You are on page 1of 111

version 4.2.0.

52

Index
Requirements
System requirements ............................................................................................................ 1 Database configuration ......................................................................................................... 2 Domain scanning requirements ............................................................................................ 5 Workgroup scanning requirements ...................................................................................... 6

Installation
Installing Lansweeper............................................................................................................ 8 Component access ................................................................................................................14 Adding scanning servers ......................................................................................................16

Subscriptions
Upgrading to premium .........................................................................................................18

Scanning setup
Credentials ............................................................................................................................19 Preferences............................................................................................................................21 Active scanning .....................................................................................................................24 Workgroup scanning.............................................................................................................25 IP range scanning .................................................................................................................26 Eventlog scanning.................................................................................................................28 Scheduled scanning ..............................................................................................................31 LsPush ....................................................................................................................................32 LsClient ..................................................................................................................................36 LsTrigger ................................................................................................................................39 Which scanning method should I use? ................................................................................41

Scanning options
Scan intervals........................................................................................................................43 Scan exclusions.....................................................................................................................45 File scanning..........................................................................................................................46 Registry scanning..................................................................................................................47 Deleting and rescanning.......................................................................................................48

Further configuration
Restricting web console access............................................................................................49 IP range locations .................................................................................................................54 Allowed local administrators ................................................................................................55 Vendor support links.............................................................................................................56 Custom fields.........................................................................................................................57 Date formatting.....................................................................................................................59 Adding user pictures.............................................................................................................60

Devices
Scanning devices ..................................................................................................................61

Scanning Linux, Unix and Mac computers ..........................................................................62 Editing device details............................................................................................................63 Mapping devices to types .....................................................................................................64 Adding new device types......................................................................................................65

Software management
Product license keys .............................................................................................................66 Operating system license usage ..........................................................................................68 Software license usage.........................................................................................................69 Anti-virus software names ...................................................................................................71 Approved software ................................................................................................................72 Approved activeX controls....................................................................................................73

Actions
Custom actions .....................................................................................................................74 Configuring Internet Explorer ..............................................................................................77 Configuring Firefox ...............................................................................................................78 Configuring Chrome..............................................................................................................79

Reports
Using reports.........................................................................................................................80 Custom reports .....................................................................................................................82 File reports ............................................................................................................................87 Registry reports ....................................................................................................................89 Email report alerts ................................................................................................................91 Email eventlog alerts ............................................................................................................92

Premium tools
Download ...............................................................................................................................94 Register .................................................................................................................................95 Remote screenshot ...............................................................................................................96 Remote control......................................................................................................................97 Remote uninstall ...................................................................................................................98

Back Up, Move, Update


Backing up your installation.................................................................................................99 Moving Lansweeper ............................................................................................................ 102 Updating Lansweeper ......................................................................................................... 102

Troubleshooting
Connection problems .......................................................................................................... 106

Support
Knowledge base .................................................................................................................. 108 Forum................................................................................................................................... 108 Contact ................................................................................................................................ 108

www.lansweeper.com

Requirements
System requirements
The Lansweeper software consists of the following components: 1. Lansweeper service: performs all of the actual scanning 2. Database: stores all the scanned information 3. Web console: brings all scanned information together in a comprehensive way These components can be installed together on one machine or separately on different machines.

Lansweeper is agent-free. No additional software is needed on your client workstations.

The following requirements should be met: Server where the Lansweeper service is installed: 32-bit or 64-bit Windows 2003 or higher The .NET Framework 2.0 or higher installed, updated to the latest service pack Database server: 32-bit or 64-bit Windows 2000 or higher SQL Server 2000, SP4 or higher (or the free SQL Server Express) SQL Server 2005 or higher is recommended. Web server: 32-bit or 64-bit Windows 2000 or higher Internet Information Services (IIS) or the free IIS Express installed The .NET Framework 2.0 or higher installed, updated to the latest service pack Clients: 32-bit or 64-bit Windows 2000 or higher (Windows 9x clients are not supported) Windows Home versions are only supported when using LsPush for scanning. Event log scanning is not supported in Windows 2000.

1/108

www.lansweeper.com

Database configuration
Setting up your SQL server
If you dont have a database server, setup will install the free SQL Server Express. SQL Server 2000 does not require any extra configuration.

The following is only required if you want to install the different Lansweeper components on different servers and if you are using SQL Server 2005 or higher.
Open the SQL Server Configuration Manager.

Enable Named Pipes and TCP/IP.

Set the SQL Server Browser to automatic and start it (if not already started). Restart the SQL service.

2/108

www.lansweeper.com

Enabling mixed authentication in your SQL Server


You should enable mixed authentication in your SQL Server. If you let the Lansweeper setup install SQL Server Express, this will already be properly configured.

Start SQL Server Management Studio. If it wasnt installed along with your version of SQL Server, you can download it here: http://www.microsoft.com/download/en/details.aspx?id=7593

Enter the Server name and select Windows Authentication. Make sure you are logged in with administrative credentials.

3/108

www.lansweeper.com

Right-click on the server name and select Properties.

Go to Security and select SQL Server and Windows Authentication Mode.

Right-click on the server name and select Restart to restart the SQL services.

4/108

www.lansweeper.com

Domain scanning requirements

No added requirements must be met for domain scanning when using the LsPush scanning method. The requirements below apply to all scanning methods except LsPush.

1. The scanning account must be an administrator on the scanned computers. Lansweeper uses alternate credentials if they are configured for the domain.

If no alternate credentials are configured, the service account is used.

2. Windows Firewall on the client machines must be configured to have Remote Administration enabled. In a domain the easiest way to do this is to create a Group Policy. Please refer to the following knowledge base article for info on how to configure Windows Firewall using Group Policies: http://lansweeper.com/kb/firewall.aspx

3. Any third party firewalls on the client machines must be configured to have Windows Remote Administration enabled.

5/108

www.lansweeper.com

Workgroup scanning requirements

No added requirements must be met for workgroup scanning when using the LsPush scanning method. The requirements below apply to all scanning methods except LsPush.

1. The scanning account must be an administrator on the scanned computers. You need a common username/password combination on all workgroup computers. In the example below weve created a user lsremoteuser and added it to the administrators group on all workstation computers.

2. Windows Firewall on the client machines must be configured to have Remote Administration enabled. The following script can be used to configure the necessary DCOM and Windows Firewall settings: http://www.lansweeper.com/files/lansweeper.vbs

3. Any third party firewalls on the client machines must be configured to have Windows Remote Administration enabled.

4. On Windows Vista and Windows 7 client computers, User Account Control (UAC) must be disabled. Optionally, you could disable UAC for the remote administrator only: Start regedit.exe and go to key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system Create new Dword value: LocalAccountTokenFilterPolicy Set LocalAccountTokenFilterPolicy to 1 Please refer to the following article for more info on handling remote connections under UAC: http://msdn.microsoft.com/enus/library/aa826699(VS.85).aspx#handling_remote_connections_under_uac

5. Your security model must be set to Classic: Start/run secpol.msc Navigate to Local Policies\Security Options Set Network access: Sharing and security model for local accounts to Classic Restart the computer 6/108

www.lansweeper.com

6. Workgroup client computers must be visible in the network browser. (This is not necessary when using IP range scanning.)

7/108

www.lansweeper.com

Installation
Installing Lansweeper
All Lansweeper subscription plans use the same installer. The various licensing plans are applied to the installer through different license keys.

You can always find the latest version of Lansweeper on our download page: http://lansweeper.com/download.aspx

In the following example we will be installing the Lansweeper service, database and web console on a single machine. These are our credentials: Server name: myserver Domain: lansweeper.local NetBIOS domain: lansweeper

Run Lansweeper.exe. You will be presented with the welcome screen. Click Next to continue.

8/108

www.lansweeper.com

Read and accept the license agreement and click Next to continue.

You can choose an easy or an advanced install. An easy installation will install all Lansweeper components on the machine. An advanced installation lets you pick and choose which components you want, allowing you to spread out your installation over different servers. For this example were installing everything on the same server. If youre installing the different components on different servers, youll do an advanced installation on each machine. You can then select the component you want to install on each particular server. Click Next to continue.

9/108

www.lansweeper.com

Choose your SQL Server and authentication method. If you dont have an SQL Server, setup will install the free SQL Server Express. The free SQL Server Express has a database limit of 4GB. Click Next to continue.

If for some reason you cannot connect to your SQL server:

Sqlcmd: Error: Microsoft SQL Native Client: An error has occurred while establishing a connection to the server. When connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not allow remote connections. Solution: http://support.microsoft.com/kb/914277/en-us

Next you will be prompted to enter your user details. Running the setup in a domain or a workgroup will give different options.

The user running the service must have administrative privileges on all clients being scanned by Lansweeper.
This is typically a domain administrator account. If you have a workgroup, you will need an account with the same username/password combination on all machines. You can submit credentials for additional domains/workgroups after setup has finished. When youve entered your credentials, click Next to continue. 10/108

www.lansweeper.com

Domain:

Workgroup:

11/108

www.lansweeper.com

Enabling IP scanning and SSH is recommended. IP range scanning is used to discover devices in your network: printers, routers If you dont have an active directory domain, you can also use IP range scanning and/or workgroup scanning to discover Windows machines. SSH is used for Linux, Mac and VMware scanning. Click Next to continue.

Setup will recommend installing the default web server, which is the free UltiDev. A new website will be created on a new port. Advanced users can also choose to install a new website or virtual directory using IIS. Click Next to continue.

For info on how to secure your website, please refer to page 49 of this documentation.

