Network Inventory


Network Inventory: Hardware and Software Inventory and Network Audit

An award-winning network inventory software for organizations of any sizes. It offers features for remote audit of every PC in your network without having to install client modules. By using EMCO Network Inventory you can get detailed hardware, software inventory and licensing information from all remote PCs within seconds. Powerful reporting module helps you save a lot of time for preparing network PC inventory and network audit reports.

How much time do you spend on network inventory? How accurate and detailed your audit information is? Do you know what is your actual configuration now? EMCO Network Inventory is network audit software created to provide you by actual hardware and software audit information with no efforts from your side.

How this network audit solution can be helpful for you? First of all, it is able to make remote audit in automatic mode and collect information about hardware and software assets from remote computers in a few moments. It means that you always have up-to-date network inventory database with all assets, their settings and specification. This database can be used to generate audit reports and answer questions like:

  • Which desktops lack free space on their hard drives?
  • Which have Windows XP and have less than 1 Gb RAM?
  • How many additional software licenses are required?

Network Inventory: Main Features

EMCO Network Inventory is a tool that helps you automatically collect up-to-date information about all hardware and software assets from all remote PCs in your network into audit database and use it to quickly find required inventory information and build network inventory reports. With this network inventory tool you can get detailed network audit information in just few mouse clicks without any network environment configuration tricks, logon script or WMI manipulation or client installation to remote computers.

PC Inventory

Collect complete hardware and software audit information from all remote PCs in few minutes without physically attending them. Use modern network inventory scan approach, which doesn't require complicated configuration or client installation to remote PCs and is able to work in different environments.

  • Unattended Remote PC Inventory
  • Clientless Remote PC Audit
  • Large Networks Audit
  • Fast Remote PC Inventory Scan

Software Inventory

Make remote audit of installed software to get a high-level overview of used applications, guarantee licenses compliance and optimize software purchases and upgrades. Get software report for particular PC or entire network. Identify forbidden applications and resources on remote PCs.

  • OS and System Information for Every PC
  • Installed Software Inventory
  • Software License Compliance Audit
  • Installation Changes Tracking

Hardware Inventory

Perform automatic network audit and get general overview of all hardware assets installed on remote PCs. Get information about configuration of each particular PCs. Easily find where particular hardware component is installed. Simplify hardware upgrades and optimize your purchases.

  • Remote Unattended Hardware Audit
  • Hardware Inventory Information for Every PC
  • Detailed Assets Specification
  • Aggregated Hardware Assets Overview

Inventory Report

Generate detailed network inventory reports based on collected network audit information using a set of clear, accurate and nice-looking inventory templates. Save produced reports in one of popular formats. Customize existing or design own reports. Integrate your application with network inventory system.

  • Automatic Inventory Report Generation
  • Hardware and Software Inventory Reports
  • Software Compliance Report
  • Easy Reports Customization

Advantages and Benefits

Spend Minutes, Not Weeks to Get Inventory Information for All PCs in the Network

EMCO Network Inventory is a powerful tool that helps you to collect, analyze and report hardware and software inventory information from remote PCs. Retrieving of asset information is fully automatic and fast, that allows to significantly minimizing efforts spent for inventory tasks. Using EMCO Network Inventory you can collect asset information from remote PC and prepare report in a few seconds, so the overall inventory process even for large network requires just a few mouse clicks and takes a few minutes. Compare it with your own experience of manual collecting inventory information and composing inventory reports.

Make Easy Decisions Based on Detailed Inventory Reports

EMCO Network Inventory provides full information for every PC about its hardware subsystems and list of all installed applications. For every hardware subsystem you can get information about all available parameters and settings. It can help you to easily find those PCs that require your attention. For example, by one mouse click, you can find all PCs with a lack of memory and see how many free slots they have to increase memory capacity. Or you can find all PCs that have particular monitor model to replace by the new one. There are plenty other real-life situations when smart and fast inventory tool can save hours of your time.

Use Client-less Approach to Get Asset Information from Remote PCs

Unlike other inventory tools, EMCO Network Inventory doesn't require installation any client modules to remote PCs or enabling RPC/DCOM module that is disabled by default on most OS. Moreover, most asset information can be collected even without interaction with WMI interface. You don't need to start additional services or tune up settings on remote PCs to collect inventory information from them.

Get Inventory Data from PCs Located in Complex Network Structures

With EMCO Network Inventory you can collect asset information from networks with any complexity that consists of multiple domains and workgroups. Usually such networks have different permission settings, so you can access from one network to another. To support such complex structures EMCO Network Inventory has special settings to set separate credentials to be used for access to every domain, workgroup or even particular computers.

