uninstall Software requirements To perform an Uninstall Software of a machine, the following requirements must be met: •
The machine initiating the session and the target must be in trusted domains.
•
The user initiating the session must have administrative privileges on the target machine.
•
The Windows Management Instrumentation service, found in Windows Services, must be started on the target machine.
To launch the Uninstall Software action from the Lansweeper web console, you must ensure that: •
The RemoteUninst.exe (Uninstall Software executable) is present in the folder below, found on the machine hosting your Lansweeper service. If it isn’t, download it through the following link and place it in the specified folder: http://lansweeper.com/premiumtools.aspx PROGRAM FILES (X86)\LANSWEEPER\ACTIONS
•
The Action Path listed in the Lansweeper web console under Configuration\Website Management\Asset Pages is correct.
152/169
www.lansweeper.com The Action Path indicates where the Lansweeper web console will try to locate the Uninstall Software executable. By default, the Lansweeper installer shares the folder below as lansweeper$ and uses that as the Action Path. PROGRAM FILES (X86)\LANSWEEPER\ACTIONS
•
Your browser is configured to run actions. Your browser must be properly configured in order to run actions. Configuration steps can be found on page 144, in the chapter Actions.
Performing an Uninstall Software Once you’ve verified that your machines and Lansweeper installation are configured correctly, do the following to uninstall software from a Windows computer: •
Browse to the computer’s page within the Lansweeper web console. More info on finding specific asset pages can be found on page 85, in the chapter Viewing scanned asset data.
•
Hit the Uninstall software button under Advanced actions and then hit OK if you are prompted to confirm.
153/169
www.lansweeper.com
•
The Uninstall Software window will open. There are 3 types of software packages.
MSI packages These packages follow Microsoft standards for (un)installation and can be uninstalled using the MSIexec command. Adding the /QN /NORESTART parameters to the command makes the uninstall invisible to the target machine. When you select an MSI package and hit Uninstall selected, the uninstall command will automatically be formed. You can then simply hit Uninstall to proceed. Custom packages These packages do not follow Microsoft standards for (un)installation and require additional parameters in order to be uninstalled silently. You must consult the software publisher’s documentation to see if any parameters are available. When you select a custom package and hit the Uninstall selected button, you will be able to add parameters to the uninstall command. Locked packages These packages cannot be uninstalled. Some software publishers do not allow their software to be uninstalled, as doing so might break Windows functionality. •
Instead of running the Uninstall Software tool from the Lansweeper web console, you can also run it directly from the PROGRAM FILES (X86)\LANSWEEPER\ACTIONS folder, found on the machine hosting your Lansweeper service, or the command line. A sample command can be seen below. Replace LAN-001 with the NetBIOS name, FQDN or IP address of the machine you wish to uninstall software from. C:\>REMOTEUNINST.EXE LAN-001
154/169
www.lansweeper.com
Customizing the web console Restricting access By default, everyone has access to the Lansweeper web console. You can however restrict access to the console to certain user groups and restrict what users can see or do once they’ve been granted access. These access privileges are called “roles” within Lansweeper. To restrict access to the web console, you must: •
Check which web server is hosting your web console.
•
Configure your web server for authenticated access.
•
Configure user roles within the Lansweeper web console.
Should you lock yourself out of the web console, run the executable below, found on the machine hosting your Lansweeper service, and hit the Restore Default Roles button. This will reset your user roles, granting everyone access to the console. Program Files (x86)\Lansweeper\Service\ResetWebUserRoles.exe
Checking which web server is hosting your web console To check which web server is hosting your web console, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Website Access
155/169
www.lansweeper.com
•
Look at the value listed in the Server line, found in the WebServer Information section of the page. Your web server should either be IIS (6.0, 7.0, 7.5 or 8.0), IIS Express or UltiDev.
Configuring your web server for authenticated access •
If your console is hosted in IIS 6.0, follow the steps below to configure this server.
•
If your console is hosted in IIS 7.0, 7.5 or 8.0, follows the steps on page 158.
•
If your console is hosted in IIS Express, follow the steps on page 159.
•
If your console is hosted in UltiDev, follow the steps on page 160.
To configure IIS 6.0 for authenticated access, do the following: •
On the machine hosting your web console, open the Start menu and select Run.
•
In the input box, type inetmgr and hit the OK button. IIS Manager will open.
156/169
www.lansweeper.com
•
Right-click on your Lansweeper web console on the left, under (name of the machine)\Web Sites, and select Properties
•
Open the Directory Security tab and hit the upper Edit… button.