12/108

www.lansweeper.com

Choose a destination folder and click Install to continue.

When setup has been completed, you can (optionally) subscribe to our newsletter and post about your successful installation on Facebook, LinkedIn or Twitter. Click Finish to exit setup.

13/108

www.lansweeper.com

Component access
Lansweeper is now installed and the service should be operational. Go to your server where the service is running (not the web console) to access your scanning queue. The address is: http://servername:9524

If there are any errors, you can find the Errorlog.txt file in your Service folder within the Lansweeper directory. The path is the following:
%Program Files%\Lansweeper\Service

The Lansweeper installer will have generated two shortcuts on your desktop, one for your web console and one for your configuration console.

14/108

www.lansweeper.com

The web console gathers all scanned data in a comprehensive way, based on how you customized your settings in the configuration console. You can also easily access your scanning queue through the web console, by clicking your scanning server.

Click to access scanning queue

The rest of this documentation will mainly focus on the configuration console, showing you how you can customize various settings to suit your needs. Lets log into it.

Named instance Server: your SQL server Database: lansweeperdb

Default instance

You can use integrated authentication or you can connect with a username and password. You can change the default password of the SQL user later if you want. Username: lansweeperuser Default password: mysecretpassword0*

If you change the password of lansweeperuser, you also need to edit the following files to reflect the changes: \Lansweeper\Service\Lansweeperservice.exe.config \Lansweeper\Website\web.config
15/108

www.lansweeper.com

Adding scanning servers


If you have a Lansweeper enterprise license, you may at this point want to set up additional scanning servers. Adding scanning servers is easy and can be done through the Lansweeper installer as well.

Run Lansweeper.exe on the scanning server you want to add and click through the opening and license agreement screens. Choose an advanced install, selecting only the Lansweeper service for installation.

Specify the server where the Lansweeper database was installed. If you are using a named instance, the format is servername\instance_name. If you are using a default instance, the format is servername.

16/108

www.lansweeper.com

Enter your credentials. Running the setup in a domain or a workgroup will once again give different options. The user running the service must have administrative privileges on all clients being scanned by Lansweeper. Domain: Workgroup:

Choose the IP range youd like your new scanning server to scan. It makes sense of course to let each server scan its own range. You can add additional ranges when the installation has been completed.

Next you will be prompted to choose an install location. Select your destination folder and hit Install.

Your new scanning server has now been set up and you will see it listed in your configuration console. Your configuration settings are saved in your database, so your configuration console will look the same on all of your servers.

17/108

www.lansweeper.com

Subscriptions
Upgrading to premium
When you first install Lansweeper, a 20-day trial period is initiated. When this trial runs out, the software reverts to its freeware version. Your database will still be accessible, but you wont be able to use any of Lansweepers premium features. You can then purchase a license key through our online store to upgrade to a premium plan.

Our online store can be found here: http://lansweeper.com/premium-users.aspx

After purchasing your license, youll receive an email receipt with your license key included. If you cant find your license key, please contact us at sales@lansweeper.com and provide us with the reference number for your order or the email address used for billing. Copy and paste your license key into the Home screen of the Lansweeper configuration console and click the Validate license code button.

Your license will be applied within 1 minute.

The remote screenshot, remote control and remote uninstall premium tools need to be registered separately. Please refer to page 95 of this documentation for info on how to register these tools.

18/108

www.lansweeper.com

Scanning setup
Credentials
First we must check our scanning credentials in the configuration console. You may have already entered your credentials during the installation process, but you can submit additional domains or workgroups for scanning here.

You must use an account that has administrative privileges on all domain/workgroup computers you are attempting to scan. You may specify one account per domain/workgroup, for an unlimited number of domains/workgroups.

Domains
Domain should be the NetBIOS name of your domain. Please refer to the following knowledge base article for info on how to find your NetBIOS name: http://lansweeper.com/kb/findnetbiosname.aspx

If you want to use credentials from a computer that cannot be verified (a DMZ standalone computer for instance), you can check the box Dont try to authenticate username\password.

Workgroups If you need additional credentials for workgroups, you must specify the user as .\username Do not use accounts with blank passwords.
When scanning workgroups you need a common username/password combination that has administrative privileges on all workgroup computers. 19/108

www.lansweeper.com

If you want to use credentials from a computer that cannot be verified, you can check the box Dont try to authenticate username\password.

20/108

www.lansweeper.com

Preferences
Next well configure our scanning preferences and methods. Open your Lansweeper configuration console and select your scanning server. The premium version of Lansweeper will have only one scanning server, the enterprise version can have several.

Scanning & cleanup options:


Cleanup and refresh actions are performed when the Lansweeper service is started and subsequently every 24 hours. Automatically make non-active computers active when they are rescanned. This option can be handy if you set computers to non-active when used as spare. As soon as the computer is seen on the network and rescanned, it will automatically become active. You can set a computer to non-active through its page in the web console.

Remove computers not found in active directory from all tables. Warning: computers will be permanently deleted from the database. Set computers to non-active if not found in active directory. Computers will not be deleted from the database, but they will be marked nonactive in the web console.

21/108

www.lansweeper.com

Remove computers disabled in active directory from all tables. Warning: computers will be permanently deleted from the database. Set computers to non-active if disabled in active directory. Computers will not be deleted from the database, but they will be marked nonactive in the web console. Remove active directory users not found in active directory. Warning: users will be permanently deleted from the database. Remove active directory users disabled in active directory. Warning: users will be permanently deleted from the database. Refresh active directory computer details. All active directory information from computers already in the database will be refreshed. Refresh active directory user details. All active directory information from users already in the database will be refreshed. Delete history from all history tables after xx days. History tables are used to track changes (add/remove of components or software) and can be found in the web console. Set computers to non-active if not seen in the last xx days. Computers will not be deleted from the database, but they will be marked nonactive in the web console. Permanently delete computers not seen in the last xx days. Warning: computers will be permanently deleted from the database. Not recommended if you have a lot of roaming portable users that dont come in the network very often. Delete eventlog entries after xx days. Eventlog information takes up a lot of database space. It is recommended to keep this value low. Eventlog entries can be found in the web console. Delete system errorlog entries after xx days. The System Scanning Log can be found in the web console, under Reporting. Delete logon information after xx days. Logon information can be found in the Config/User Info tab of computer pages in the web console.

Service options:

Listen port This is the TCP port used by Lansweeper to listen for incoming LsClient and LsPush requests. It is also used to view the scanning queue and server status. Computer Threads The number of simultaneous scans Lansweeper performs. On dedicated multiprocessor machines you can set this value higher (up to 75). 22/108

www.lansweeper.com

IP Threads The number of IP addresses simultaneously scanned by IP range scanning. It is recommended to keep this value low to save processor resources.

Changing service options values requires you to restart the Lansweeper service.

Eventlog scanning:

By default eventlog scanning only scans errors. If you need additional information scanned, you can enable either of the following events: Warning events, Information events, Success audit events, Failure audit events. Be aware that scanning additional events can quickly fill your database.

Email options:

If you want to use email alerts, its important to specify an email relay server in your configuration. Normally you enable report mailing on only one scanning server, in order to avoid duplicate email reports. Eventlog mailing can be enabled on multiple scanning servers. How to define which reports and alerts are sent to email is shown later in the documentation.

23/108

www.lansweeper.com

Active scanning
This scanning method is not available in the freeware version of Lansweeper.

Active scanning allows you to scan multiple domains and selected OUs without the need to install any client on the workstations. Active scanning is a set it and forget it option. It will query your domain controllers to find out recently connected workstations and servers. This scanning method is recommended if you have an active directory domain.

How does it work?


No software is needed on your client workstations. Lansweeper queries all domain controllers in the domain for newly logged on computers. This process is repeated every 15 minutes. New computers that are found are added to the scanning queue at most once every 20 hours. When you start or restart the service, active scanning looks for computers logged on in the last 14 days. If a computer is currently offline, it will give an RPC error (which can be safely ignored). Active scanning domains Fill in the DNS name and the NetBIOS name (pre-Windows 2000) of your domain. Make sure you check the Enable active scanning checkbox. Please refer to this article for info on how to find your DNS and NetBIOS name: http://lansweeper.com/kb/findnetbiosname.aspx Info on how to scan untrusted domains can be found here: http://lansweeper.com/kb/untrusted.aspx Active scanning OU filtering By default active scanning scans all recently seen computers in the domain. Use OU filtering to limit the scanning to specific OUs. Domain controller site filtering By default active scanning queries all domain controllers in the domain for recently seen computers. Use domain controller site filtering to limit this behavior to specific sites. This feature only applies to domain controllers, not to computers. Normally you dont need to use this! 24/108

www.lansweeper.com

Workgroup scanning
This scanning method is not available in the freeware version of Lansweeper.

Workgroup scanning scans all computers in the specified workgroups, without the need to install any client on the workstations. To detect the computer it should be visible when browsing with windows explorer in the network neighborhood.

How does it work?


No software is needed on your client workstations. Lansweeper queries the computers visible in the specified workgroup in the network neighborhood. This process is then repeated every 15 minutes. New computers that are found are added to the scanning queue at most once every 20 hours. Automatically scan these workgroups Enter the name of your workgroup here. Make sure you check the Enable workgroup scanning checkbox.

25/108

www.lansweeper.com

IP range scanning
This scanning method is not available in the freeware version of Lansweeper.

IP range scanning allows you to scan specified IP ranges at scheduled time intervals. Each range has its own scanning schedule. Scanning takes place at most once a day. IP range scanning can discover devices in your network (printers, routers) that have the SNMP (SNMPv1 or SNMPv2), SSH, HTTP, HTTPS, FTP, SMTP, SIP, Telnet or JetDirect protocol enabled.

