Professional Documents
Culture Documents
52
Index
Requirements
System requirements ............................................................................................................ 1 Database configuration ......................................................................................................... 2 Domain scanning requirements ............................................................................................ 5 Workgroup scanning requirements ...................................................................................... 6
Installation
Installing Lansweeper............................................................................................................ 8 Component access ................................................................................................................14 Adding scanning servers ......................................................................................................16
Subscriptions
Upgrading to premium .........................................................................................................18
Scanning setup
Credentials ............................................................................................................................19 Preferences............................................................................................................................21 Active scanning .....................................................................................................................24 Workgroup scanning.............................................................................................................25 IP range scanning .................................................................................................................26 Eventlog scanning.................................................................................................................28 Scheduled scanning ..............................................................................................................31 LsPush ....................................................................................................................................32 LsClient ..................................................................................................................................36 LsTrigger ................................................................................................................................39 Which scanning method should I use? ................................................................................41
Scanning options
Scan intervals........................................................................................................................43 Scan exclusions.....................................................................................................................45 File scanning..........................................................................................................................46 Registry scanning..................................................................................................................47 Deleting and rescanning.......................................................................................................48
Further configuration
Restricting web console access............................................................................................49 IP range locations .................................................................................................................54 Allowed local administrators ................................................................................................55 Vendor support links.............................................................................................................56 Custom fields.........................................................................................................................57 Date formatting.....................................................................................................................59 Adding user pictures.............................................................................................................60
Devices
Scanning devices ..................................................................................................................61
Scanning Linux, Unix and Mac computers ..........................................................................62 Editing device details............................................................................................................63 Mapping devices to types .....................................................................................................64 Adding new device types......................................................................................................65
Software management
Product license keys .............................................................................................................66 Operating system license usage ..........................................................................................68 Software license usage.........................................................................................................69 Anti-virus software names ...................................................................................................71 Approved software ................................................................................................................72 Approved activeX controls....................................................................................................73
Actions
Custom actions .....................................................................................................................74 Configuring Internet Explorer ..............................................................................................77 Configuring Firefox ...............................................................................................................78 Configuring Chrome..............................................................................................................79
Reports
Using reports.........................................................................................................................80 Custom reports .....................................................................................................................82 File reports ............................................................................................................................87 Registry reports ....................................................................................................................89 Email report alerts ................................................................................................................91 Email eventlog alerts ............................................................................................................92
Premium tools
Download ...............................................................................................................................94 Register .................................................................................................................................95 Remote screenshot ...............................................................................................................96 Remote control......................................................................................................................97 Remote uninstall ...................................................................................................................98
Troubleshooting
Connection problems .......................................................................................................... 106
Support
Knowledge base .................................................................................................................. 108 Forum................................................................................................................................... 108 Contact ................................................................................................................................ 108
www.lansweeper.com
Requirements
System requirements
The Lansweeper software consists of the following components: 1. Lansweeper service: performs all of the actual scanning 2. Database: stores all the scanned information 3. Web console: brings all scanned information together in a comprehensive way These components can be installed together on one machine or separately on different machines.
The following requirements should be met: Server where the Lansweeper service is installed: 32-bit or 64-bit Windows 2003 or higher The .NET Framework 2.0 or higher installed, updated to the latest service pack Database server: 32-bit or 64-bit Windows 2000 or higher SQL Server 2000, SP4 or higher (or the free SQL Server Express) SQL Server 2005 or higher is recommended. Web server: 32-bit or 64-bit Windows 2000 or higher Internet Information Services (IIS) or the free IIS Express installed The .NET Framework 2.0 or higher installed, updated to the latest service pack Clients: 32-bit or 64-bit Windows 2000 or higher (Windows 9x clients are not supported) Windows Home versions are only supported when using LsPush for scanning. Event log scanning is not supported in Windows 2000.
1/108
www.lansweeper.com
Database configuration
Setting up your SQL server
If you dont have a database server, setup will install the free SQL Server Express. SQL Server 2000 does not require any extra configuration.
The following is only required if you want to install the different Lansweeper components on different servers and if you are using SQL Server 2005 or higher.
Open the SQL Server Configuration Manager.
Set the SQL Server Browser to automatic and start it (if not already started). Restart the SQL service.
2/108
www.lansweeper.com
Start SQL Server Management Studio. If it wasnt installed along with your version of SQL Server, you can download it here: http://www.microsoft.com/download/en/details.aspx?id=7593
Enter the Server name and select Windows Authentication. Make sure you are logged in with administrative credentials.
3/108
www.lansweeper.com
Right-click on the server name and select Restart to restart the SQL services.
4/108
www.lansweeper.com
No added requirements must be met for domain scanning when using the LsPush scanning method. The requirements below apply to all scanning methods except LsPush.
1. The scanning account must be an administrator on the scanned computers. Lansweeper uses alternate credentials if they are configured for the domain.
2. Windows Firewall on the client machines must be configured to have Remote Administration enabled. In a domain the easiest way to do this is to create a Group Policy. Please refer to the following knowledge base article for info on how to configure Windows Firewall using Group Policies: http://lansweeper.com/kb/firewall.aspx
3. Any third party firewalls on the client machines must be configured to have Windows Remote Administration enabled.
5/108
www.lansweeper.com
No added requirements must be met for workgroup scanning when using the LsPush scanning method. The requirements below apply to all scanning methods except LsPush.
1. The scanning account must be an administrator on the scanned computers. You need a common username/password combination on all workgroup computers. In the example below weve created a user lsremoteuser and added it to the administrators group on all workstation computers.
2. Windows Firewall on the client machines must be configured to have Remote Administration enabled. The following script can be used to configure the necessary DCOM and Windows Firewall settings: http://www.lansweeper.com/files/lansweeper.vbs
3. Any third party firewalls on the client machines must be configured to have Windows Remote Administration enabled.
4. On Windows Vista and Windows 7 client computers, User Account Control (UAC) must be disabled. Optionally, you could disable UAC for the remote administrator only: Start regedit.exe and go to key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system Create new Dword value: LocalAccountTokenFilterPolicy Set LocalAccountTokenFilterPolicy to 1 Please refer to the following article for more info on handling remote connections under UAC: http://msdn.microsoft.com/enus/library/aa826699(VS.85).aspx#handling_remote_connections_under_uac
5. Your security model must be set to Classic: Start/run secpol.msc Navigate to Local Policies\Security Options Set Network access: Sharing and security model for local accounts to Classic Restart the computer 6/108
www.lansweeper.com
6. Workgroup client computers must be visible in the network browser. (This is not necessary when using IP range scanning.)
7/108
www.lansweeper.com
Installation
Installing Lansweeper
All Lansweeper subscription plans use the same installer. The various licensing plans are applied to the installer through different license keys.
You can always find the latest version of Lansweeper on our download page: http://lansweeper.com/download.aspx
In the following example we will be installing the Lansweeper service, database and web console on a single machine. These are our credentials: Server name: myserver Domain: lansweeper.local NetBIOS domain: lansweeper
Run Lansweeper.exe. You will be presented with the welcome screen. Click Next to continue.
8/108
www.lansweeper.com
Read and accept the license agreement and click Next to continue.
You can choose an easy or an advanced install. An easy installation will install all Lansweeper components on the machine. An advanced installation lets you pick and choose which components you want, allowing you to spread out your installation over different servers. For this example were installing everything on the same server. If youre installing the different components on different servers, youll do an advanced installation on each machine. You can then select the component you want to install on each particular server. Click Next to continue.
9/108
www.lansweeper.com
Choose your SQL Server and authentication method. If you dont have an SQL Server, setup will install the free SQL Server Express. The free SQL Server Express has a database limit of 4GB. Click Next to continue.
Sqlcmd: Error: Microsoft SQL Native Client: An error has occurred while establishing a connection to the server. When connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not allow remote connections. Solution: http://support.microsoft.com/kb/914277/en-us
Next you will be prompted to enter your user details. Running the setup in a domain or a workgroup will give different options.