•
Uncheck Enable anonymous access, check Integrated Windows authentication and then hit OK twice.
•
Close IIS Manager. You are now ready to configure user roles in the Lansweeper web console. Follow the steps on page 161 to do so.
157/169
www.lansweeper.com To configure IIS 7.0, 7.5 or 8.0 for authenticated access, do the following: •
On the machine hosting your web console, open the Start menu and select Run.
•
In the input box, type inetmgr and hit the OK button. IIS Manager will open.
•
Select your Lansweeper web console on the left, under (name of the machine)\Sites, and then double-click the Authentication button.
•
Right-click on Anonymous Authentication and choose Disable, right-click on Windows Authentication and choose Enable.
If your web console is hosted on a machine running a non-Server OS and you don’t see the Windows Authentication option in IIS, open the Start menu on the machine and select Run. In the input box, type optionalfeatures and hit the OK button. Windows Features will open.
158/169
www.lansweeper.com
Make sure that the following setting is enabled and then hit the OK button: Internet Information Services\World Wide Web Services\Security\Windows Authentication
•
Close IIS Manager. You are now ready to configure user roles in the Lansweeper web console. Follow the steps on page 161 to do so.
To configure IIS Express for authenticated access, do the following: •
Run the executable below, found on the machine hosting your Lansweeper web console. PROGRAM FILES (X86)\LANSWEEPER\IISEXPRESS\EXPRESSAUTHENTICATION.EXE
•
Select Integrated authentication and hit the Change button.
159/169
www.lansweeper.com
•
Close the window. You are now ready to configure user roles in the Lansweeper web console. Follow the steps on page 161 to do so.
To configure UltiDev for authenticated access, do the following: •
Run the executable below, found on the machine hosting your Lansweeper web console. The UltiDev Web Server Explorer will open. PROGRAM FILES (X86)\ULTIDEV\WEB SERVER\UWS.EXPLORER.EXE
•
Select your Lansweeper web console on the left, below Default Shared Host Process.
•
Open the Authentication tab and set the authentication type to Windows Integrated (Kerberos/NTLM)
•
Hit the Save config changes button. It’s the second button from the left.
•
Close the UltiDev Web Server Explorer. You are now ready to configure user roles in the Lansweeper web console. Follow the steps on page 161 to do so.
160/169
www.lansweeper.com
Configuring web console user roles Once you’ve configured your web server for authenticated access, you can set up user roles in the Lansweeper web console. Do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Website Management\Website Access
•
Look at the value listed in the Authentication line, found in the WebServer Information section of the page. Make sure this value is no longer set to Anonymous Access. If it is, your web server is not configured correctly and you should go through the steps on page 156 again to enable authenticated access.
•
Check which user groups the currently logged on user belongs to by looking at the Windows Groups listed in the WebServer information section of the page. In the example below we can see that the currently logged on user belongs to the LANSWEEPER\Domain Admins group, among others.
161/169
www.lansweeper.com
â&#x20AC;˘
Enter one or more user group names into the Group Members column, found in the Website Role Based Access section of the page, and hit Enter to save each change.
-
You must add user groups to the Group Members column using the following format: NetBIOS domain name\group name. Note that you cannot add individual users.
-
Each line in the Web Role column represents an access privilege you can grant to a user group. Each privilege should be granted to at least one user group.
-
To grant an access privilege to multiple user groups, enter all groups into a line of the Group Members column, separating them with commas.
-
To avoid locking yourself out of the console, ensure that at least one group added to the Group Members column is also listed in the Windows Groups section of the page.
-
In the example on this page, we granted all access privileges to the group LANSWEEPER\Domain Admins and gave the group LANSWEEPER\Domain Users the ability to access the web console and rescan assets.
â&#x20AC;˘
Restart your browser to make the user role changes take effect.
162/169
www.lansweeper.com
Setting the date format Besides setting up his own dashboard, each user who logs into the Lansweeper web console can also choose his own date format, which will be used throughout the console.
To select your own date format, do the following: •
Click your username in the top right corner of the Lansweeper web console.
•
Select the appropriate date format from the date format dropdown.
•
-
dd/MM/yyyy example: 31/12/2012
-
MM/dd/yyyy example: 12/31/2012
-
yyyy/MM/dd example: 2012/12/31
The specified date format will now be used throughout the web console.
