Windows Inventory Event Monitor Reference Guide

Windows Inventory Event Monitor

Collects inventory data for your Windows devices.

Overview

The Windows Inventory Event Monitor scans the systems you select and collects or refreshes inventory data for each of them. Inventory data includes the number of CPU cores, their frequencies, lists of partitions, installed RAM, installed applications, installed packages and more. This information is made available on the Inventory tab of each of your network devices and in the inventory reports.

The event monitor works automatically by connecting to your network devices using the credentials that you select and gathering inventory data so it has very few required settings.

Use Cases

  • Automatically collecting Windows inventory data
  • Populating the inventory tab for Windows devices

Monitoring Options

This event monitor provides the following options:

Don't warn if the device cannot be contacted

Select this option to tell the event monitor not to warn if it can't contact a selected network device. It's usually a good idea to enable this option because your monitoring configuration will likely have another event monitor to warn if systems are down. If a system is down, its inventory data can be refreshed on the next run.

Alert with [Info/Warning/Error/Critical] if the detected applications list has changed since the last run

Use this option to receive an alert about any change to the list of detected applications compared to the last run.

Applications to ignore

Enter a comma-separated list of the full or partial names of applications to exclude from this monitoring option.

Alert with [Info/Warning/Error/Critical] if the detected applications changed versions since the last run

Enable this option to receive an alert if any detected application changed its version since the last run.

Applications to ignore

Enter a comma-separated list of the full or partial names of applications to exclude from this monitoring option.

Authentication and Security

The account used for authentication must have permission to search the registry and have access to the keys and values being monitored.

Protocols

Data Points

This event monitor does not generate any data points.

Sample Output

Tutorial

To view the tutorial for this event monitor, click here.

Back to Library

Comments

There are no user-contributed comments for this page. Be the first to submit a comment!

Add a comment