The user running the service must have administrative privileges on all clients being scanned by Lansweeper.
This is typically a domain administrator account. If you have a workgroup, you will need an account with the same username/password combination on all machines. You can submit credentials for additional domains/workgroups after setup has finished. When youve entered your credentials, click Next to continue. 10/108
www.lansweeper.com
Domain:
Workgroup:
11/108
www.lansweeper.com
Enabling IP scanning and SSH is recommended. IP range scanning is used to discover devices in your network: printers, routers If you dont have an active directory domain, you can also use IP range scanning and/or workgroup scanning to discover Windows machines. SSH is used for Linux, Mac and VMware scanning. Click Next to continue.
Setup will recommend installing the default web server, which is the free UltiDev. A new website will be created on a new port. Advanced users can also choose to install a new website or virtual directory using IIS. Click Next to continue.
For info on how to secure your website, please refer to page 49 of this documentation.
12/108
www.lansweeper.com
When setup has been completed, you can (optionally) subscribe to our newsletter and post about your successful installation on Facebook, LinkedIn or Twitter. Click Finish to exit setup.
13/108
www.lansweeper.com
Component access
Lansweeper is now installed and the service should be operational. Go to your server where the service is running (not the web console) to access your scanning queue. The address is: http://servername:9524
If there are any errors, you can find the Errorlog.txt file in your Service folder within the Lansweeper directory. The path is the following:
%Program Files%\Lansweeper\Service
The Lansweeper installer will have generated two shortcuts on your desktop, one for your web console and one for your configuration console.
14/108
www.lansweeper.com
The web console gathers all scanned data in a comprehensive way, based on how you customized your settings in the configuration console. You can also easily access your scanning queue through the web console, by clicking your scanning server.
The rest of this documentation will mainly focus on the configuration console, showing you how you can customize various settings to suit your needs. Lets log into it.
Default instance
You can use integrated authentication or you can connect with a username and password. You can change the default password of the SQL user later if you want. Username: lansweeperuser Default password: mysecretpassword0*
If you change the password of lansweeperuser, you also need to edit the following files to reflect the changes: \Lansweeper\Service\Lansweeperservice.exe.config \Lansweeper\Website\web.config
15/108
www.lansweeper.com
Run Lansweeper.exe on the scanning server you want to add and click through the opening and license agreement screens. Choose an advanced install, selecting only the Lansweeper service for installation.
Specify the server where the Lansweeper database was installed. If you are using a named instance, the format is servername\instance_name. If you are using a default instance, the format is servername.
16/108
www.lansweeper.com
Enter your credentials. Running the setup in a domain or a workgroup will once again give different options. The user running the service must have administrative privileges on all clients being scanned by Lansweeper. Domain: Workgroup:
Choose the IP range youd like your new scanning server to scan. It makes sense of course to let each server scan its own range. You can add additional ranges when the installation has been completed.
Next you will be prompted to choose an install location. Select your destination folder and hit Install.
Your new scanning server has now been set up and you will see it listed in your configuration console. Your configuration settings are saved in your database, so your configuration console will look the same on all of your servers.
17/108
www.lansweeper.com
Subscriptions
Upgrading to premium
When you first install Lansweeper, a 20-day trial period is initiated. When this trial runs out, the software reverts to its freeware version. Your database will still be accessible, but you wont be able to use any of Lansweepers premium features. You can then purchase a license key through our online store to upgrade to a premium plan.
After purchasing your license, youll receive an email receipt with your license key included. If you cant find your license key, please contact us at sales@lansweeper.com and provide us with the reference number for your order or the email address used for billing. Copy and paste your license key into the Home screen of the Lansweeper configuration console and click the Validate license code button.
The remote screenshot, remote control and remote uninstall premium tools need to be registered separately. Please refer to page 95 of this documentation for info on how to register these tools.
18/108
www.lansweeper.com
Scanning setup
Credentials
First we must check our scanning credentials in the configuration console. You may have already entered your credentials during the installation process, but you can submit additional domains or workgroups for scanning here.
You must use an account that has administrative privileges on all domain/workgroup computers you are attempting to scan. You may specify one account per domain/workgroup, for an unlimited number of domains/workgroups.
Domains
Domain should be the NetBIOS name of your domain. Please refer to the following knowledge base article for info on how to find your NetBIOS name: http://lansweeper.com/kb/findnetbiosname.aspx
If you want to use credentials from a computer that cannot be verified (a DMZ standalone computer for instance), you can check the box Dont try to authenticate username\password.
Workgroups If you need additional credentials for workgroups, you must specify the user as .\username Do not use accounts with blank passwords.
When scanning workgroups you need a common username/password combination that has administrative privileges on all workgroup computers. 19/108
www.lansweeper.com
If you want to use credentials from a computer that cannot be verified, you can check the box Dont try to authenticate username\password.
20/108
www.lansweeper.com
Preferences
Next well configure our scanning preferences and methods. Open your Lansweeper configuration console and select your scanning server. The premium version of Lansweeper will have only one scanning server, the enterprise version can have several.
Remove computers not found in active directory from all tables. Warning: computers will be permanently deleted from the database. Set computers to non-active if not found in active directory. Computers will not be deleted from the database, but they will be marked nonactive in the web console.
21/108
www.lansweeper.com
Remove computers disabled in active directory from all tables. Warning: computers will be permanently deleted from the database. Set computers to non-active if disabled in active directory. Computers will not be deleted from the database, but they will be marked nonactive in the web console. Remove active directory users not found in active directory. Warning: users will be permanently deleted from the database. Remove active directory users disabled in active directory. Warning: users will be permanently deleted from the database. Refresh active directory computer details. All active directory information from computers already in the database will be refreshed. Refresh active directory user details. All active directory information from users already in the database will be refreshed. Delete history from all history tables after xx days. History tables are used to track changes (add/remove of components or software) and can be found in the web console. Set computers to non-active if not seen in the last xx days. Computers will not be deleted from the database, but they will be marked nonactive in the web console. Permanently delete computers not seen in the last xx days. Warning: computers will be permanently deleted from the database. Not recommended if you have a lot of roaming portable users that dont come in the network very often. Delete eventlog entries after xx days. Eventlog information takes up a lot of database space. It is recommended to keep this value low. Eventlog entries can be found in the web console. Delete system errorlog entries after xx days. The System Scanning Log can be found in the web console, under Reporting. Delete logon information after xx days. Logon information can be found in the Config/User Info tab of computer pages in the web console.
Service options:
Listen port This is the TCP port used by Lansweeper to listen for incoming LsClient and LsPush requests. It is also used to view the scanning queue and server status. Computer Threads The number of simultaneous scans Lansweeper performs. On dedicated multiprocessor machines you can set this value higher (up to 75). 22/108
www.lansweeper.com
IP Threads The number of IP addresses simultaneously scanned by IP range scanning. It is recommended to keep this value low to save processor resources.
Changing service options values requires you to restart the Lansweeper service.
Eventlog scanning:
By default eventlog scanning only scans errors. If you need additional information scanned, you can enable either of the following events: Warning events, Information events, Success audit events, Failure audit events. Be aware that scanning additional events can quickly fill your database.
Email options:
If you want to use email alerts, its important to specify an email relay server in your configuration. Normally you enable report mailing on only one scanning server, in order to avoid duplicate email reports. Eventlog mailing can be enabled on multiple scanning servers. How to define which reports and alerts are sent to email is shown later in the documentation.
23/108
www.lansweeper.com
Active scanning
This scanning method is not available in the freeware version of Lansweeper.
Active scanning allows you to scan multiple domains and selected OUs without the need to install any client on the workstations. Active scanning is a set it and forget it option. It will query your domain controllers to find out recently connected workstations and servers. This scanning method is recommended if you have an active directory domain.
www.lansweeper.com
Workgroup scanning
This scanning method is not available in the freeware version of Lansweeper.