Reconcile Number of Used Applications with a Number of Purchased Licenses

EMCO Network Inventory has special features to make software asset management and track software licenses usage in your organization. It provides you by integrated summary for all software items used together with the count of installations for each entry. This list of software can filtered or manually edited to represent only those items that should be licensed. Having such summary you can evaluate total cost of owned software and identify software with a lack of licensing. Proper software purchase planning can help you to get volume discounts and save costs.

Find Resources that Violate Intellectual Property Rights or Company Policies

Using EMCO Network Inventory you can search specific resources on remote PCs. In particular you can look for files/folders, services or registry keys/values. This feature helps you to identify, for example, multimedia files on user's desktops that violate company policies. The same feature can be used to find resources that violation intellectual property rights, or for technical tasks like spyware detection.

Create Customized Inventory Reports Using Available Asset Information

EMCO Network Inventory comes with a set of preconfigured reports that can be stored in various formats, including PDF, RTF, HTML and other. When you generate report you can select what data should be included and customize the title page look. If you prefer to create custom report, you can compose it in easy-to-use visual editor. All inventory information collected from remote PCs is available for inclusion in custom report.

Feature List

System Settings Collected from Remote PC's

Starter Edition

Professional Edition

Enterprise Edition

Operating System         
OS Name, Type, Description, Service Pack, Build Number, Product ID, Serial Number, Installation Date.
System Environment         
Default Language, Windows Directory, Profiles Directory, Default Browser, Default E-Mail Client, Internet Explorer Product ID, MS Office Product ID.
Runtime System Information         
System Uptime, Date/Time, Current Users, Screensaver settings.
Shared Resources         
Share Name, Comment, Share Type, Path.
System Services         
Service Name, Display Name, Startup Option, Logon As Account.
Startup Commands         
Executable Command, Caption, Execution Type.
Scheduled Tasks         
Task Name, Date/Time of Next Run, Trigger String, Enabled/Disabled.
User Accounts         
User Name, Full Name, Privilege, Account Type, Last Logon, Number of Logons, Home Directory, Script Path, Max Storage, Password Age and other settings.
Running Processes         
Process Name, Process ID, Thread Count, Elapsed Time, Occupied Memory.
Environment Variables         
Variable Name, Variable Value, System/User Variable.
Program Folders         
Program Folder Name.
Drive Mappings         
Drive Letter, Remote Path.
ODBC Data Sources         
Data Service Name, Driver, System Data Service Name Flag.
Network Protocols         
Protocol Name, Description, Status, Installation Date.
Font Name, Font File Name.


Hardware Information Collected from Remote PC's

Starter Edition

Professional Edition

Enterprise Edition

Full Processor Specification, Manufacturer, Frequency, Alias.
Name, Manufacturer, Version, Serial Number.
Full Motherboard Specification.
Total Memory Installed, Available Memory.
Memory Banks         
Bank Order, Bank Capacity, Installed Memory.
Graphic Card         
Graphic Card Specification, Resolution.
Monitor Specification, Manufacturer, Model, Serial Number, Manufacturing Date.
Disk Drives         
Disk Name, Total Space, Free Space, File System, Volume Name, Max File Length.
CD/DVD Drives         
Drive Name, Manufacturer, Caption, Description, Load Status, Volume Name.
Printer Name, Local/Network Status, Port, Driver, Shared/Unshared Status.
Network Cards         
Adapter Name, MAC Address, Default Gateways, Subnet Masks, DHCP Server IP, DHCP IP Address, DHCP Subnet Mask, DHCP Default Gateways.
Modem Specification.


Software Information Collected from Remote PC's

Starter Edition

Professional Edition

Enterprise Edition

Installed Applications         
Application Name, Version, Publisher, Installation Date, Installation Path, Uninstall Command.
OS Hotfixes         
Knowledge Base Number, Description, Help URL, Uninstall String, Service Pack Number.


Software Licenses Management

Starter Edition

Professional Edition

Enterprise Edition

Installed Applications Summary         
Information from all scanned PCs in the local network is grouped in a special view that displays a list of installed applications across the network and a total number of installations for each application.
Reconcile Licenses Report         
A special report targeted at reconciliation of software licenses displays all software found in the network with the total number of installations for every application. It compares a number of installed copies and editable number of available licenses to show the count of unused and required licenses for each application and highlight software that has a lack of licenses.
Licenses Change Tracking         
Changes in the list of installed applications are automatically tracked and reported to show the list of recently installed and uninstalled applications on network PCs.
Applications Filtering         
Software reports can be filtered to exclude items that conforms defined application name masks.
Applications Grouping         
By default, aggregated reports make software items grouping by application name. Few items are considered as the same application if they have fully identical name. This approach can be changed by defining custom application name masks to group items with non-identical names and display them in the report as one item.