Linux, Unix and Mac computers are considered devices in Lansweeper. For more information on how to scan these computers, please refer to page 62 of this documentation. How does it work?
No software is needed on your client workstations. At the scheduled time, the IP addresses are added to the scanning queue. The actual scan time depends on the size of the queue at that time. Credentials Clicking this button brings up the credentials screen for the IP range. Each IP range can have different credentials.

26/108

www.lansweeper.com

Domain/workgroup credentials are used to scan Windows computers. When No Windows is unchecked, the scanning credentials for the specified domains/workgroups will be used first. You can enter up to three domain or workgroup names. The credentials for the specified domains/workgroups must be present in the configuration console under Scanning Options/Scanning Credentials. More info on scanning credentials can be found on page 19 of this documentation. Make sure you use a domains NetBIOS name. You can specify up to three SNMP community strings per range. SSH credentials are used to log onto Linux, Unix, Mac machines. To discover these machines, you must enable SSH on them and enter their SSH credentials in the Credentials box for their IP range. You can enter up to three user/password combinations. Always start with User 1. Time-out Pinging the target IP address times out in X seconds. In high traffic networks it is recommended to increase this value. Dont ping When enabled, all IP addresses will be scanned regardless of the ping result. This slows down the scanning process. No Windows When enabled, Windows machines will be ignored by the IP range scan. DefaultDomain When No Windows is unchecked, the scanning credentials for this domain or workgroup will be used first. If you want to specify more than one domain or workgroup, click the Credentials button instead. You can enter up to three domain or workgroup names under Windows default Domain or Workgroup. Make sure you use a domains NetBIOS name. Scan all enabled ranges now

Use this button if you want to do an immediate scan of all enabled IP ranges.

IP exclusions
You can exclude IP addresses from IP range scanning by adding them to your IP exclusions list.

27/108

www.lansweeper.com

Eventlog scanning
This scanning method is not available in the freeware version of Lansweeper.

With most scanning methods, computers are scanned every day or every couple of days. Often users want to have eventlogs of important servers scanned faster to generate email alerts however. Eventlog scanning incrementally updates your servers eventlog and generates the necessary alerts in time.

How does it work?


No software is needed on your client workstations. Eventlog scanning scans only the eventlog and ignores the other scanning wait time settings. At the scheduled time, the computers will be added to the scanning queue. The actual scan time depends on the size of the queue at that time. Eventlog scanning can be used in combination with all the other scanning methods. Recurring Scanning occurs every xx minutes or hours. (Use in combination with M/H.) M/H M: the scanning occurs every xx minutes. H: the scanning occurs every xx hours. Scan Computer: scan one single computer by name. This can be used for both domain and workgroup computers. ADSI path: scan all computers in an active directory container (recursively). This can only be used for domain computers. Target Computer name (NetBIOS name) if you choose Computer. Path name if you choose ADSI path. ADSI paths are scanned recursively. Domain Name of the workgroup or NetBIOS name of the domain containing the computer(s) being scanned. (This is needed to select the proper credentials.)

28/108

www.lansweeper.com

Choosing which event types to scan


By default eventlog scanning only scans errors. If you need additional information scanned, you can enable either of the following events: Warning events, Information events, Success audit events, Failure audit events. Be aware that scanning additional events can quickly fill your database.

Ignoring eventlog events


Recurring events can quickly fill your database. If you want to ignore certain events, you can add them to your eventlog ignore list.

The ignored events will never be saved in the database and will never show up in the web console.

Deleting eventlog entries


You can choose how long eventlog entries are kept in the database. Entries that are older than the specified time frame will be deleted when the Lansweeper service is started or subsequently after 24 hours.

29/108

www.lansweeper.com

Eventlog reports
You can extensively analyze eventlog results using table tblntlogevent in the report builder. More information on building custom reports can be found on page 82 of this documentation.

Email eventlog alerts


You can also choose to have specific eventlog alerts emailed to you as soon as theyre scanned.

For info on how to have eventlog alerts emailed to you, please refer to page 92 of this documentation.

30/108

www.lansweeper.com

Scheduled scanning
This scanning method is not available in the freeware version of Lansweeper.

Scheduled scanning allows you to scan computers, complete domains or OUs at scheduled time intervals. Each scan target has its own scanning schedule. Scanning takes place at most once a day.

How does it work?


No software is needed on your client workstations. At the scheduled time, the computers are added to the scanning queue. The actual scan time depends on the size of the queue at that time. Scan Computer: scan one single computer by name. This can be used for both domain and workgroup computers. ADSI path: scan all computers in an active directory container (recursively). This can only be used for domain computers. Target Computername (NetBIOS name) if you choose Computer. Path name if you choose ADSI path. ADSI paths are scanned recursively. Domain Name of the workgroup or NetBIOS name of the domain containing the computer(s) being scanned. (This is needed to select the proper credentials.) Scan selected target now

Use this button if you want to do an immediate scan of all enabled scan targets.

31/108

www.lansweeper.com

LsPush
This scanning method is not available in the freeware version of Lansweeper.

The LsPush.exe can be used on client machines to initiate a scan. It takes a full local inventory of the client machine by itself and does not rely on the Lansweeper service to perform the scan. This makes it ideal for scanning the computers of your remote workers. LsPush is best deployed using a logon script or GPO. Scan results can automatically be integrated into the database through a direct server connection with the Lansweeper service. They can also be sent through email or stored in a file to be imported into the database later. LsPush can automatically open the default mail program on the computer, attaching the scan results to a new email message.

This scanning method offers many advantages: No administrative privileges required. No more problems with inbound firewalls or RPC server unavailable. No more remote access denied problems. Works with Windows Home versions. Can be used in logon scripts/scheduled jobs/custom scripts A full scan takes only 40KB of traffic.

How does it work?


During installation, the LsPush.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Client

32/108

www.lansweeper.com

Using LsPush with direct server connection


Syntax lspush.exe servername port /showresult servername This refers to the name of the server where the Lansweeper service is installed. port This is optional. The default port is 9524. /showresult Used for testing purposes. You will get a message back, Success or Failed, based on whether or not the connection to the server could be established. Some examples, to be run from a command prompt: C:\>Program Files\Lansweeper\Client\lspush.exe myserver C:\>Program Files\Lansweeper\Client\lspush.exe myserver 9500 C:\>Program Files\Lansweeper\Client\lspush.exe 192.168.1.50 /showresult

Using LsPush with email


Run the LsPush.exe without any extra parameters. You will see a progress window for the scan being performed.

When the scan completes, MAPI is used to open the default mail program and attach the scan results to a new email message.

The administrator can copy the file to his Lansweeper import folder, where the service will process it. The path is: %Program Files%\Lansweeper\Service\import

33/108

www.lansweeper.com

Using LsPush with file export


Run the LsPush.exe with the parameter /file Example: C:\>Program Files\Lansweeper\Client\lspush.exe /file You will see a progress window for the scan being performed.

After the scan completes, the temporary folder will be opened with the result.

The administrator can copy the file to his Lansweeper import folder, where the service will process it. The path is: %Program Files%\Lansweeper\Service\import

Using LsPush with direct copy to folder


Run the LsPush.exe with the parameter /folder Example: C:\>Program Files\Lansweeper\Client\lspush.exe /folder c:\temp\foldername C:\>Program Files\Lansweeper\Client\lspush.exe /folder \\servername\sharedfolder

Using LsPush in a standard logon script


In this example the startup script is called startup.cmd.

34/108

www.lansweeper.com

Example contents of the startup.cmd: %logonserver%\netlogon\lspush.exe myserver

Now copy the LsPush.exe to your netlogon folder.

Deploying LsPush using a GPO


More technical information can be found in this knowledge base article: http://support.microsoft.com/kb/322241/en-us

Make sure you use a logon script instead of a startup script, because this is running in the context of the user.

A vbs script that runs LsPush hidden could look like this: Set WshShell = CreateObject(Wscript.Shell) WshShell.run %logonserver%\netlogon\lspush.exe myserver,0

35/108

www.lansweeper.com

LsClient
This is the only scanning method available in the freeware version of Lansweeper.

The LsClient.exe can be used on client machines to initiate a scan and is in that regard similar to LsPush. The difference is that, although the name would suggest otherwise, LsClient is no real client or agent. Basically it just sends a message to the server hello, Im here, scan me on this IP address and stops working. The service queues this request and starts scanning the client when ready. All the scanning is done by the Lansweeper service. Wherever possible, we recommend using LsPush instead of LsClient. Since LsPush performs scans locally, it is much less vulnerable to access denied and firewall issues. Read about the other advantages of LsPush on page 32 of this documentation.

How does it work?


During installation, the LsClient.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Client Syntax lsclient.exe servername port /showresult

36/108

www.lansweeper.com

servername This refers to the name of the server where the Lansweeper service is installed. port This is optional. The default port is 9524. /showresult Used for testing purposes. You will get a message back, Succeeded or Failed, based on whether or not the connection to the server could be established. /scanonip This is a new option. You can use it if you have VPN clients and want to scan them on the IP address they currently have without the need to have DNS updated. Some examples, to be run from a command prompt: C:\>Program Files\Lansweeper\Client\lsclient.exe myserver C:\>Program Files\Lansweeper\Client\lsclient.exe myserver /showresult

Using LsClient in a standard logon script


In this example the startup script is called startup.cmd.

Example contents of the startup.cmd: %logonserver%\netlogon\lsclient.exe myserver

Now copy the LsClient.exe to your netlogon folder.