Workgroup scanning scans all computers in the specified workgroups, without the need to install any client on the workstations. To detect the computer it should be visible when browsing with windows explorer in the network neighborhood.
25/108
www.lansweeper.com
IP range scanning
This scanning method is not available in the freeware version of Lansweeper.
IP range scanning allows you to scan specified IP ranges at scheduled time intervals. Each range has its own scanning schedule. Scanning takes place at most once a day. IP range scanning can discover devices in your network (printers, routers) that have the SNMP (SNMPv1 or SNMPv2), SSH, HTTP, HTTPS, FTP, SMTP, SIP, Telnet or JetDirect protocol enabled.
Linux, Unix and Mac computers are considered devices in Lansweeper. For more information on how to scan these computers, please refer to page 62 of this documentation. How does it work?
No software is needed on your client workstations. At the scheduled time, the IP addresses are added to the scanning queue. The actual scan time depends on the size of the queue at that time. Credentials Clicking this button brings up the credentials screen for the IP range. Each IP range can have different credentials.
26/108
www.lansweeper.com
Domain/workgroup credentials are used to scan Windows computers. When No Windows is unchecked, the scanning credentials for the specified domains/workgroups will be used first. You can enter up to three domain or workgroup names. The credentials for the specified domains/workgroups must be present in the configuration console under Scanning Options/Scanning Credentials. More info on scanning credentials can be found on page 19 of this documentation. Make sure you use a domains NetBIOS name. You can specify up to three SNMP community strings per range. SSH credentials are used to log onto Linux, Unix, Mac machines. To discover these machines, you must enable SSH on them and enter their SSH credentials in the Credentials box for their IP range. You can enter up to three user/password combinations. Always start with User 1. Time-out Pinging the target IP address times out in X seconds. In high traffic networks it is recommended to increase this value. Dont ping When enabled, all IP addresses will be scanned regardless of the ping result. This slows down the scanning process. No Windows When enabled, Windows machines will be ignored by the IP range scan. DefaultDomain When No Windows is unchecked, the scanning credentials for this domain or workgroup will be used first. If you want to specify more than one domain or workgroup, click the Credentials button instead. You can enter up to three domain or workgroup names under Windows default Domain or Workgroup. Make sure you use a domains NetBIOS name. Scan all enabled ranges now
Use this button if you want to do an immediate scan of all enabled IP ranges.
IP exclusions
You can exclude IP addresses from IP range scanning by adding them to your IP exclusions list.
27/108
www.lansweeper.com
Eventlog scanning
This scanning method is not available in the freeware version of Lansweeper.
With most scanning methods, computers are scanned every day or every couple of days. Often users want to have eventlogs of important servers scanned faster to generate email alerts however. Eventlog scanning incrementally updates your servers eventlog and generates the necessary alerts in time.
28/108
www.lansweeper.com
The ignored events will never be saved in the database and will never show up in the web console.
29/108
www.lansweeper.com
Eventlog reports
You can extensively analyze eventlog results using table tblntlogevent in the report builder. More information on building custom reports can be found on page 82 of this documentation.
For info on how to have eventlog alerts emailed to you, please refer to page 92 of this documentation.
30/108
www.lansweeper.com
Scheduled scanning
This scanning method is not available in the freeware version of Lansweeper.
Scheduled scanning allows you to scan computers, complete domains or OUs at scheduled time intervals. Each scan target has its own scanning schedule. Scanning takes place at most once a day.
Use this button if you want to do an immediate scan of all enabled scan targets.
31/108
www.lansweeper.com
LsPush
This scanning method is not available in the freeware version of Lansweeper.
The LsPush.exe can be used on client machines to initiate a scan. It takes a full local inventory of the client machine by itself and does not rely on the Lansweeper service to perform the scan. This makes it ideal for scanning the computers of your remote workers. LsPush is best deployed using a logon script or GPO. Scan results can automatically be integrated into the database through a direct server connection with the Lansweeper service. They can also be sent through email or stored in a file to be imported into the database later. LsPush can automatically open the default mail program on the computer, attaching the scan results to a new email message.
This scanning method offers many advantages: No administrative privileges required. No more problems with inbound firewalls or RPC server unavailable. No more remote access denied problems. Works with Windows Home versions. Can be used in logon scripts/scheduled jobs/custom scripts A full scan takes only 40KB of traffic.
32/108
www.lansweeper.com
When the scan completes, MAPI is used to open the default mail program and attach the scan results to a new email message.
The administrator can copy the file to his Lansweeper import folder, where the service will process it. The path is: %Program Files%\Lansweeper\Service\import
33/108
www.lansweeper.com
After the scan completes, the temporary folder will be opened with the result.
The administrator can copy the file to his Lansweeper import folder, where the service will process it. The path is: %Program Files%\Lansweeper\Service\import
34/108
www.lansweeper.com
Make sure you use a logon script instead of a startup script, because this is running in the context of the user.
A vbs script that runs LsPush hidden could look like this: Set WshShell = CreateObject(Wscript.Shell) WshShell.run %logonserver%\netlogon\lspush.exe myserver,0
35/108
www.lansweeper.com
LsClient
This is the only scanning method available in the freeware version of Lansweeper.
The LsClient.exe can be used on client machines to initiate a scan and is in that regard similar to LsPush. The difference is that, although the name would suggest otherwise, LsClient is no real client or agent. Basically it just sends a message to the server hello, Im here, scan me on this IP address and stops working. The service queues this request and starts scanning the client when ready. All the scanning is done by the Lansweeper service. Wherever possible, we recommend using LsPush instead of LsClient. Since LsPush performs scans locally, it is much less vulnerable to access denied and firewall issues. Read about the other advantages of LsPush on page 32 of this documentation.
36/108
www.lansweeper.com
servername This refers to the name of the server where the Lansweeper service is installed. port This is optional. The default port is 9524. /showresult Used for testing purposes. You will get a message back, Succeeded or Failed, based on whether or not the connection to the server could be established. /scanonip This is a new option. You can use it if you have VPN clients and want to scan them on the IP address they currently have without the need to have DNS updated. Some examples, to be run from a command prompt: C:\>Program Files\Lansweeper\Client\lsclient.exe myserver C:\>Program Files\Lansweeper\Client\lsclient.exe myserver /showresult
37/108
www.lansweeper.com
Make sure you use a logon script instead of a startup script, because this is running in the context of the user.
A vbs script that runs LsClient hidden could look like this: Set WshShell = CreateObject(Wscript.Shell) WshShell.run %logonserver%\netlogon\lsclient.exe myserver,0
38/108
www.lansweeper.com
LsTrigger
This scanning method is not available in the freeware version of Lansweeper.
LsTrigger has the same functionality as clicking Full Rescan in the web interface and is provided for backwards compatibility.
Use LsTrigger to force/trigger remote scanning of a workstation from the command line. This only works for computers that are already in the database. When you trigger a scan, all information for this computer is rescanned regardless of the item wait times that have been set. (More information on item wait times can be found on page 43 of this manual.)
39/108
www.lansweeper.com
servername This refers to the name of the server where the Lansweeper service is installed. port This is optional. The default port is 9524. Example, to be run from a command prompt: C:\>Program Files\Lansweeper\Actions\lstrigger.exe myserver lansweeper-001 lansweeper
40/108
www.lansweeper.com
Active scanning
Easy setup Requires an active directory domain Suitable for scanning domain computers Newly logged on computers are found within 15 minutes. Computers are scanned at most once every 20 hours. Cons: Firewalled computers will be detected, but they will return an RPC error.
Workgroup scanning
Easy setup Suitable for scanning workgroup computers that are visible in the network Newly logged on computers are found within 15 minutes. Computers are scanned at most once every 20 hours. Cons: Firewalled computers will be detected, but they will return an RPC error.