Remote Scan Operations

Starter Edition

Professional Edition

Enterprise Edition

Automatic Network Enumeration         
Local network is scanned automatically to detect available remote PCs and extract inventory data from them. Supported options include entire local network enumerating to detect PCs in all available domains and workgroup, or enumerating PCs according with defined IP range or domain/workgroup name.
Clientless Remote Inventory         
Inventory information is extracted without installation of any client software to remote PCs. Most of asset information from remote PCs can be also retrieved even without WMI enabling.
Inventory Collection Stub         
Inventory information can be extracted locally for each PC by execution of stub utility. When stub is executed it generates an export file with inventory information that can be imported to the central database. Stub can be executed by logon script and generated inventory information can be automatically imported from remote PCs.
Remote File System and Registry Scan         
File system and registry on selected remote PCs can be scanned to get all files, folders, registry keys and values that conforms defined criteria.
Auto Processing         
Remote inventory can be launched in automatic mode to update assets information after defined time period. Collected data can be used to automatically generate printable report.
Alternative Credentials         
Remote inventory requires administrative access to remote PC. In complicated networks structures consists of multiple domains PCs can be configured to have different administrative credentials. To access such network structures administrative credentials can be defined separately for each workgroup, domain or even a particular PC.


Data Scan Options

Starter Edition

Professional Edition

Enterprise Edition

Customizable Set of Data Extracted from Remote PCs         
Data set extracted from remote PCs is configurable. It's possible to turn on/off a detection of every particular asset.
Custom Scan Criteria         
Remote PCs can be scanned to detect existence of particular file, service or registry key. Found occurrences are reported in the special section in the asset information or can be treated as existence of defined software and included into the list of installed applications.


Inventory Data Management

Starter Edition

Professional Edition

Enterprise Edition

Changeable Asset Data         
All information collected from remote PCs can be manually changed. Additional custom information, such as asset inventory label can be added if required.
Inventory Data Protection         
Any asset parameter can be preserved from unwanted changes if it's manually marked as read only. In this case it stays untouched during repeatable inventory scans.
PC Locking         
The entire inventory information from particular PC can be marked as read only if PC is locked.
Export Displayed Data         
Inventory information is displayed on various forms and dialogs can be exported by one mouse click. It's possible to export to following formats: MS Excel, MS Word, MS Access, PDF, CSV, Text, XML, Clipboard, etc.



Starter Edition

Professional Edition

Enterprise Edition

Detailed Reports for One or Multiple PCs         
Inventory report can be prepared for the particular PC, all PCs in the network or group of PCs defined by IP range. Information included into the report can be selected from the list of available assets.
Save Reports in Various Formats         
Printable inventory reports can be exported to PDF, RTF, HTML, Text, JPEG formats.
Customizable Report Title         
Report title can be changed to contain custom captions, company name and logo, author information.
Query Reports         
Special type of report that lists only those PCs which contain software/hardware assets according with defined conditions.
SQL Query Builder         
A visual editor that allows browsing low-level inventory data stored in database, build custom queries using visual interface or SQL language, and export query results.
Custom Reports         
In addition to the set of predefined reports, new custom reports of any complexity can be created. Reports are created in special visual designer and can include any information collected from remote PCs.


What's New

Version 5.8.7 (December 9, 2013)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Added support of Microsoft Windows 8.1 and Microsoft Windows 2012 R2 operating systems
  • An option to modify Machine properties is added to the Machine Management tool

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • Reduced system memory usage at application startup


Version 5.8.6 (May 30, 2013)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Added an option for applying excluded application changes after importing
  • Improved performance of remote file system scanning

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • Incorrect file versions are returned by file system scans


Version 5.8.5 (September 18, 2012)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Added support of Microsoft Windows 8 and Microsoft Windows 2012 operating systems
  • Added OS platform representation (x86 and x64) along with its name


Version 5.8.4 (July 3, 2012)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Added an option to start a new page for each Machine in an inventory report
  • Added an option to execute any data manipulation query using the Query Builder
  • Improved network enumeration, so a Local Machine domain can be always enumerated, even if it is not available via the Computer Browser service