37/108

www.lansweeper.com

Deploying LsClient using a GPO


More technical information can be found in this knowledge base article: http://support.microsoft.com/kb/322241/en-us

Make sure you use a logon script instead of a startup script, because this is running in the context of the user.

A vbs script that runs LsClient hidden could look like this: Set WshShell = CreateObject(Wscript.Shell) WshShell.run %logonserver%\netlogon\lsclient.exe myserver,0

38/108

www.lansweeper.com

LsTrigger
This scanning method is not available in the freeware version of Lansweeper.

LsTrigger has the same functionality as clicking Full Rescan in the web interface and is provided for backwards compatibility.

Use LsTrigger to force/trigger remote scanning of a workstation from the command line. This only works for computers that are already in the database. When you trigger a scan, all information for this computer is rescanned regardless of the item wait times that have been set. (More information on item wait times can be found on page 43 of this manual.)

How does it work?


During installation, the LsTrigger.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Actions

39/108

www.lansweeper.com

Syntax lstrigger.exe servername computer domain port

servername This refers to the name of the server where the Lansweeper service is installed. port This is optional. The default port is 9524. Example, to be run from a command prompt: C:\>Program Files\Lansweeper\Actions\lstrigger.exe myserver lansweeper-001 lansweeper

40/108

www.lansweeper.com

Which scanning method should I use?


Which scanning method(s) youll be using depends largely on what you are trying to accomplish in your network. Wanting to scan absolutely everything that comes into the network requires a different approach for instance than if you simply wanted to scan machines that are regularly used. The following overview lists some of the pros and cons of each scanning method. Be aware that you can combine different scanning methods to achieve the results you need.

Active scanning
Easy setup Requires an active directory domain Suitable for scanning domain computers Newly logged on computers are found within 15 minutes. Computers are scanned at most once every 20 hours. Cons: Firewalled computers will be detected, but they will return an RPC error.

Workgroup scanning
Easy setup Suitable for scanning workgroup computers that are visible in the network Newly logged on computers are found within 15 minutes. Computers are scanned at most once every 20 hours. Cons: Firewalled computers will be detected, but they will return an RPC error.

IP range scanning
Easy setup Suitable for scanning devices as well as domain and workgroup computers Scanning happens at scheduled times and at most once a day. Cons: Scanning may take longer if large IP ranges are specified. Firewalled computers will not be detected. Devices without the necessary protocols enabled are not scanned.

Eventlog scanning
Easy setup Suitable for scanning only eventlogs Scanning happens every xx minutes or every xx hours, based on user preference.

41/108

www.lansweeper.com

Scheduled scanning
Easy setup Suitable for scanning domain and workgroup computers Scanning happens at scheduled times and at most once a day. Cons: Firewalled computers will be detected, but they will return an RPC error.

LsPush
Best used in a logon or other custom script Suitable for scanning domain and workgroup computers If used in a script, scanning happens when the user logs into the computer. No administrative privileges required. Firewalled computers can be scanned without problem. Offsite computers can be scanned.

LsClient
Best used in a logon or other custom script Suitable for scanning domain computers If used in a script, scanning happens when the user logs into the computer. Cons: Firewalled computers will be detected, but they will return an RPC error.

42/108

www.lansweeper.com

Scanning options
Scan intervals
Not all information is scanned all the time. It makes little sense to constantly scan hardware details for instance, as this data rarely changes. Lansweeper lets you specify which items are updated when a computer is scanned.

-1 0 X

= disable scanning for this item. = always scan this item. = scan this item every x days.

When a computer is scanned for the first time, all items with a wait time higher than -1 are scanned. Examples: Codec = -1 When the computer is scanned, codec information is never scanned. Files =0 When the computer is scanned, file information is scanned each time. Network = 1 When the computer is scanned, network information is scanned if it wasnt scanned in the last 24 hours. Cdrom = 60 When the computer is scanned, cdrom information is scanned if it wasnt scanned in the last 60 days.

If you find that some information is never scanned, make sure that the item wait time is set to something other than -1.

Most scanning methods adhere to the item wait times. Some do not however, allowing you to rescan all items that have not been disabled. Wait times apply for: Active scanning, workgroup scanning, IP range scanning, scheduled scanning, LsClient, Rescan in web and configuration console 43/108

www.lansweeper.com

Wait times do not apply for: First time scan, LsPush, LsTrigger, Full Rescan in web and configuration console

Rescan and Full Rescan are available in the web console for individual computers and devices, domains and IP locations.

You can also easily rescan multiple computers and devices through the configuration console. All scanned machines can be found under Scanned computers and Scanned devices. Use Ctrl+Shift for multiple selections. You can use filters and custom sorting to select the machines you want.

44/108

www.lansweeper.com

Scan exclusions
If you wish to exclude some computers from scanning, you can add them in the configuration console. This will prevent them from ever being scanned and ever showing up on the website.

Computer name Make sure you use the NetBIOS name of the computer. You can use the % wildcard to specify multiple computers. To exclude all computers starting with lan- you can use lan-% for instance.

45/108

www.lansweeper.com

File scanning
Lansweeper can scan specific files on client machines and return information such as version, file size and changed date. Results of these file scans can then be used to create custom reports with the report builder.

Filename You can use 3 optional parameters: %programfiles%, %programfiles(x86)% and %windir% If you use the %programfiles(x86)% parameter and the OS is 32-bit, then the result will be the same as the %programfiles% parameter. Enabled Enable scanning of this file. File size, company, version and other info will be scanned for this file.

File scanning results can be found in the web console:

For information on how to create reports with the gathered data, please refer to page 87 of this documentation.
Example reports: Which computer doesnt have the latest version of Firefox installed? Which computer doesnt have the latest version of anti-virus scanner X? Which computer doesnt have the needed DLL for application X? 46/108

www.lansweeper.com

Registry scanning
Lansweeper can scan specific registry keys on client machines. Results of these registry scans can then be used to create custom reports with the report builder.

Rootkey Select the root key in the remote registry. RegPath Select the path to scan. Regvalue Select the value to scan. Enabled Enable scanning of this item.

Registry scanning results can be found in the web console:

For information on how to create reports with the gathered data, please refer to page 89 of this documentation.

47/108

www.lansweeper.com

Deleting and rescanning


You can easily delete or rescan multiple computers and devices through the configuration console. All scanned machines can be found under Scanned computers and Scanned devices.

Select one or more computers or devices. Use Ctrl+Shift for multiple selections. You can use filters and custom sorting to select the machines you want.

Delete This will delete the computer or device details and all related information from your database. It does not however prevent the machine from being rescanned. Rescan Rescans the selected machines. Item wait times apply. (For more information on item wait times, please refer to page 43 of this documentation.) Full Rescan Rescans the selected machines. Item wait times do not apply. (For more information on item wait times, please refer to page 43 of this documentation.) Refresh list Refreshes the grid with updated information from the database.

Deleting computers or devices through the configuration console does not prevent them from being rescanned. If you wish to exclude computers from scanning, add them to your computer exclusions list. If you wish to exclude devices, add them to your IP exclusions list. More information on these topics can be found on pages 45 and 27 of this documentation.

48/108

www.lansweeper.com

Further configuration
Restricting web console access
You can restrict access to the web console if you wish, only allowing certain groups in your domain to log in. Users will be prompted to enter a name and password. Those who are not part of the specified admin groups will be denied access.

Web server configuration


First you must make sure that your web server is configured correctly. The exact procedure depends on whether you are using IIS, IIS Express or the default UltiDev web server. If you are unsure whether you have a full or Express version of IIS, check your task manager processes. IIS Express will be listed as IISexpress.exe.

In your web server configuration make sure that anonymous access is disabled and that integrated authentication is enabled.

IIS 6:

49/108

www.lansweeper.com

IIS 7: If you cant find Windows Authentication in your IIS 7 configuration, make sure the option is checked in your Windows Features. You can find it under Internet Information Services/World Wide Web Services/Security.

Then you can change your configuration in the IIS Manager.

In IIS 7 you must also change the application pool of the website to a classic pool.

50/108

www.lansweeper.com

IIS Express: Open your iisexpress.config file. You can find it in the following directory: %Program Files%\Lansweeper\IISexpress

Locate the following code:

<authentication> <anonymousAuthentication enabled="true" userName="" /> <basicAuthentication enabled="false" /> <clientCertificateMappingAuthentication enabled="false" /> <digestAuthentication enabled="false" /> <iisClientCertificateMappingAuthentication enabled="false"> </iisClientCertificateMappingAuthentication> <windowsAuthentication enabled="false"> <providers> <add value="Negotiate" /> <add value="NTLM" /> </providers> </windowsAuthentication> </authentication>

Make the following changes, so that windowsAuthentication is enabled and anonymousAuthentication is disabled.

<authentication> <anonymousAuthentication enabled="false" userName="" /> <basicAuthentication enabled="false" /> <clientCertificateMappingAuthentication enabled="false" /> <digestAuthentication enabled="false" /> <iisClientCertificateMappingAuthentication enabled="false"> </iisClientCertificateMappingAuthentication> <windowsAuthentication enabled="true"> <providers> <add value="Negotiate" /> <add value="NTLM" /> </providers> </windowsAuthentication> </authentication>

51/108

www.lansweeper.com

UltiDev: The following service pack must be installed: http://www.microsoft.com/download/en/details.aspx?id=25150 If it has not yet been installed, it should be listed under your available Windows updates. Open the UltiDev Web App Explorer. You will see the Lansweeper web console listed under Default Shared Host Process.