IP range scanning
Easy setup Suitable for scanning devices as well as domain and workgroup computers Scanning happens at scheduled times and at most once a day. Cons: Scanning may take longer if large IP ranges are specified. Firewalled computers will not be detected. Devices without the necessary protocols enabled are not scanned.
Eventlog scanning
Easy setup Suitable for scanning only eventlogs Scanning happens every xx minutes or every xx hours, based on user preference.
41/108
www.lansweeper.com
Scheduled scanning
Easy setup Suitable for scanning domain and workgroup computers Scanning happens at scheduled times and at most once a day. Cons: Firewalled computers will be detected, but they will return an RPC error.
LsPush
Best used in a logon or other custom script Suitable for scanning domain and workgroup computers If used in a script, scanning happens when the user logs into the computer. No administrative privileges required. Firewalled computers can be scanned without problem. Offsite computers can be scanned.
LsClient
Best used in a logon or other custom script Suitable for scanning domain computers If used in a script, scanning happens when the user logs into the computer. Cons: Firewalled computers will be detected, but they will return an RPC error.
42/108
www.lansweeper.com
Scanning options
Scan intervals
Not all information is scanned all the time. It makes little sense to constantly scan hardware details for instance, as this data rarely changes. Lansweeper lets you specify which items are updated when a computer is scanned.
-1 0 X
= disable scanning for this item. = always scan this item. = scan this item every x days.
When a computer is scanned for the first time, all items with a wait time higher than -1 are scanned. Examples: Codec = -1 When the computer is scanned, codec information is never scanned. Files =0 When the computer is scanned, file information is scanned each time. Network = 1 When the computer is scanned, network information is scanned if it wasnt scanned in the last 24 hours. Cdrom = 60 When the computer is scanned, cdrom information is scanned if it wasnt scanned in the last 60 days.
If you find that some information is never scanned, make sure that the item wait time is set to something other than -1.
Most scanning methods adhere to the item wait times. Some do not however, allowing you to rescan all items that have not been disabled. Wait times apply for: Active scanning, workgroup scanning, IP range scanning, scheduled scanning, LsClient, Rescan in web and configuration console 43/108
www.lansweeper.com
Wait times do not apply for: First time scan, LsPush, LsTrigger, Full Rescan in web and configuration console
Rescan and Full Rescan are available in the web console for individual computers and devices, domains and IP locations.
You can also easily rescan multiple computers and devices through the configuration console. All scanned machines can be found under Scanned computers and Scanned devices. Use Ctrl+Shift for multiple selections. You can use filters and custom sorting to select the machines you want.
44/108
www.lansweeper.com
Scan exclusions
If you wish to exclude some computers from scanning, you can add them in the configuration console. This will prevent them from ever being scanned and ever showing up on the website.
Computer name Make sure you use the NetBIOS name of the computer. You can use the % wildcard to specify multiple computers. To exclude all computers starting with lan- you can use lan-% for instance.
45/108
www.lansweeper.com
File scanning
Lansweeper can scan specific files on client machines and return information such as version, file size and changed date. Results of these file scans can then be used to create custom reports with the report builder.
Filename You can use 3 optional parameters: %programfiles%, %programfiles(x86)% and %windir% If you use the %programfiles(x86)% parameter and the OS is 32-bit, then the result will be the same as the %programfiles% parameter. Enabled Enable scanning of this file. File size, company, version and other info will be scanned for this file.
For information on how to create reports with the gathered data, please refer to page 87 of this documentation.
Example reports: Which computer doesnt have the latest version of Firefox installed? Which computer doesnt have the latest version of anti-virus scanner X? Which computer doesnt have the needed DLL for application X? 46/108
www.lansweeper.com
Registry scanning
Lansweeper can scan specific registry keys on client machines. Results of these registry scans can then be used to create custom reports with the report builder.
Rootkey Select the root key in the remote registry. RegPath Select the path to scan. Regvalue Select the value to scan. Enabled Enable scanning of this item.
For information on how to create reports with the gathered data, please refer to page 89 of this documentation.
47/108
www.lansweeper.com
Select one or more computers or devices. Use Ctrl+Shift for multiple selections. You can use filters and custom sorting to select the machines you want.
Delete This will delete the computer or device details and all related information from your database. It does not however prevent the machine from being rescanned. Rescan Rescans the selected machines. Item wait times apply. (For more information on item wait times, please refer to page 43 of this documentation.) Full Rescan Rescans the selected machines. Item wait times do not apply. (For more information on item wait times, please refer to page 43 of this documentation.) Refresh list Refreshes the grid with updated information from the database.
Deleting computers or devices through the configuration console does not prevent them from being rescanned. If you wish to exclude computers from scanning, add them to your computer exclusions list. If you wish to exclude devices, add them to your IP exclusions list. More information on these topics can be found on pages 45 and 27 of this documentation.
48/108
www.lansweeper.com
Further configuration
Restricting web console access
You can restrict access to the web console if you wish, only allowing certain groups in your domain to log in. Users will be prompted to enter a name and password. Those who are not part of the specified admin groups will be denied access.
In your web server configuration make sure that anonymous access is disabled and that integrated authentication is enabled.
IIS 6:
49/108
www.lansweeper.com
IIS 7: If you cant find Windows Authentication in your IIS 7 configuration, make sure the option is checked in your Windows Features. You can find it under Internet Information Services/World Wide Web Services/Security.
In IIS 7 you must also change the application pool of the website to a classic pool.
50/108
www.lansweeper.com
IIS Express: Open your iisexpress.config file. You can find it in the following directory: %Program Files%\Lansweeper\IISexpress
<authentication> <anonymousAuthentication enabled="true" userName="" /> <basicAuthentication enabled="false" /> <clientCertificateMappingAuthentication enabled="false" /> <digestAuthentication enabled="false" /> <iisClientCertificateMappingAuthentication enabled="false"> </iisClientCertificateMappingAuthentication> <windowsAuthentication enabled="false"> <providers> <add value="Negotiate" /> <add value="NTLM" /> </providers> </windowsAuthentication> </authentication>
Make the following changes, so that windowsAuthentication is enabled and anonymousAuthentication is disabled.
<authentication> <anonymousAuthentication enabled="false" userName="" /> <basicAuthentication enabled="false" /> <clientCertificateMappingAuthentication enabled="false" /> <digestAuthentication enabled="false" /> <iisClientCertificateMappingAuthentication enabled="false"> </iisClientCertificateMappingAuthentication> <windowsAuthentication enabled="true"> <providers> <add value="Negotiate" /> <add value="NTLM" /> </providers> </windowsAuthentication> </authentication>
51/108
www.lansweeper.com
UltiDev: The following service pack must be installed: http://www.microsoft.com/download/en/details.aspx?id=25150 If it has not yet been installed, it should be listed under your available Windows updates. Open the UltiDev Web App Explorer. You will see the Lansweeper web console listed under Default Shared Host Process.
Select the Authentication tab. Check Windows - negotiate Kerberos or NTLM and Windows - NTLM, uncheck Anonymous. Hit the Save config changes button.
Checking your settings: You can check if your web server is configured correctly by surfing to the following page: http://yourwebsite/usertest.aspx Your server should be configured for NT authentication. If it is configured for anonymous access, your web server settings are incorrect.