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • Errors while executing data manipulation queries using the Query Builder


Version 5.8.3 (December 9, 2011)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Introduced a feature of retrieving the information about installed software updates

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • Applications with names longer then 80 characters are not retrieved during a scan
  • Incorrect detection of installed application lists in specific environments
  • Main menu items are not displayed in the Chars dialog


Version 5.8.2 (October 12, 2011)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Added an option to export the Custom Data columns along with the Description column

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • The Export Displayed option should export only the data that is displayed on the screen


Version 5.8.1 (August 17, 2011)

New and improved features

The below features have been introduced for the first time or significantly improved in this release:

  • Remote connection process is improved to decrease a chance of connection failure
  • More detailed logging of problems while connecting to the remote machines
  • Data collection options are grouped by inventory information categories

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • Errors while importing inventory information, collected by stubs, from network shares


Version 5.8 (July 21, 2011)

Physical drives info reporting

Information about physical hard drives now is available in the inventory report. In order to scan physical drives the corresponding option should be enabled on the Settings tab. The extracted information includes a model, manufacturer, capacity, serial number and other information for every installed hard drive.

Extended memory banks info

The reported information about memory banks was extended to include memory type and memory speed info for installed memory modules.

Resolved issues

This release resolves a number of issues, the most important of which are listed below:

  • Total physical memory is displayed incorrectly for machines with more than 4 GB of memory installed
  • An error may happen while retrieving a list of running processes
  • A progress is displayed inaccurately during a machines scan
  • The network tree may show duplicated entries for some machines

Getting Started

This tutorial is a starting point for everyone, who would like to see how to make software and hardware audit of remote computers with the EMCO Network Inventory. If you are making first steps with the application, this tutorial will help you to quickly familiarize with the user interface and main features.


Any company and organization needs to have hardware and software inventory information in order to plan upgrades or hardware/software purchases. This information gives you an overview how many and what exact hardware and software assets do you have and helps to identify what assets you need to add or replace.

Today every PC has tens applications installed and consists of dozen components, including CPU, memory, motherboard, hard drive, etc. Manual collecting inventory information from one PC can take up to ten minutes. How long does it take to make inventory of tens, hundreds and thousands PCs in your network? Also consider the fact that to be useful inventory information should be up-to-date. It's not enough to collect assets information at the purchasing time, because afterwards configuration can be changed - administrators can replace or remove some hardware, users can install new applications, etc.

Is there an effective way to make the software and hardware audit? EMCO Network Inventory allows automatic collecting hardware and software assets information from remote PCs and gives you few advantages:

  • Fast automatic collection of asset information that significantly reduces your time and efforts
  • Always up-to-date inventory information helps you to make decisions easier

In scope of this tutorial Enterprise Edition will be used. If you would like to follow step-by-step instructions provided here, please make sure that you downloaded and installed right edition. Otherwise you can notice different interface options and some missed features.

Application Interface Overview

It's supposed that you successfully downloaded and installed EMCO Network Inventory. When you launch it first time, you see the Trial dialog that asks you to start evaluation or enter a license key. Click on the Evaluate button in order to start 30-runs evaluation. You will pass on to the main application screen [picture 1].
Pic 1. Main application screen

The main application screen is divided on two parts. At the left side you can find Machine Management area that displays the network tree and asset groups. Management toolbar [A] is used to execute main actions, for example, scan network or update inventory information. The full set of actions is available from the context menu on the tree.

The Machine Tree is located under the management toolbar and contains asset information that can be represented by two ways. The Networking node [B] displays PCs found in the network, grouped by domains and workgroups. When some node under the Networking is selected, on the right side you can see related inventory information. For example, if you select particular PC, you can see its hardware and software assets summary. If you want to learn more about concrete asset, for example memory on particular PC, you can select Memory Banks under PC's node in the tree and get detailed information.

Other nodes in the Machine Tree represent particular asset category for all computers in the network. Thus, if you need to check memory banks information only, you can expand Memory Banks root node in the tree and select domain/workgroup or particular PC to get information for them.

In order to manage application settings you can switch tabs located under the Machine Tree. [C] The Settings tab allows you to manage information extracted from remote PCs, so you can enable or skip some parameters. The Alt Credentials tab is used to set administrative credentials applied to access remote PCs. If your account doesn't have administrative permissions on remote PCs you need to set administrative account on this tab.