Select the Authentication tab. Check Windows - negotiate Kerberos or NTLM and Windows - NTLM, uncheck Anonymous. Hit the Save config changes button.

Checking your settings: You can check if your web server is configured correctly by surfing to the following page: http://yourwebsite/usertest.aspx Your server should be configured for NT authentication. If it is configured for anonymous access, your web server settings are incorrect.

52/108

www.lansweeper.com

Admin groups
When the web server has been properly configured, you can input your allowed user groups. Open your web.config file. You can find it in the following directory: %Program Files%\Lansweeper\Website The contents looks like this:

<configuration> <appSettings> <add key="MM_CONNECTION_HANDLER_Lansweeper" value="sqlserver.htm"/> <add key="MM_CONNECTION_STRING_Lansweeper" value="Persist Security Info=False;Data Source=server;Initial Catalog=lansweeperdb;User ID=lansweeperuser;Password=*****;Connect Timeout=120"/> <add key="MM_CONNECTION_DATABASETYPE_Lansweeper" value="SQLServer"/> <add key="MM_CONNECTION_SCHEMA_Lansweeper" value=""/> <add key="MM_CONNECTION_CATALOG_Lansweeper" value=""/> </appSettings> <system.web> <compilation debug="false" strict="false" explicit="true"/> </system.web> </configuration>
Change the code to the following:

<configuration> <appSettings> <add key="MM_CONNECTION_HANDLER_Lansweeper" value="sqlserver.htm"/> <add key="MM_CONNECTION_STRING_Lansweeper" value="Persist Security Info=False;Data Source=server;Initial Catalog=lansweeperdb;User ID=lansweeperuser;Password=*****;Connect Timeout=120"/> <add key="MM_CONNECTION_DATABASETYPE_Lansweeper" value="SQLServer"/> <add key="MM_CONNECTION_SCHEMA_Lansweeper" value=""/> <add key="MM_CONNECTION_CATALOG_Lansweeper" value=""/> </appSettings> <system.web> <authentication mode="Windows"/> <identity impersonate="true" /> <authorization> <allow roles="domain\allowed group" /> <deny users="*" /> </authorization> <compilation debug="false" strict="false" explicit="true"/> </system.web> </configuration>
All users that belong to group domain\allowed group will be able to use Lansweeper, all other users will be denied. Domain must be the NetBIOS name of your domain. If you need multiple groups, you can separate them with commas:

<allow roles="domain\allowedgroup1,domain\allowedgroup2,domain\allowedgroup3" />


53/108

www.lansweeper.com

IP range locations
You can define custom locations, called IP range locations, in the configuration console. Its an easy way to group computers and devices together based on IP address.

The IP location overview can be found on the website. Click any location to view the computers and devices contained within it. If an IP address does not fall within any of the specified IP ranges, it will be grouped under Undefined.

A computer or devices IP location will be shown on its own webpage as well.

54/108

www.lansweeper.com

Allowed local administrators


You can specify users in the configuration console that are allowed to be local administrators on their computer. This information is used in the report Computer: Unauthorized Administrators.

Domain/Computer Name of the domain or computer. You can use % as a wildcard. Administrator account Name of the user.

55/108

www.lansweeper.com

Vendor support links


You can add vendor support links in the configuration console. This information is used to place links on computer and device info pages within the web console. Setting up vendor support links in the configuration console:

You can use the {assettag} and {model} parameter to link to specific vendor support pages.

A vendor support link example in the web console:

56/108

www.lansweeper.com

Custom fields
You can change the display name of the custom fields shown in the web console. There are custom fields for both computers and devices.

Changing the display name of custom computer fields in the configuration console:

The renamed custom computer field in the web console:

Reports can be created with this data using table tblCompCustom. Note that the report builder still makes use of the CustomX name of the field. You can use aliases to assign the same display names to your custom fields in the report builder. More information on creating reports can be found on page 82 of this documentation.

57/108

www.lansweeper.com

Changing the display name of custom device fields in the configuration console:

The renamed custom device field within the web console:

Reports can be created with this data using table tblCustDevices. Note that the report builder still makes use of the CustomX name of the field. You can use aliases to assign the same display names to your custom fields in the report builder. More information on creating reports can be found on on page 82 of this documentation.

58/108

www.lansweeper.com

Date formatting
You can change the date format used in the web console.

Open your configuration console and go to the Home tab. Choose your date format under Website date format. Restart your web browser to see the change take effect.

The date format implemented on one of the webpages, after the browser restart:

59/108

www.lansweeper.com

Adding user pictures


You can add user pictures to your web console by placing them in a custom folder within the following directory: %Program Files%\Lansweeper\Website\userpictures

Folder name The NetBIOS name of your domain. File name The name of the user. All files should be in the jpg format! An easy way to get the info you need is by hovering over a computer name in your domain overview.

folder name\file name

The user picture implemented in the web console:

60/108

www.lansweeper.com

Devices
Scanning devices
Lansweeper can discover devices in your network that have the SNMP (SNMPv1 or SNMPv2), SSH, HTTP, HTTPS, FTP, SMTP, SIP, Telnet or JetDirect protocol enabled. This is done through IP range scanning. More information on IP range scanning can be found on page 26 of this documentation. If you run into problems scanning certain devices, then you can use the device tester to see scanning details and test SNMP, SSH, passwords (If you dont need SSH credentials, simply enter a bogus user/password combination under SSH Login. For example, use the combination root/password.) During installation, the Devicetester.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Actions Syntax Devicetester.exe {ipaddress}

You can also run the device tester from the actions tab in the web console.

61/108

www.lansweeper.com

Scanning Linux, Unix and Mac computers


Linux, Unix and Mac computers are considered devices in Lansweeper. They are discovered, like any other devices, through IP range scanning. More information on IP range scanning can be found on page 26 of this documentation. In order for Lansweeper to scan the Linux, Unix or Mac, SSH needs to be enabled on the computer and the appropriate credentials need to be entered in the Lansweeper configuration console.

Enabling SSH on a Mac can be done through System Preferences/Internet & Wireless/Sharing. Make sure Remote Login is enabled. You can choose to allow access for all or some users.

You can then enter your credentials in the IP range scanning tab of the Lansweeper configuration console. Make sure scanning for your IP range is enabled. You can specify up to three user/password combinations. Always start with User 1.

62/108

www.lansweeper.com

Editing device details


You can make extensive manual changes to your device details in the web console.

Where applicable, make sure you check the lock against scanning checkbox before saving. Doing this will ensure that your manual changes are not overwritten by future scans.

Deleting a device through the web console does not prevent it from being rescanned. If you wish to exclude devices from scanning, add them to your IP exclusions list. More information on this topic can be found on page 27 of this documentation.

63/108

www.lansweeper.com

Mapping devices to types


If you enable SNMP on your devices, you can use the OID to automatically map a device to a device type and model. Finding the OID of a device within the web console:

Setting up device mapping in the configuration console:

You could also manually change a devices type by editing its details in the web console.

If you manually change the device type of a device, make sure you check the lock against scanning checkbox. Doing this will ensure that your manual changes are not overwritten by future scans.

64/108

www.lansweeper.com

Adding new device types


You can add new device types in the configuration console if the available options do not suit your needs.

Items in gray are system items and cannot be changed or deleted. If you wish to add custom icons for your new device type, you can place them in the following directory: %Program Files%\Lansweeper\Website\images

The new device type is now selectable in the web console:

65/108

www.lansweeper.com

Software management
Product license keys
Lansweeper allows you to keep track of your software product keys. You can enable/disable product keys you want scanned through the configuration console. The list provided here will be extended with future Lansweeper updates. You may also add your own product keys.

3 types of keys are currently supported: Plain Text, Microsoft and Adobe. Microsoft Office products are scanned automatically and do not show up in the product keys list. Cannot be scanned Keys for Microsoft Office versions 2000 and below Microsoft MAK keys The reason for this is that these keys are not stored on the computer.

Make sure that the item wait time for SERIALNUMBER is set to something other than -1 if you wish to scan product keys.

Product keys can be viewed on the various computer pages in the web console:

66/108

www.lansweeper.com

Adding product keys


You may add your own product keys to the default list included in Lansweeper. Do not add any registry locations for Microsoft Office products, as these will be scanned automatically. Locate the registry key you need within HKEY_LOCAL_MACHINE\SOFTWARE using regedit.

Add the key to the Lansweeper configuration console and give it a name.

Make sure that the item wait time for SERIALNUMBER is set to something other than -1.

If you immediately wish to scan the added keys, perform a Full Rescan through the web or configuration console.

67/108

www.lansweeper.com

Operating system license usage


The configuration console provides an overview of the operating systems found during scanning. If you want to track the license usage of an operating system, you can select it and add it to the list of tracked operating systems. You can edit the price per license and the number of licenses purchased. This data is compared against the number of client machines that were found to have the operating system installed during scanning.

# Purchased Number of licenses youve purchased for this operating system. # Price Price for one license. The currency used depends on the currency settings of the web server.

The total calculation and missing licenses can then be found in the web console:

68/108

www.lansweeper.com

Software license usage


The configuration console provides an overview of the software packages found during scanning. If you want to track the license usage of a software item, you can select it and add it to the list of tracked software. You can edit the price per license and the number of licenses purchased. This data is compared against the number of client machines that were found to have the software installed during scanning.

# Purchased Number of licenses youve purchased for this software package. # Price Price for one license. The currency used depends on the currency settings of the web server.