52/108
www.lansweeper.com
Admin groups
When the web server has been properly configured, you can input your allowed user groups. Open your web.config file. You can find it in the following directory: %Program Files%\Lansweeper\Website The contents looks like this:
<configuration> <appSettings> <add key="MM_CONNECTION_HANDLER_Lansweeper" value="sqlserver.htm"/> <add key="MM_CONNECTION_STRING_Lansweeper" value="Persist Security Info=False;Data Source=server;Initial Catalog=lansweeperdb;User ID=lansweeperuser;Password=*****;Connect Timeout=120"/> <add key="MM_CONNECTION_DATABASETYPE_Lansweeper" value="SQLServer"/> <add key="MM_CONNECTION_SCHEMA_Lansweeper" value=""/> <add key="MM_CONNECTION_CATALOG_Lansweeper" value=""/> </appSettings> <system.web> <compilation debug="false" strict="false" explicit="true"/> </system.web> </configuration>
Change the code to the following:
<configuration> <appSettings> <add key="MM_CONNECTION_HANDLER_Lansweeper" value="sqlserver.htm"/> <add key="MM_CONNECTION_STRING_Lansweeper" value="Persist Security Info=False;Data Source=server;Initial Catalog=lansweeperdb;User ID=lansweeperuser;Password=*****;Connect Timeout=120"/> <add key="MM_CONNECTION_DATABASETYPE_Lansweeper" value="SQLServer"/> <add key="MM_CONNECTION_SCHEMA_Lansweeper" value=""/> <add key="MM_CONNECTION_CATALOG_Lansweeper" value=""/> </appSettings> <system.web> <authentication mode="Windows"/> <identity impersonate="true" /> <authorization> <allow roles="domain\allowed group" /> <deny users="*" /> </authorization> <compilation debug="false" strict="false" explicit="true"/> </system.web> </configuration>
All users that belong to group domain\allowed group will be able to use Lansweeper, all other users will be denied. Domain must be the NetBIOS name of your domain. If you need multiple groups, you can separate them with commas:
www.lansweeper.com
IP range locations
You can define custom locations, called IP range locations, in the configuration console. Its an easy way to group computers and devices together based on IP address.
The IP location overview can be found on the website. Click any location to view the computers and devices contained within it. If an IP address does not fall within any of the specified IP ranges, it will be grouped under Undefined.
54/108
www.lansweeper.com
Domain/Computer Name of the domain or computer. You can use % as a wildcard. Administrator account Name of the user.
55/108
www.lansweeper.com
You can use the {assettag} and {model} parameter to link to specific vendor support pages.
56/108
www.lansweeper.com
Custom fields
You can change the display name of the custom fields shown in the web console. There are custom fields for both computers and devices.
Changing the display name of custom computer fields in the configuration console:
Reports can be created with this data using table tblCompCustom. Note that the report builder still makes use of the CustomX name of the field. You can use aliases to assign the same display names to your custom fields in the report builder. More information on creating reports can be found on page 82 of this documentation.
57/108
www.lansweeper.com
Changing the display name of custom device fields in the configuration console:
Reports can be created with this data using table tblCustDevices. Note that the report builder still makes use of the CustomX name of the field. You can use aliases to assign the same display names to your custom fields in the report builder. More information on creating reports can be found on on page 82 of this documentation.
58/108
www.lansweeper.com
Date formatting
You can change the date format used in the web console.
Open your configuration console and go to the Home tab. Choose your date format under Website date format. Restart your web browser to see the change take effect.
The date format implemented on one of the webpages, after the browser restart:
59/108
www.lansweeper.com
Folder name The NetBIOS name of your domain. File name The name of the user. All files should be in the jpg format! An easy way to get the info you need is by hovering over a computer name in your domain overview.
60/108
www.lansweeper.com
Devices
Scanning devices
Lansweeper can discover devices in your network that have the SNMP (SNMPv1 or SNMPv2), SSH, HTTP, HTTPS, FTP, SMTP, SIP, Telnet or JetDirect protocol enabled. This is done through IP range scanning. More information on IP range scanning can be found on page 26 of this documentation. If you run into problems scanning certain devices, then you can use the device tester to see scanning details and test SNMP, SSH, passwords (If you dont need SSH credentials, simply enter a bogus user/password combination under SSH Login. For example, use the combination root/password.) During installation, the Devicetester.exe was copied to your installation folder. You can find it in the following directory: %Program Files%\Lansweeper\Actions Syntax Devicetester.exe {ipaddress}
You can also run the device tester from the actions tab in the web console.
61/108
www.lansweeper.com
Enabling SSH on a Mac can be done through System Preferences/Internet & Wireless/Sharing. Make sure Remote Login is enabled. You can choose to allow access for all or some users.
You can then enter your credentials in the IP range scanning tab of the Lansweeper configuration console. Make sure scanning for your IP range is enabled. You can specify up to three user/password combinations. Always start with User 1.
62/108
www.lansweeper.com
Where applicable, make sure you check the lock against scanning checkbox before saving. Doing this will ensure that your manual changes are not overwritten by future scans.
Deleting a device through the web console does not prevent it from being rescanned. If you wish to exclude devices from scanning, add them to your IP exclusions list. More information on this topic can be found on page 27 of this documentation.
63/108
www.lansweeper.com
You could also manually change a devices type by editing its details in the web console.
If you manually change the device type of a device, make sure you check the lock against scanning checkbox. Doing this will ensure that your manual changes are not overwritten by future scans.
64/108
www.lansweeper.com
Items in gray are system items and cannot be changed or deleted. If you wish to add custom icons for your new device type, you can place them in the following directory: %Program Files%\Lansweeper\Website\images
65/108
www.lansweeper.com
Software management
Product license keys
Lansweeper allows you to keep track of your software product keys. You can enable/disable product keys you want scanned through the configuration console. The list provided here will be extended with future Lansweeper updates. You may also add your own product keys.
3 types of keys are currently supported: Plain Text, Microsoft and Adobe. Microsoft Office products are scanned automatically and do not show up in the product keys list. Cannot be scanned Keys for Microsoft Office versions 2000 and below Microsoft MAK keys The reason for this is that these keys are not stored on the computer.
Make sure that the item wait time for SERIALNUMBER is set to something other than -1 if you wish to scan product keys.
Product keys can be viewed on the various computer pages in the web console:
66/108
www.lansweeper.com
Add the key to the Lansweeper configuration console and give it a name.
Make sure that the item wait time for SERIALNUMBER is set to something other than -1.
If you immediately wish to scan the added keys, perform a Full Rescan through the web or configuration console.
67/108
www.lansweeper.com
# Purchased Number of licenses youve purchased for this operating system. # Price Price for one license. The currency used depends on the currency settings of the web server.
The total calculation and missing licenses can then be found in the web console:
68/108
www.lansweeper.com
# Purchased Number of licenses youve purchased for this software package. # Price Price for one license. The currency used depends on the currency settings of the web server.
You may add single software packages or group several packages together under one name. This is useful if you have multiple versions and products for one license type. To add a single software package, click the upper add button. You can then edit the software details in the details pane. Use % as a wildcard to select multiple versions.
details pane
69/108
www.lansweeper.com
To group several packages together, first enter a license name. You can then add multiple software packages to the details pane by clicking the lower add button. Use % as a wildcard to select multiple versions of the same package.
The total calculation and missing licenses can then be found in the web console:
70/108
www.lansweeper.com
71/108
www.lansweeper.com
Approved software
You can compile a list of approved or safe software in the configuration console. This will help you find illegal software usage. Click the add button to approve a software package.
This information is used in software overviews within the web console. Approved software has a green icon, unapproved software a red icon.
72/108
www.lansweeper.com
You can find an overview of all installed ActiveX controls on a computers webpage:
73/108
www.lansweeper.com
Actions
Custom actions
Actions are used to perform certain client operations. There are actions for computers, users and devices, which can be found in the web console.
Actions are run locally on the computer where you browse to the Lansweeper web console. They are run in the security context of the user starting the web console.
Make sure your web browser is properly configured to run Basic and Advanced actions. You can create your own custom actions in the configuration console. Additional custom actions can also be found here: http://lansweeper.com/kb/extra-custom-actions.aspx
www.lansweeper.com
Action The command to execute. Variables {computer}, {domain}, {username}, {userdomain}, {tag}, {ipaddress}, {fqdn}, {actionpath} In large active directory domains it might be advisable to replace {computer} with {fqdn} to connect to the full DNS name. Icon Which icon to show in the interface. You can add your own icons to the actions folder inside the web folder. The path is the following: %Program Files%\Lansweeper\Website\actions
Sortorder The lower the number, the higher the action will be displayed in the web console. Enabled Show this action in the web console. Confirmation Ask for confirmation before executing this action. Advanced Show in the Basic or Advanced section of the actions list.
www.lansweeper.com
76/108
www.lansweeper.com
You can add your website to the trusted sites for security reasons. Go to Internet Options/Security/Trusted sites/Sites and add your Lansweeper website.