Information displayed on the right side of the main screen depends on the node, selected in the Machine Tree. For example, if PC node is selected, at the right side you can see Machine Summary information. Management toolbar [D] is located at the top of the summary and provides a quick access to the most frequent actions, such as report generation, locking and update functions. Under the toolbar [E] you can find Hardware, Software and System boxes with the correspondent information about PC.

Collect Hardware and Software Information from Remote PCs

As you may know, EMCO Network Inventory allows you to make hardware and software inventory of remote PCs without installation of any agents on client computers. It simplifies the process, because in order to prepare to the remote inventory you just need to check only two things. First, you need to have administrative access to remote PCs. If your current account doesn't have administrative permissions, you need to go to the Alt Credentials tab and setup credentials there. Second, you need to switch to the Settings tab and check what data will be collected from remote PCs. Please note that some data is collected through the Windows Management Instrumentation (WMI), so this service should be enabled on remote PCs.

Collection of the inventory information is activated by the Enumerate LAN button located on the management toolbar. This button launches the network enumeration to detect PCs in all available domains and workgroups within the local network. Inventory information is extracted from all remote PCs and stored in the local database. If you would like to reduce the range of scanned PCs, you can choose other options, like a scan by IP range, available from the Enumerate LAN pop-up menu [picture 2].

After a scan the Machine Tree displays detected PCs grouped by domains and workgroups. You can browse the tree to see the inventory information for the selected tree node. Thus, you can see asset information for workgroup/domain or PC or components of particular PC, etc [picture 3].
Pic 2. Enumerate LAN options

Pic 3. Inventory scan results

When you make the first scan, the Machine Tree is filled by the collected data. Next time, when you need to make an inventory, you can choose to collect information from the new PCs available in the network, or to update information on existing PCs in the tree. In this case you need to use Fetch New or Update buttons on the management toolbar. If you make Enumerate LAN, then the network scan and the data collection procedure will be repeated again and your current data will be replaced by the new one.

Browse, Filter and Analyze Inventory Information

When collection of the inventory information is finished, you can browse it by selecting required nodes in the Machines Tree. By this way you can get the inventory information for each particular PC or the general overview for particular asset across the network. But if you have hundreds or thousands PCs in the network, it's hard to find required information.

EMCO Network Inventory can help you to easily manage and narrow information by applying filters. For example, let's detect problematic PCs, which have a lack of memory. In order to find them, select the domain or workgroup under the Networking node in the tree. Summary information about PCs in this domain or workgroup is displayed on the right side. This information includes Physical Mem field, so we can apply filter by this field to display only problematic PCs. Click on the down button on the field's caption and in appeared menu select (Custom...) item. On the Custom AutoFilter dialog select is less than option and enter 512 value to display only those PCs, which have less than 512Mb of memory [picture 4]. Press OK button to apply the filter.
Pic 4. Custom AutoFilter dialog
Pic 5. Scan results with applied filter

After applying the filter the displayed data will be updated to show only those PCs that fulfill the filter condition [picture 5]. Note that you can apply multiple filters and once, for example to detect PCs that have Windows Vista and a low memory.

Prepare Inventory Report

Collecting information from remote computers is only a part of the inventory task. Usually, the asset information should be composed into printable reports for the management or further reference by IT team. EMCO Network Inventory provides few easy ways to prepare reports. First, you can save information displayed on screen in various formats if you click on the Export Displayed button. Second, you can generate a set of detailed predefined reports. Third, you can your own custom reports.

All reports are customizable. It means that you can change the title page and put your name and company logo to it. To customize report select File > Preferences... item from the main menu and go to the Report tab. Change report Title, Description and set Author and Company Logo [picture 6]. Press OK button to apply settings.
Pic 6. Report customization options
Pic 7. Field Output Selection dialog
Pic 8. Report title page
Pic 9. PC Summary report

Let's create inventory report in PDF format for all PC. To generate the report select Reports > Machine Data > Export to File > All item from the main menu. On the appeared Field Output Selection dialog you can choose what data should be included into the report [picture 7]. Make you selection, press OK and proceed to the Save As dialog where you need to enter the file name and choose Adobe Acrobat Document as output format. Press Save button to generate the report and open it in the Acrobat Reader. You can see logo and customized captions on the title page [picture 8]. Other pages contain information selected for inclusion into the report [picture 9].

Reconcile Software Licenses

A list of installed applications for each PC is available under the Installed Apps node in the Machines Tree. It represents the same data as displayed by the Add/Remove Programs in the Control Panel. But if you have a lot of computers in the network, it's very hard to get the general vision what software is used in the organization, because information is represented per PC.