You may add single software packages or group several packages together under one name. This is useful if you have multiple versions and products for one license type. To add a single software package, click the upper add button. You can then edit the software details in the details pane. Use % as a wildcard to select multiple versions.

details pane

69/108

www.lansweeper.com

To group several packages together, first enter a license name. You can then add multiple software packages to the details pane by clicking the lower add button. Use % as a wildcard to select multiple versions of the same package.

The total calculation and missing licenses can then be found in the web console:

70/108

www.lansweeper.com

Anti-virus software names


You can add additional software packages to the list of recognized anti-virus software in the configuration console. Use the % wildcard to select multiple versions. This information is used in the following reports: Workstation: All workstations with Anti-virus software Workstation: All workstations without Anti-virus software Server: All servers with Anti-virus Server: All servers without Anti-virus software

71/108

www.lansweeper.com

Approved software
You can compile a list of approved or safe software in the configuration console. This will help you find illegal software usage. Click the add button to approve a software package.

This information is used in software overviews within the web console. Approved software has a green icon, unapproved software a red icon.

72/108

www.lansweeper.com

Approved activeX controls


The configuration console includes a list of approved ActiveX controls. You may edit this list or add new entries to suit your needs. This information is used for the report IE: unauthorized ActiveX control.

You can find an overview of all installed ActiveX controls on a computers webpage:

73/108

www.lansweeper.com

Actions
Custom actions
Actions are used to perform certain client operations. There are actions for computers, users and devices, which can be found in the web console.

Actions are run locally on the computer where you browse to the Lansweeper web console. They are run in the security context of the user starting the web console.

Make sure your web browser is properly configured to run Basic and Advanced actions. You can create your own custom actions in the configuration console. Additional custom actions can also be found here: http://lansweeper.com/kb/extra-custom-actions.aspx

Custom computer actions

Description What appears in the web console. 74/108

www.lansweeper.com

Action The command to execute. Variables {computer}, {domain}, {username}, {userdomain}, {tag}, {ipaddress}, {fqdn}, {actionpath} In large active directory domains it might be advisable to replace {computer} with {fqdn} to connect to the full DNS name. Icon Which icon to show in the interface. You can add your own icons to the actions folder inside the web folder. The path is the following: %Program Files%\Lansweeper\Website\actions

Sortorder The lower the number, the higher the action will be displayed in the web console. Enabled Show this action in the web console. Confirmation Ask for confirmation before executing this action. Advanced Show in the Basic or Advanced section of the actions list.

Custom user actions

Variables {username}, {userdomain}, {displayname}, {telephone}, {fax}, {mobile},{email},{OU},{cn},{actionpath} 75/108

www.lansweeper.com

Custom device actions

Variables {ipaddress}, {actionpath}, {mac}

76/108

www.lansweeper.com

Configuring Internet Explorer


Internet Explorer needs to be configured to run Basic and Advanced actions.

You can add your website to the trusted sites for security reasons. Go to Internet Options/Security/Trusted sites/Sites and add your Lansweeper website.

Go to Internet Options/Security/Trusted sites/Custom Level. Make sure that activeX controls are enabled, under Run ActiveX controls and plug-ins. Also change the setting Initialize and script ActiveX control not marked as safe to Prompt or Enable.

77/108

www.lansweeper.com

Configuring Firefox
Mozilla Firefox needs to be configured to run Basic and Advanced actions.

First download the plugin: http://lansweeper.com/files/firefox.zip The nplansweepershellexec.dll should be placed in the following directory: %Program Files%\Mozilla Firefox\Plugins

Restart Firefox if it was running. You can disable/enable the plugin afterwards from the Firefox menu/Tools/Add-ons.

78/108

www.lansweeper.com

Configuring Chrome
Google Chrome needs to be configured to run Basic and Advanced actions. First download the plugin: http://lansweeper.com/files/chrome.zip The nplansweepershellexec.dll should be placed in your Chrome Plugins folder. If the folder Plugins does not exist, you have to create it manually.

Windows XP
Path %USERPROFILE%\Local Settings\Application data\Google\Chrome\Application\Plugins

Restart Chrome if it was running. You can use the about:plugins link to check if the plugin is loaded:

Windows Vista or later


Path %localappdata%\Google\Chrome\Application\Plugins

Restart Chrome if it was running. You can use the about:plugins link to check if the plugin is loaded.

79/108

www.lansweeper.com

Reports
Using reports
Lansweeper provides you with extensive reporting tools for scanned data. The configuration console contains a list of built-in reports and you can create your own custom reports if you wish. The report builder gives an overview of all available reports, including any custom reports you may have created. Double-click on one of the reports to view or export the results contained within. Click on a report and choose Edit to modify the report. Report results can also be found in the web console.

You can sort reports into different categories or pages and assign priorities to them through the configuration console. The changes you make here are reflected in the web console.

80/108

www.lansweeper.com

Sort order The lower the number, the higher the report will be displayed in the web console. Report Name of the report. With the dropdown box you can select from all available reports, including any custom reports you may have made. Color When enabled, the report is shown in red if it contains results. Show % Shows the percentage of computers contained in this report. Page Which category or page the report should be filed under. With the dropdown box you can select from all available pages. Pages can be found in the web console. Priority Priority 1 Priority 2 Priority 3

= high priority = important = informational

Your report dashboard inside the web console will look like this:

categories

You can choose to have report results emailed to you every day.

For info on how to have report results emailed to you, please refer to page 91 of this documentation.

81/108

www.lansweeper.com

Custom reports
Sample report
We want to display all software found in our network from publisher Apple Inc. For this we will create a custom report in the report builder. Basic SQL knowledge is required.

To create a new report, click on the New button.

Drag the required tables to the query builder and select the fields you want. In this example we need tables tblComputers and tblSoftware. The fields we want are Computername, ComputerUnique, softwareName, SoftwarePublisher and Computer.

82/108

www.lansweeper.com

Lets filter out software from Apple Inc. by modifying the criteria for the field SoftwarePublisher. You can use the Result tab at the top of the builder to check your report results as youre making changes.

Final SQL code used for this report:

Select Top 1000000 tblComputers.Computername, tblComputers.ComputerUnique, tblSoftware.softwareName From tblComputers Inner Join tblSoftware On tblComputers.Computername = tblSoftware.ComputerName Where tblSoftware.SoftwarePublisher = 'Apple Inc.' Order By tblComputers.Computer

We can now save our report. Enter a View name and a Report name. The Report name is the name youll see in the report builder list. The View name is unique and used for internal storage. Do not include any special characters in your View name.

Our report is now available in the report builder list. Double-click the report to view its results and export options. Report results can be exported to Excel, XML, CSV

We can also add the report to the web console. Open the Reports & Alerts Dashboard in the configuration console and add your report to one of the report categories. More info on managing reports can be found on page 80 of this documentation.

Our custom report shown inside the web console:

83/108

www.lansweeper.com

Basic computer reports


Each computer report must start from table tblComputers. If you want to hotlink the computer name in the web interface, you need the fields Computername and ComputerUnique.

Custom computer information


Custom computer fields are stored in table tblCompCustom. Make sure to Select all rows from tblComputers. This ensures that your results include computers without any custom fields.

User information
User details are stored in table tblADusers. If you want to include user details, add the table to the report. Link the table on both Username and Userdomain and make sure to Select all rows from tblComputers. This ensures that your results include computers with empty usernames.

84/108

www.lansweeper.com

General guidelines
Each field in a database table maps to a field from a WMI class. Information on all WMI classes and fields can be found here: http://msdn.microsoft.com/en-us/library/aa394084%28v=VS.85%29.aspx

Wait time name AUTORUN BASEBOARD BATTERY BIOS BOOTCONFIG BUS CDROM CODEC COMAPPLICATION COMPONENTCAT COMPSYSPROD COMPSYSTEM DCOMAPP DESKTOP DESKTOPMON DISKPARTITION DISPLAYCONF DISPLAYCONTRCONF ENVIRONMENT EVENTLOG FILES FLOPPY GROUPS HARDDISK IDECONTROLLER IEACTIVEX IEBARS IEBHO IEEXT INFRARED KEYBOARD MEMORY MEMORYARRAY MONITOR NETWORK NETWORKCLIENT ONBOARDDEVICE

Table tblcomputers tbladusers tbladcomputers tblapprovedsoftware tblcplogoninfo tblcustdevices tblcustdevhd tblcustdevprinter tbldomainroles tblcompcustom tsyschassistypes tsysdevicetypes tblAutorun tblBaseboard tblBattery tblBIOS tblBootConfiguration tblBus tblCDROMDrive tblCodecFile tblCOMApplication tblComponentCategory tblComputerSystemProduct tblComputersystem tblDCOMApplication tblDesktop tblDesktopMonitor tblDiskPartition tblDisplayConfiguration tblDisplayControllerConfiguration tblEnvironment tblntlogevent tblFileVersions tblFloppy tblGroups tblDiskdrives tblIDEController tblIEActiveX tblIEBars tblIEBHO tblIEExtensions tblInfraredDevice tblKeyboard tblPhysicalMemory tblPhysicalMemoryArray tblMonitor tblNetwork tblNetworkClient tblOnBoardDevice