Go to Internet Options/Security/Trusted sites/Custom Level. Make sure that activeX controls are enabled, under Run ActiveX controls and plug-ins. Also change the setting Initialize and script ActiveX control not marked as safe to Prompt or Enable.
77/108
www.lansweeper.com
Configuring Firefox
Mozilla Firefox needs to be configured to run Basic and Advanced actions.
First download the plugin: http://lansweeper.com/files/firefox.zip The nplansweepershellexec.dll should be placed in the following directory: %Program Files%\Mozilla Firefox\Plugins
Restart Firefox if it was running. You can disable/enable the plugin afterwards from the Firefox menu/Tools/Add-ons.
78/108
www.lansweeper.com
Configuring Chrome
Google Chrome needs to be configured to run Basic and Advanced actions. First download the plugin: http://lansweeper.com/files/chrome.zip The nplansweepershellexec.dll should be placed in your Chrome Plugins folder. If the folder Plugins does not exist, you have to create it manually.
Windows XP
Path %USERPROFILE%\Local Settings\Application data\Google\Chrome\Application\Plugins
Restart Chrome if it was running. You can use the about:plugins link to check if the plugin is loaded:
Restart Chrome if it was running. You can use the about:plugins link to check if the plugin is loaded.
79/108
www.lansweeper.com
Reports
Using reports
Lansweeper provides you with extensive reporting tools for scanned data. The configuration console contains a list of built-in reports and you can create your own custom reports if you wish. The report builder gives an overview of all available reports, including any custom reports you may have created. Double-click on one of the reports to view or export the results contained within. Click on a report and choose Edit to modify the report. Report results can also be found in the web console.
You can sort reports into different categories or pages and assign priorities to them through the configuration console. The changes you make here are reflected in the web console.
80/108
www.lansweeper.com
Sort order The lower the number, the higher the report will be displayed in the web console. Report Name of the report. With the dropdown box you can select from all available reports, including any custom reports you may have made. Color When enabled, the report is shown in red if it contains results. Show % Shows the percentage of computers contained in this report. Page Which category or page the report should be filed under. With the dropdown box you can select from all available pages. Pages can be found in the web console. Priority Priority 1 Priority 2 Priority 3
Your report dashboard inside the web console will look like this:
categories
You can choose to have report results emailed to you every day.
For info on how to have report results emailed to you, please refer to page 91 of this documentation.
81/108
www.lansweeper.com
Custom reports
Sample report
We want to display all software found in our network from publisher Apple Inc. For this we will create a custom report in the report builder. Basic SQL knowledge is required.
Drag the required tables to the query builder and select the fields you want. In this example we need tables tblComputers and tblSoftware. The fields we want are Computername, ComputerUnique, softwareName, SoftwarePublisher and Computer.
82/108
www.lansweeper.com
Lets filter out software from Apple Inc. by modifying the criteria for the field SoftwarePublisher. You can use the Result tab at the top of the builder to check your report results as youre making changes.
Select Top 1000000 tblComputers.Computername, tblComputers.ComputerUnique, tblSoftware.softwareName From tblComputers Inner Join tblSoftware On tblComputers.Computername = tblSoftware.ComputerName Where tblSoftware.SoftwarePublisher = 'Apple Inc.' Order By tblComputers.Computer
We can now save our report. Enter a View name and a Report name. The Report name is the name youll see in the report builder list. The View name is unique and used for internal storage. Do not include any special characters in your View name.
Our report is now available in the report builder list. Double-click the report to view its results and export options. Report results can be exported to Excel, XML, CSV
We can also add the report to the web console. Open the Reports & Alerts Dashboard in the configuration console and add your report to one of the report categories. More info on managing reports can be found on page 80 of this documentation.
83/108
www.lansweeper.com
User information
User details are stored in table tblADusers. If you want to include user details, add the table to the report. Link the table on both Username and Userdomain and make sure to Select all rows from tblComputers. This ensures that your results include computers with empty usernames.
84/108
www.lansweeper.com
General guidelines
Each field in a database table maps to a field from a WMI class. Information on all WMI classes and fields can be found here: http://msdn.microsoft.com/en-us/library/aa394084%28v=VS.85%29.aspx
Wait time name AUTORUN BASEBOARD BATTERY BIOS BOOTCONFIG BUS CDROM CODEC COMAPPLICATION COMPONENTCAT COMPSYSPROD COMPSYSTEM DCOMAPP DESKTOP DESKTOPMON DISKPARTITION DISPLAYCONF DISPLAYCONTRCONF ENVIRONMENT EVENTLOG FILES FLOPPY GROUPS HARDDISK IDECONTROLLER IEACTIVEX IEBARS IEBHO IEEXT INFRARED KEYBOARD MEMORY MEMORYARRAY MONITOR NETWORK NETWORKCLIENT ONBOARDDEVICE
Table tblcomputers tbladusers tbladcomputers tblapprovedsoftware tblcplogoninfo tblcustdevices tblcustdevhd tblcustdevprinter tbldomainroles tblcompcustom tsyschassistypes tsysdevicetypes tblAutorun tblBaseboard tblBattery tblBIOS tblBootConfiguration tblBus tblCDROMDrive tblCodecFile tblCOMApplication tblComponentCategory tblComputerSystemProduct tblComputersystem tblDCOMApplication tblDesktop tblDesktopMonitor tblDiskPartition tblDisplayConfiguration tblDisplayControllerConfiguration tblEnvironment tblntlogevent tblFileVersions tblFloppy tblGroups tblDiskdrives tblIDEController tblIEActiveX tblIEBars tblIEBHO tblIEExtensions tblInfraredDevice tblKeyboard tblPhysicalMemory tblPhysicalMemoryArray tblMonitor tblNetwork tblNetworkClient tblOnBoardDevice
Info Main table that contains all computer objects Active directory user information Active directory computer information Contains all approved software User logons Main table that contains all device objects Linux harddisk information Printer toner information Links to tblcomputersystem, domainrole Custom computer information Links to tblSystemEnclosure, chassistype Links to tblcustdevices, devicetype Win32_StartupCommand class scanning Win32_BaseBoard class scanning Win32_Battery class scanning Win32_BIOS class scanning Win32_BootConfiguration class scanning Win32_Bus class scanning Win32_CDROMDrive class scanning Win32_CodecFile class scanning Win32_COMApplication class scanning Win32_ComponentCategory class scanning Win32_ComputerSystemProduct class scanning Win32_ComputerSystem class scanning Win32_DCOMApplication class scanning Win32_Desktop class scanning Win32_DesktopMonitor class scanning Win32_DiskPartition class scanning Win32_DisplayConfiguration class scanning Win32_DisplayControllerConfiguration class scanning Win32_Environment class scanning Win32_NTLogEvent class scanning Custom files scanning Win32_DiskDrive class scanning Win32_Group class scanning Win32_LogicalDisk class scanning Win32_IDEController class scanning Internet Explorer Active-X controls scanning Internet Explorer Bars scanning Internet Explorer Browser helper objects scanning Internet Explorer Extensions scanning Win32_InfraredDevice class scanning Win32_Keyboard class scanning Win32_PhysicalMemory class scanning Win32_PhysicalMemoryArray class scanning Monitor type and serial number scanning Win32_NetworkAdapterConfiguration class scanning Win32_NetworkClient class scanning Win32_OnBoardDevice class scanning
85/108
www.lansweeper.com
OS OSRECOVERY PAGEFILE PARALLELPORT PCMCIA POINTING PORTABLEBATTERY PORTCONNECTOR POTSMODEM PRINTERS PROCESS PROCESSOR PROXY QUICKFIX REGISTRY SCSI SERIALNUMBER SERIALPORT SERVICES SHARES SOFTWARE SOUND SYSTEMENCLOSURE TAPE USBCONTROLLER USERS USERSINGROUP VIDEOCONTROLLER
tblOperatingsystem tblOSRecoveryConfiguration tblPageFile tblParallelPort tblPCMCIAController tblPointingDevice tblPortableBattery tblPortConnector tblPOTSModem tblPrinters tblProcesses tblPROCESSOR tblProxy tblQuickFixEngineering tblRegistry tblScsicontroller tblSerialnumber tblSerialPort tblServices tblShares tblSoftware tblSoundDevice tblSystemEnclosure tblTapeDrive tblUsbcontroller tblUsers tblUsersInGroup tblVideoController
Win32_OperatingSystem class scanning Win32_OSRecoveryConfiguration class scanning Win32_PatchFile class scanning Win32_ParallelPort class scanning Win32_PCMCIAController class scanning Win32_PointingDevice class scanning Win32_PortableBattery class scanning Win32_PortConnector class scanning Win32_POTSModem class scanning Win32_Printer class scanning win32_process class scanning Win32_Processor class scanning Win32_Proxy class scanning Win32_QuickFixEngineering class scanning Custom registry keys scanning Win32_SCSIController class scanning Software license key scanning Win32_SerialPort class scanning Win32_Service class scanning Win32_Share class scanning Installed software scanning Win32_SoundDevice class scanning Win32_SystemEnclosure class scanning Win32_TapeDrive class scanning Win32_USBController class scanning Win32_UserAccount class scanning Users that belong to NT group scanning Win32_VideoController class scanning
The report builder also contains tables for all available reports, including any custom reports you may have made. All report tables start with web40rep. The name used for a report table is the View name, not the Report name.