163/169
www.lansweeper.com
Back up, move, update Updating your installation It is recommended that you update your Lansweeper installation on a regular basis, to ensure that you have the latest available patches installed and access to any new features that have been released. You can verify whether you have the latest Lansweeper version from the web console and perform an update of a medium sized network in just a few minutes.
All updates are free to anyone with an active Lansweeper license. Updates are installed over your existing installation. Reinstalling is not required in order to update.
Checking whether your installation requires updating To check whether your Lansweeper installation requires updating, do the following: •
Browse to the following section of the Lansweeper web console: Configuration\Scanning Setup\Your License
•
Hit the Check for Updates now button in the Your Lansweeper License section of the page.
•
You will be redirected to a page on the Lansweeper website, which will indicate whether your installation is up-to-date or not.
164/169
www.lansweeper.com
•
You could also tick the checkbox Automatically check for updates once a week in the Configuration\Scanning Setup\Your License section of the Lansweeper web console to perform periodic update checks.
Updating your installation To update your Lansweeper installation, do the following: •
Back up your installation.
•
Download the latest Lansweeper installer, which can be found at the following URL: http://lansweeper.com/getfile50.aspx
•
Run the installer on a machine hosting the Lansweeper service, found in Windows Services. If you’re not sure which machines are hosting the service, you can find them listed in the Current Version section of this console page: Configuration\Scanning Setup\Your License
•
Hit the Next button, select I accept the agreement and hit Next again.
165/169
www.lansweeper.com
•
Select the Upgrade option and hit Next. If the Upgrade option is grayed out, that means you are already running the latest version of Lansweeper and should not proceed further. Hit Cancel to close the installer if you are already running the latest version of Lansweeper.
•
The installer will automatically detect the Lansweeper components that require updating. Hit Next to continue.
•
You will see your files being updated. The installer will automatically update the Lansweeper service, the Lansweeper database and, if it’s hosted on the same machine, the Lansweeper web console. How long the update takes depends on the size of your database.
•
When the update has completed, you can enter a name and email address to subscribe to the Lansweeper newsletter. You can also post about your installation on Facebook, LinkedIn or Twitter. Tick the Skip Lansweeper newsletter subscription checkbox if you do not wish to subscribe to the newsletter and hit the Finish button to close the installer.
166/169
www.lansweeper.com
â&#x20AC;˘
If your Lansweeper web console is hosted on a different machine than the Lansweeper service, you will need to run the Lansweeper installer on that machine as well and once again go through the update procedure.
â&#x20AC;˘
If the Lansweeper service is hosted on multiple machines, which are all connected to your Lansweeper database, you will need to run the installer on each machine hosting the Lansweeper service and go through the update procedure each time.
If your Lansweeper database is hosted on a different machine than the Lansweeper service, running the installer on the machine hosting your database is not required. The database is automatically updated when you update the machine hosting the service.
167/169
www.lansweeper.com
Support Knowledge base
The Lansweeper knowledge base can be found at the URL below. http://lansweeper.com/kb/
The Lansweeper knowledge base is the ideal place to find answers to common billing related or technical questions. It contains a variety of articles explaining Lansweeper features and functionality. It also describes and provides solutions for scanning errors you may encounter. You can perform a search to find specific knowledge base articles.
Forum
The Lansweeper forum can be found at the URL below. http://lansweeper.com/forum/
The Lansweeper forum is the ideal place to request features and share reports, actions or widgets. It also houses any beta installers currently in development. To post on the forum, you must first create a forum account. Note that, even if you purchased a Lansweeper license, you do not automatically get a forum account. You can easily create one however. â&#x20AC;˘
To create a forum account, click the Register link in the top right corner of the forum, complete the form and hit the Create User button.
168/169
www.lansweeper.com
•
To upgrade your forum rank from Freeware User to Premium User, click the link Upgrade your forum status to Premium User in the Lansweeper Premium Users section of the forum, enter your Lansweeper license key into the input box and hit the Validate license key button.
Contact If you have any Lansweeper related questions that are not answered in the documentation, knowledge base or forum, you may always contact the Lansweeper support team.
Reseller and billing related questions If you would like to generate a price quote, get more info on licensing plans, apply for a reseller account or ask any other billing related question, please use one of the support options listed below. •
Email sales@lansweeper.com
•
Skype Skype ID: Lansweeper
•
Phone US: +1 315 359 4963 UK: +44 20 3286 2038
Technical questions If you have a technical question that was not answered by the documentation, knowledge base or forum, please contact the Lansweeper team via email, at support@lansweeper.com
169/169