Info Main table that contains all computer objects Active directory user information Active directory computer information Contains all approved software User logons Main table that contains all device objects Linux harddisk information Printer toner information Links to tblcomputersystem, domainrole Custom computer information Links to tblSystemEnclosure, chassistype Links to tblcustdevices, devicetype Win32_StartupCommand class scanning Win32_BaseBoard class scanning Win32_Battery class scanning Win32_BIOS class scanning Win32_BootConfiguration class scanning Win32_Bus class scanning Win32_CDROMDrive class scanning Win32_CodecFile class scanning Win32_COMApplication class scanning Win32_ComponentCategory class scanning Win32_ComputerSystemProduct class scanning Win32_ComputerSystem class scanning Win32_DCOMApplication class scanning Win32_Desktop class scanning Win32_DesktopMonitor class scanning Win32_DiskPartition class scanning Win32_DisplayConfiguration class scanning Win32_DisplayControllerConfiguration class scanning Win32_Environment class scanning Win32_NTLogEvent class scanning Custom files scanning Win32_DiskDrive class scanning Win32_Group class scanning Win32_LogicalDisk class scanning Win32_IDEController class scanning Internet Explorer Active-X controls scanning Internet Explorer Bars scanning Internet Explorer Browser helper objects scanning Internet Explorer Extensions scanning Win32_InfraredDevice class scanning Win32_Keyboard class scanning Win32_PhysicalMemory class scanning Win32_PhysicalMemoryArray class scanning Monitor type and serial number scanning Win32_NetworkAdapterConfiguration class scanning Win32_NetworkClient class scanning Win32_OnBoardDevice class scanning

85/108

www.lansweeper.com

OS OSRECOVERY PAGEFILE PARALLELPORT PCMCIA POINTING PORTABLEBATTERY PORTCONNECTOR POTSMODEM PRINTERS PROCESS PROCESSOR PROXY QUICKFIX REGISTRY SCSI SERIALNUMBER SERIALPORT SERVICES SHARES SOFTWARE SOUND SYSTEMENCLOSURE TAPE USBCONTROLLER USERS USERSINGROUP VIDEOCONTROLLER

tblOperatingsystem tblOSRecoveryConfiguration tblPageFile tblParallelPort tblPCMCIAController tblPointingDevice tblPortableBattery tblPortConnector tblPOTSModem tblPrinters tblProcesses tblPROCESSOR tblProxy tblQuickFixEngineering tblRegistry tblScsicontroller tblSerialnumber tblSerialPort tblServices tblShares tblSoftware tblSoundDevice tblSystemEnclosure tblTapeDrive tblUsbcontroller tblUsers tblUsersInGroup tblVideoController

Win32_OperatingSystem class scanning Win32_OSRecoveryConfiguration class scanning Win32_PatchFile class scanning Win32_ParallelPort class scanning Win32_PCMCIAController class scanning Win32_PointingDevice class scanning Win32_PortableBattery class scanning Win32_PortConnector class scanning Win32_POTSModem class scanning Win32_Printer class scanning win32_process class scanning Win32_Processor class scanning Win32_Proxy class scanning Win32_QuickFixEngineering class scanning Custom registry keys scanning Win32_SCSIController class scanning Software license key scanning Win32_SerialPort class scanning Win32_Service class scanning Win32_Share class scanning Installed software scanning Win32_SoundDevice class scanning Win32_SystemEnclosure class scanning Win32_TapeDrive class scanning Win32_USBController class scanning Win32_UserAccount class scanning Users that belong to NT group scanning Win32_VideoController class scanning

The report builder also contains tables for all available reports, including any custom reports you may have made. All report tables start with web40rep. The name used for a report table is the View name, not the Report name.

Make sure to Select all rows from tblComputers when linking tables to tblComputers. This ensures that your results include computers with no value for the fields youve selected. The same logic applies to linking other tables.

86/108

www.lansweeper.com

File reports
Lansweeper can scan specific files on client machines and return information such as version, file size and changed date. Results of these file scans can be used to create custom reports with the report builder. In this example we will detect the Firefox version on all computers based on a file scan. First, we must enable scanning of the file in the configuration console. For this we need to find the files filename.

Filename %programfiles%\Mozilla Firefox\firefox.exe

We can then enter the filename into the configuration console and enable it.

In the item wait time section of the configuration console, make sure that FILES is set to something other than -1. In this example weve set the wait time to 1, which means that the file is scanned every day.

87/108

www.lansweeper.com

We can check to see if the file was scanned on a client machine by going to the computers page in the web console.

Now we want to create a report in the report builder to list all computers that have Firefox installed. We also want info on the file such as path, version, company and size. We will be linking tables tblComputers and tblFileVersions. The fields we want are Computername, ComputerUnique, FilePathFull, Found, FileVersion, CompanyName and Filesize. We can then add the firefox.exe to the criteria for field FilePathfull.

Final SQL code used for this report:

Select tblComputers.Computername, tblComputers.ComputerUnique, tblFileVersions.FilePathfull, tblFileVersions.Found, tblFileVersions.FileVersion, tblFileVersions.CompanyName, tblFileVersions.Filesize From tblComputers Inner Join tblFileVersions On tblComputers.Computername = tblFileVersions.Computername Where tblFileVersions.FilePathfull Like '%firefox.exe'

88/108

www.lansweeper.com

Registry reports
Lansweeper can scan specific registry keys on client machines. Results of these registry scans can be used to create custom reports with the report builder. In this example we will detect the Firefox version on all computers based on a registry scan. First, we must enable scanning of the registry key in the configuration console. For this we need to the path and the value we want to scan.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox Registry value CurrentVersion

We can then enter the registry key into the configuration console and enable it.

In the item wait time section of the configuration console, make sure that REGISTRY is set to something other than -1. In this example weve set the wait time to 1, which means that the key is scanned every day.

89/108

www.lansweeper.com

We can check to see if the key was scanned on a client machine by going to the computers page in the web console.

Now we want to create a report in the report builder to list all computers that have Firefox installed. We also want the CurrentVersion registry value. We will be linking tables tblComputers and tblRegistry. The fields we want are Computername, ComputerUnique, Regkey, Valuename and Value. (If youve scanned the CurrentVersion value of just one registry key, you can leave out the Regkey field.) We can now add our key and key value to the criteria for fields Regkey and Valuename.

Final SQL code used for this report:

Select tblComputers.Computername, tblComputers.ComputerUnique, tblRegistry.Regkey, tblRegistry.Valuename, tblRegistry.Value From tblComputers Inner Join tblRegistry On tblComputers.Computername = tblRegistry.Computername Where tblRegistry.Regkey = 'HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox' And tblRegistry.Valuename = 'CurrentVersion'

90/108

www.lansweeper.com

Email report alerts


You can choose to have report results emailed to you every day. First we must enable report mailing and configure a mail server. Click your scanning server in the configuration console and enter the appropriate data. You can also set up your mailing schedule through here. Generally we recommend enabling report mailing on just one scanning server, to avoid duplicate email reports.

We need to create one or more mail groups. A mail group can contain multiple email addresses, separated by a ;

Now we can select the reports we want to mail and the group we want to send them to. Selected reports will be mailed every day, if they contain results. Empty reports will not be mailed. If you immediately wish to mail the selected reports, hit the Mail selected reports now button under Scanning Servers/Your Server/Options.

91/108

www.lansweeper.com

Email eventlog alerts


You can choose to have specific eventlog alerts emailed to you as soon as theyre scanned. This is useful if you immediately want to address any errors that occur. Eventlog mailing is best used in combination with eventlog scanning. More info on eventlog scanning can be found on page 28 of this documentation.

First we must enable eventlog mailing and configure a mail server. Click your scanning server in the configuration console and enter the appropriate data. Eventlog scanning can be enabled on multiple scanning servers.

We need to create one or more mail groups. A mail group can contain multiple email addresses, separated by a ;

92/108

www.lansweeper.com

Now we can select the alerts we want to mail and the group we want to send them to. Each alert can use its own mail group.

In the details pane we can filter the alert even further.

details pane
Compare Choose your filter type. The available filter types are: Computer, EventID, Eventtype, Logfile, Source, User, Domain, Message. Operators The available operators are: Equal, Not equal, Like, Not like. Use the Like operator to search for partial matches. Filter Enter your filter value here. Eventtypes 1 = Error 2 = Warning 3 = Information 4 = Success Audit 5 = Failure Audit

93/108

www.lansweeper.com

Premium tools
Download
Lansweeper contains several premium tools, which are included in the installation. You can also download them separately: http://lansweeper.com/premiumtools.aspx

The premium tools require a valid license key to work. This means they cant be used in the freeware or trial version of Lansweeper.

Remote screenshot The screengrab.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Allows you to take a remote screenshot of a client machine. A remote screenshot can be initiated through the web console or the screengrab.exe. More info on page 96 of this documentation.

Remote control The lsremote.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Allows you to take remote control of a client machine. A remote control can be initiated through the web console or the lsremote.exe. More info on page 97 of this documentation.

Remote uninstall The RemoteUninst.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Allows you to remotely uninstall software on a client machine. A remote uninstall can be initiated through the web console or the RemoteUninst.exe. More info on page 98 of this documentation.

94/108

www.lansweeper.com

Register
The remote screenshot, remote control and remote uninstall premium tools need to be registered separately. There are two ways of doing this.

Separately for each admin and computer


You can register the tools separately for each administrator and computer. Start one of the premium tools from the administrator's computer. The screengrab.exe, lsremote.exe and RemoteUninst.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Click Register in the menu and copy/paste your license key.

For all admins


You can register the tools for all admins at once. Create a "license.txt" file and copy your license key into it. Place the file in the same folder as the premium tool executables: %Program Files%\Lansweeper\Actions

95/108

www.lansweeper.com

Remote screenshot
Lansweeper allows you to remotely take screenshots of client machines.

No additional software is needed on your client workstations.