Make sure to Select all rows from tblComputers when linking tables to tblComputers. This ensures that your results include computers with no value for the fields youve selected. The same logic applies to linking other tables.
86/108
www.lansweeper.com
File reports
Lansweeper can scan specific files on client machines and return information such as version, file size and changed date. Results of these file scans can be used to create custom reports with the report builder. In this example we will detect the Firefox version on all computers based on a file scan. First, we must enable scanning of the file in the configuration console. For this we need to find the files filename.
We can then enter the filename into the configuration console and enable it.
In the item wait time section of the configuration console, make sure that FILES is set to something other than -1. In this example weve set the wait time to 1, which means that the file is scanned every day.
87/108
www.lansweeper.com
We can check to see if the file was scanned on a client machine by going to the computers page in the web console.
Now we want to create a report in the report builder to list all computers that have Firefox installed. We also want info on the file such as path, version, company and size. We will be linking tables tblComputers and tblFileVersions. The fields we want are Computername, ComputerUnique, FilePathFull, Found, FileVersion, CompanyName and Filesize. We can then add the firefox.exe to the criteria for field FilePathfull.
Select tblComputers.Computername, tblComputers.ComputerUnique, tblFileVersions.FilePathfull, tblFileVersions.Found, tblFileVersions.FileVersion, tblFileVersions.CompanyName, tblFileVersions.Filesize From tblComputers Inner Join tblFileVersions On tblComputers.Computername = tblFileVersions.Computername Where tblFileVersions.FilePathfull Like '%firefox.exe'
88/108
www.lansweeper.com
Registry reports
Lansweeper can scan specific registry keys on client machines. Results of these registry scans can be used to create custom reports with the report builder. In this example we will detect the Firefox version on all computers based on a registry scan. First, we must enable scanning of the registry key in the configuration console. For this we need to the path and the value we want to scan.
We can then enter the registry key into the configuration console and enable it.
In the item wait time section of the configuration console, make sure that REGISTRY is set to something other than -1. In this example weve set the wait time to 1, which means that the key is scanned every day.
89/108
www.lansweeper.com
We can check to see if the key was scanned on a client machine by going to the computers page in the web console.
Now we want to create a report in the report builder to list all computers that have Firefox installed. We also want the CurrentVersion registry value. We will be linking tables tblComputers and tblRegistry. The fields we want are Computername, ComputerUnique, Regkey, Valuename and Value. (If youve scanned the CurrentVersion value of just one registry key, you can leave out the Regkey field.) We can now add our key and key value to the criteria for fields Regkey and Valuename.
Select tblComputers.Computername, tblComputers.ComputerUnique, tblRegistry.Regkey, tblRegistry.Valuename, tblRegistry.Value From tblComputers Inner Join tblRegistry On tblComputers.Computername = tblRegistry.Computername Where tblRegistry.Regkey = 'HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox' And tblRegistry.Valuename = 'CurrentVersion'
90/108
www.lansweeper.com
We need to create one or more mail groups. A mail group can contain multiple email addresses, separated by a ;
Now we can select the reports we want to mail and the group we want to send them to. Selected reports will be mailed every day, if they contain results. Empty reports will not be mailed. If you immediately wish to mail the selected reports, hit the Mail selected reports now button under Scanning Servers/Your Server/Options.
91/108
www.lansweeper.com
First we must enable eventlog mailing and configure a mail server. Click your scanning server in the configuration console and enter the appropriate data. Eventlog scanning can be enabled on multiple scanning servers.
We need to create one or more mail groups. A mail group can contain multiple email addresses, separated by a ;
92/108
www.lansweeper.com
Now we can select the alerts we want to mail and the group we want to send them to. Each alert can use its own mail group.
details pane
Compare Choose your filter type. The available filter types are: Computer, EventID, Eventtype, Logfile, Source, User, Domain, Message. Operators The available operators are: Equal, Not equal, Like, Not like. Use the Like operator to search for partial matches. Filter Enter your filter value here. Eventtypes 1 = Error 2 = Warning 3 = Information 4 = Success Audit 5 = Failure Audit
93/108
www.lansweeper.com
Premium tools
Download
Lansweeper contains several premium tools, which are included in the installation. You can also download them separately: http://lansweeper.com/premiumtools.aspx
The premium tools require a valid license key to work. This means they cant be used in the freeware or trial version of Lansweeper.
Remote screenshot The screengrab.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Allows you to take a remote screenshot of a client machine. A remote screenshot can be initiated through the web console or the screengrab.exe. More info on page 96 of this documentation.
Remote control The lsremote.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Allows you to take remote control of a client machine. A remote control can be initiated through the web console or the lsremote.exe. More info on page 97 of this documentation.
Remote uninstall The RemoteUninst.exe can be found in the following directory: %Program Files%\Lansweeper\Actions Allows you to remotely uninstall software on a client machine. A remote uninstall can be initiated through the web console or the RemoteUninst.exe. More info on page 98 of this documentation.
94/108
www.lansweeper.com
Register
The remote screenshot, remote control and remote uninstall premium tools need to be registered separately. There are two ways of doing this.
95/108
www.lansweeper.com
Remote screenshot
Lansweeper allows you to remotely take screenshots of client machines.
The following requirements should be met: Client machine Windows 2000 or higher Both machines must be in trusted domains. The user must have administrative privileges on the client. TCP ports 139 and 445 must be open on the server from the client. The Server service must be running on the target machine. The Remote Registry service must be running on the target machine. The Default shares must be available on the client (C$, admin$). Remote screenshot is a web console action and can be run from a computers webpage.
You will be prompted to enter the client computer name. Optionally, you can ask the client machine for permission to execute the action.
The screengrab.exe can be found in the following directory: %Program Files%\Lansweeper\Actions You can run this program from the command line if you wish. Syntax screengrab.exe {computer} /AP /AP and /NP This is optional. /AP = ask permission /NP = dont ask permission
96/108
www.lansweeper.com
Remote control
Lansweeper allows you to remotely control the screen of a client machine. This is particularly useful if you want to give remote support. When remote control is initiated, the free VNC service is automatically pushed to the client machine. VNC is removed after the remote control session.