The following requirements should be met: Client machine Windows 2000 or higher Both machines must be in trusted domains. The user must have administrative privileges on the client. TCP ports 139 and 445 must be open on the server from the client. The Server service must be running on the target machine. The Remote Registry service must be running on the target machine. The Default shares must be available on the client (C$, admin$). Remote screenshot is a web console action and can be run from a computers webpage.

You will be prompted to enter the client computer name. Optionally, you can ask the client machine for permission to execute the action.

The screengrab.exe can be found in the following directory: %Program Files%\Lansweeper\Actions You can run this program from the command line if you wish. Syntax screengrab.exe {computer} /AP /AP and /NP This is optional. /AP = ask permission /NP = dont ask permission

96/108

www.lansweeper.com

Remote control
Lansweeper allows you to remotely control the screen of a client machine. This is particularly useful if you want to give remote support. When remote control is initiated, the free VNC service is automatically pushed to the client machine. VNC is removed after the remote control session.

No additional software is needed on your client workstations.


The following requirements should be met: Client machine Windows 2000 or higher Both machines must be in trusted domains. The user must have administrative privileges on the client. TCP ports 139, 445 and 5900 must be open on the server from the client. The Server service must be running on the target machine. The Remote Registry service must be running on the target machine. The Default shares must be available on the client (C$, admin$). Remote control is a web console action and can be run from a computers webpage.

You will be prompted to enter the client computer name. Optionally, you can ask the client machine for permission to execute the action.

The lsremote.exe can be found in the following directory: %Program Files%\Lansweeper\Actions You can run this program from the command line if you wish. Syntax lsremote.exe {computer} /AP /AP and /NP This is optional. /AP = ask permission /NP = dont ask permission 97/108

www.lansweeper.com

Remote uninstall
Lansweeper allows you to remotely uninstall software from a client machine. The only requirements are WMI and administrative privileges on the client.

No additional software is needed on your client workstations.


Remote uninstall is a web console action and can be run from a computers webpage.

You will be prompted to enter the computer name.

The RemoteUninst.exe can be found in the following directory: %Program Files%\Lansweeper\Actions You can run this program from the command line if you wish. Syntax remoteuninst.exe {computer} There are 3 types of software: MSI packages These are uninstalled by the MSIexec command. Adding the /QN /NORESTART parameters makes the uninstall invisible to the remote users. Other installers These might have optional parameters available to run the uninstall window hidden, but this depends on the software vendor. Not allowed to be removed Some software vendors do not allow their software to be removed, because this might break Windows functionality. 98/108

www.lansweeper.com

Back Up, Update


Backing up your installation
The main thing youll want to create a backup of is of course your database. You may also want to back up any custom images youve saved in the following directories: %Program Files%\Lansweeper\Website\actions %Program Files%\Lansweeper\Website\userpictures

The easiest and safest way of backing up your database is through SQL Server Management Studio. If it wasnt installed along with your version of SQL Server, you can download it here: http://www.microsoft.com/download/en/details.aspx?id=7593

Run SQL Server Management Studio and enter your credentials. Click your server name to expand the server tree. Expand Databases to see your lansweeperdb database.

Right-click the database and choose Tasks/Back Up

99/108

www.lansweeper.com

You will be presented with the backup screen.

Database lansweeperdb Backup type Full Backup component Database Name Verify that this is something other than lansweeperdb, since we dont want to overwrite our existing Lansweeper database. In the Options tab you can check Verify backup when finished if you wish. Click OK to create your backup.

100/108

www.lansweeper.com

Youll see a confirmation window when the backup has been completed.

If you ever wish to restore the backup youve created, right-click your database in the Server Management tree view and choose Tasks/Restore/Database

Verify that you are restoring to and from database lansweeperdb and that you have selected the correct backup set. In the Options tab make sure you select Overwrite the existing database. Then click OK to restore your database.

101/108

www.lansweeper.com

Moving Lansweeper
To move your Lansweeper installation to a different server, do the following:

1. Stop the Lansweeper service on your current setup. 2. Take a full backup of your lansweeperdb database using SQL Server Management
Studio.

3. If you added any custom images to Lansweeper, you may want to copy these files
as well. Custom images can be found in the following folders: %Program Files%\Lansweeper\Website\actions %Program Files%\Lansweeper\Website\userpictures

4. Do a full installation of Lansweeper on your new setup. Our latest installer can be
found here: http://lansweeper.com/download.aspx

5. Stop the Lansweeper service on the new server. 6. Do a restore of the database backup and overwrite the lansweeperdb database on
the new server.

7. Execute the below script in SQL Server Management Studio. This will ensure that
the SQL user for your Lansweeper database is configured correctly. use lansweeperdb GO drop schema lansweeperuser GO drop user lansweeperuser go execute sp_droplogin lansweeperuser go use master GO EXEC sp_addlogin 'lansweeperuser', 'mysecretpassword0*', 'lansweeperdb', [English] GO use lansweeperdb go EXEC sp_grantdbaccess 'lansweeperuser', 'lansweeperuser' GO EXEC sp_addrolemember [db_owner], 'lansweeperuser' Go

8. In your Lansweeper configuration files make sure that the Data Source, User ID
and Password correspond with your SQL Server settings. The config files are: %Program Files%\Lansweeper\Service\Lansweeperservice.exe.config %Program Files%\Lansweeper\Website\web.config

9. Execute the below script in your Lansweeper configuration console under


Lansweeper/Database Scripts. Replace newserver with the name of your new scanning server. update tsysasservers set servername='newserver'

10. Copy any custom images from your old setup to your new one and restart the
Lansweeper service on your new server. 102/108

www.lansweeper.com

Updating Lansweeper
The Lansweeper software is updated on a regular basis. Its good practice to keep your installation up-to-date, so you can enjoy the most recently added Lansweeper features. We recommend backing up your database before applying any updates.

You can verify if you have the latest version of Lansweeper by clicking Check for updates in the bottom right corner of your web console.

Our latest installer can be found on our download page: http://lansweeper.com/download.aspx Updates are applied over your existing installation.

If all Lansweeper components are installed on one server, you can update everything simultaneously. If youve spread out the components over different servers, you should first update the servers where the Lansweeper service and database are installed. The web console comes last. Run the Lansweeper.exe on your server and click through the opening and license agreement screens. Setup will then recommend to Upgrade your current installation. Click Next to continue.

103/108

www.lansweeper.com

Setup will automatically detect existing components and compare them against the latest available versions. Click Next to continue.

You will then be prompted to direct setup to your existing Lansweeper database. You may type the server name or select it from the dropdown list. Click Next to continue.

104/108

www.lansweeper.com

You will see your files and database being upgraded. How long this process takes depends on the size of your database.

When the upgrade has been completed, you can (optionally) subscribe to our newsletter and post about your Lansweeper experience on Facebook, LinkedIn or Twitter. Click Finish to exit setup.

If you installed the different Lansweeper components on different servers, you will have to repeat this process for your other servers as well. The server where the web console is installed needs to be updated last. 105/108

www.lansweeper.com

Troubleshooting
Connection problems
Your Lansweeper installation includes two tools for troubleshooting connection problems. The testconnection.exe is used for computer connections, the Devicetester.exe for device connections. Both executables can be found in the following directory: %Program Files%\Lansweeper\Actions

Testconnection.exe
The executable allows you to connect from the server to one of the clients to check if the WMI settings and access permissions are OK.

You can also run the connection tester from a computers webpage.

The test verifies if WMI access and registry access using WMI is possible. For info on specific error messages, please consult our website: http://www.lansweeper.com/kb/knowledgebase.aspx Errors can almost always be attributed to one of the following causes: Firewall Windows Firewall or another, third party firewall is blocking access. (Cause of the connection problem 99% of the time.) DNS DNS points to a wrong IP address. WMI and DCOM WMI and DCOM are not enabled on the client. (In a default Windows installation, they are enabled.) User access The server user does not have administrative permissions on the client. 106/108

www.lansweeper.com

Devicetester.exe
Lansweeper can discover devices in your network that have the SNMP (SNMPv1 or SNMPv2), SSH, HTTP, HTTPS, FTP, SMTP, SIP, Telnet or JetDirect protocol enabled. This is done through IP range scanning. More information on IP range scanning can be found on page 26 of this documentation. The Devicetester.exe allows you to see scanning details for devices and test SNMP, SSH, passwords (If you dont need SSH credentials, simply enter a bogus user/password combination under SSH Login. For example, use the combination root/password.)

Syntax Devicetester.exe {ipaddress} You can also run the device tester from the actions tab in the web console.

The test verifies if the necessary protocols are enabled on the client machine. For info on specific error messages, please consult our website: http://www.lansweeper.com/kb/knowledgebase.aspx

107/108

www.lansweeper.com

Support
Knowledge base
The Lansweeper knowledge base can be found here: http://lansweeper.com/kb/knowledgebase.aspx Our knowledge base contains a variety of articles explaining Lansweeper features and functionality. It also describes and provides solutions to error codes you might encounter when scanning your workstations. We recommend searching our knowledge base if you have any technical questions.

Forum
The Lansweeper forum can be found here: http://lansweeper.com/forum/ The forum is the ideal place to request features and share reports and custom actions. It also houses any beta installers currently in development. To access the Premium Users section of the forum, click on one of the categories and enter your license key.

Contact
If you have any further questions about Lansweeper that were not answered in the documentation or the knowledge base, please contact us.

Billing & Reseller Questions sales@lansweeper.com Contact this email address for price quotes or info on the Lansweeper subscription plans. We also address billing issues and process reseller applications.

Technical Questions support@lansweeper.com For any technical questions, please contact this email address.

Skype ID Lansweeper

108/108

You might also like