You will be prompted to enter the client computer name. Optionally, you can ask the client machine for permission to execute the action.
The lsremote.exe can be found in the following directory: %Program Files%\Lansweeper\Actions You can run this program from the command line if you wish. Syntax lsremote.exe {computer} /AP /AP and /NP This is optional. /AP = ask permission /NP = dont ask permission 97/108
www.lansweeper.com
Remote uninstall
Lansweeper allows you to remotely uninstall software from a client machine. The only requirements are WMI and administrative privileges on the client.
The RemoteUninst.exe can be found in the following directory: %Program Files%\Lansweeper\Actions You can run this program from the command line if you wish. Syntax remoteuninst.exe {computer} There are 3 types of software: MSI packages These are uninstalled by the MSIexec command. Adding the /QN /NORESTART parameters makes the uninstall invisible to the remote users. Other installers These might have optional parameters available to run the uninstall window hidden, but this depends on the software vendor. Not allowed to be removed Some software vendors do not allow their software to be removed, because this might break Windows functionality. 98/108
www.lansweeper.com
The easiest and safest way of backing up your database is through SQL Server Management Studio. If it wasnt installed along with your version of SQL Server, you can download it here: http://www.microsoft.com/download/en/details.aspx?id=7593
Run SQL Server Management Studio and enter your credentials. Click your server name to expand the server tree. Expand Databases to see your lansweeperdb database.
99/108
www.lansweeper.com
Database lansweeperdb Backup type Full Backup component Database Name Verify that this is something other than lansweeperdb, since we dont want to overwrite our existing Lansweeper database. In the Options tab you can check Verify backup when finished if you wish. Click OK to create your backup.
100/108
www.lansweeper.com
Youll see a confirmation window when the backup has been completed.
If you ever wish to restore the backup youve created, right-click your database in the Server Management tree view and choose Tasks/Restore/Database
Verify that you are restoring to and from database lansweeperdb and that you have selected the correct backup set. In the Options tab make sure you select Overwrite the existing database. Then click OK to restore your database.
101/108
www.lansweeper.com
Moving Lansweeper
To move your Lansweeper installation to a different server, do the following:
1. Stop the Lansweeper service on your current setup. 2. Take a full backup of your lansweeperdb database using SQL Server Management
Studio.
3. If you added any custom images to Lansweeper, you may want to copy these files
as well. Custom images can be found in the following folders: %Program Files%\Lansweeper\Website\actions %Program Files%\Lansweeper\Website\userpictures
4. Do a full installation of Lansweeper on your new setup. Our latest installer can be
found here: http://lansweeper.com/download.aspx
5. Stop the Lansweeper service on the new server. 6. Do a restore of the database backup and overwrite the lansweeperdb database on
the new server.
7. Execute the below script in SQL Server Management Studio. This will ensure that
the SQL user for your Lansweeper database is configured correctly. use lansweeperdb GO drop schema lansweeperuser GO drop user lansweeperuser go execute sp_droplogin lansweeperuser go use master GO EXEC sp_addlogin 'lansweeperuser', 'mysecretpassword0*', 'lansweeperdb', [English] GO use lansweeperdb go EXEC sp_grantdbaccess 'lansweeperuser', 'lansweeperuser' GO EXEC sp_addrolemember [db_owner], 'lansweeperuser' Go
8. In your Lansweeper configuration files make sure that the Data Source, User ID
and Password correspond with your SQL Server settings. The config files are: %Program Files%\Lansweeper\Service\Lansweeperservice.exe.config %Program Files%\Lansweeper\Website\web.config
10. Copy any custom images from your old setup to your new one and restart the
Lansweeper service on your new server. 102/108
www.lansweeper.com
Updating Lansweeper
The Lansweeper software is updated on a regular basis. Its good practice to keep your installation up-to-date, so you can enjoy the most recently added Lansweeper features. We recommend backing up your database before applying any updates.
You can verify if you have the latest version of Lansweeper by clicking Check for updates in the bottom right corner of your web console.
Our latest installer can be found on our download page: http://lansweeper.com/download.aspx Updates are applied over your existing installation.
If all Lansweeper components are installed on one server, you can update everything simultaneously. If youve spread out the components over different servers, you should first update the servers where the Lansweeper service and database are installed. The web console comes last. Run the Lansweeper.exe on your server and click through the opening and license agreement screens. Setup will then recommend to Upgrade your current installation. Click Next to continue.
103/108
www.lansweeper.com
Setup will automatically detect existing components and compare them against the latest available versions. Click Next to continue.
You will then be prompted to direct setup to your existing Lansweeper database. You may type the server name or select it from the dropdown list. Click Next to continue.
104/108
www.lansweeper.com
You will see your files and database being upgraded. How long this process takes depends on the size of your database.
When the upgrade has been completed, you can (optionally) subscribe to our newsletter and post about your Lansweeper experience on Facebook, LinkedIn or Twitter. Click Finish to exit setup.
If you installed the different Lansweeper components on different servers, you will have to repeat this process for your other servers as well. The server where the web console is installed needs to be updated last. 105/108
www.lansweeper.com
Troubleshooting
Connection problems
Your Lansweeper installation includes two tools for troubleshooting connection problems. The testconnection.exe is used for computer connections, the Devicetester.exe for device connections. Both executables can be found in the following directory: %Program Files%\Lansweeper\Actions
Testconnection.exe
The executable allows you to connect from the server to one of the clients to check if the WMI settings and access permissions are OK.
You can also run the connection tester from a computers webpage.
The test verifies if WMI access and registry access using WMI is possible. For info on specific error messages, please consult our website: http://www.lansweeper.com/kb/knowledgebase.aspx Errors can almost always be attributed to one of the following causes: Firewall Windows Firewall or another, third party firewall is blocking access. (Cause of the connection problem 99% of the time.) DNS DNS points to a wrong IP address. WMI and DCOM WMI and DCOM are not enabled on the client. (In a default Windows installation, they are enabled.) User access The server user does not have administrative permissions on the client. 106/108
www.lansweeper.com
Devicetester.exe
Lansweeper can discover devices in your network that have the SNMP (SNMPv1 or SNMPv2), SSH, HTTP, HTTPS, FTP, SMTP, SIP, Telnet or JetDirect protocol enabled. This is done through IP range scanning. More information on IP range scanning can be found on page 26 of this documentation. The Devicetester.exe allows you to see scanning details for devices and test SNMP, SSH, passwords (If you dont need SSH credentials, simply enter a bogus user/password combination under SSH Login. For example, use the combination root/password.)
Syntax Devicetester.exe {ipaddress} You can also run the device tester from the actions tab in the web console.
The test verifies if the necessary protocols are enabled on the client machine. For info on specific error messages, please consult our website: http://www.lansweeper.com/kb/knowledgebase.aspx
107/108
www.lansweeper.com
Support
Knowledge base
The Lansweeper knowledge base can be found here: http://lansweeper.com/kb/knowledgebase.aspx Our knowledge base contains a variety of articles explaining Lansweeper features and functionality. It also describes and provides solutions to error codes you might encounter when scanning your workstations. We recommend searching our knowledge base if you have any technical questions.
Forum
The Lansweeper forum can be found here: http://lansweeper.com/forum/ The forum is the ideal place to request features and share reports and custom actions. It also houses any beta installers currently in development. To access the Premium Users section of the forum, click on one of the categories and enter your license key.
Contact
If you have any further questions about Lansweeper that were not answered in the documentation or the knowledge base, please contact us.
Billing & Reseller Questions sales@lansweeper.com Contact this email address for price quotes or info on the Lansweeper subscription plans. We also address billing issues and process reseller applications.
Technical Questions support@lansweeper.com For any technical questions, please contact this email address.
Skype ID Lansweeper
108/108