The summary information about software used within organization is available in the Enterprise Edition on the Machine Tree under the Management Tools > Installed Applications. The Count Application node opens the dialog that represents all software items found in the network together with the number of used copies [picture 10]. It helps you to have the summarized information about all software assets. But such representation has two disadvantages. First, it includes a freeware that should be often skipped from the software assets evaluation. Second, it groups software by the full name coincidence, so same applications with different version numbers can be represented few times in the list.

To filter out applications from the summary view, the Installed Application Exclude List dialog can be used. It is activated by the Maintain Exclude List node. In this dialog you can define a application name mask to remove all occurrences according with mask from the applications list [picture 11]. The similar functionality is available for application entries grouping. Using the Maintain Groups List node you can activate dialog where set the mask and group name. All entries compliant to mask will be replaced by the defined group name [picture 12].
Pic 10. Installed Applications Count dialog
Pic 11. Installed Application Exclude List dialog
Pic 12. Installed Application Groups List dialog
Pic 13. Reconcile Licenses dialog

Finally, when freeware is filtered out and all groups are defined, you can select the Reconcile Licenses node to open correspondent dialog [picture 13]. This dialog can help you to review all software assets. You can see a number of used copies for each application and can enter the number of licenses that your organization owns to get the number of unused or required licenses. Such approach can easily demonstrate licensing problems and simplify decision making for software purchases.

Detect Licensing or Policies Violations on Remote PCs

EMCO Network Inventory has an ability to make a custom search on remote computers. You can define specific conditions to search resources on the file system and registry. This feature is useful in various cases, for example, to detect remote PCs with specific resources, settings or viruses, etc. It can help also to detect licensing or company policies violations. For example, let's detect PCs that have MP3 files on hard drives.

Remote search options are available in the Enterprise Edition under the Scan Operations node in the Machine Tree. To make a files scan select File System Scan node and press Add button to configure a new scan task. On the appeared Add Scan Task dialog enter scan task name and description [picture 14]. New scan task will appear in the tree and you can select it to configure conditions. Click on the Add button on the toolbar and on the Add Scan Criteria dialog enter file mask *.mp3 and select %All Drives% as a search criteria to look for MP3 files on all available drives. Press OK button to finish [picture 15].
Pic 14. Add Scan Task dialog
Pic 15. Add Scan Criteria dialog
Pic 16. Add Machines to Queue dialog
Pic 17. View Scan Results dialog

Next, we need to configure the search scope, so click on the Include Machine button located on the Machine Queue toolbar. On the appeared Add Machines to Queue dialog you can choose domains/workgroups or individual PCs where search should be performed and press OK button to fill the Machine Queue [picture 16]. When search conditions and Machine Queue are configured, you can launch the search by pressing Run Now button on the toolbar. After scan completion you can see search results below. To get a detailed report about resources found, you can click on the row in the search results [picture 17].







EMCO Network Inventory - Requirements

Please carefully read and follow all requirements, listed here, or you may not be able to successfully use the product.

EMCO Network Inventory is a network application that relies on Microsoft network infrastructure to interact with remote PCs. The application uses a list of standard Windows services that should be started on remote PCs and ports that should be opened in the firewall. These services and ports are listed below. You can learn more about ports and protocols Microsoft operating systems require for network connectivity in the Service overview and network port requirements article.

EMCO Network Inventory System Requirements

Computer running EMCO Network Inventory must meet following requirements.

Minimum Hardware Requirements

  • 1 GHz Intel Pentium processor or equivalent
  • 1GB of RAM
  • 250MB of free disk space

Recommended Hardware Requirements

  • 2 GHz Intel Pentium processor or equivalent
  • 2GB of RAM
  • 500MB of free disk space

Supported Platforms

Windows XP (with SP3), Windows XP x64, Windows 2003, Windows 2003 x64, Windows Vista, Windows Vista x64, Windows 2008, Windows 2008 x64, Windows 2008 R2, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 2012, Windows 8.1, Windows 8.1 x64, Windows 2012 R2


  • Administrative rights on the local computer
  • Enabled NetBIOS over TCP/IP

Requirements for Remote Computers

Remote computers, accessed by EMCO Network Inventory must meet following requirements.

  • Platform: Windows XP, Windows XP x64, Windows 2003, Windows 2003 x64, Windows Vista, Windows Vista x64, Windows 2008, Windows 2008 x64, Windows 2008 R2, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 2012, Windows 8.1, Windows 8.1 x64, Windows 2012 R2
  • An access with a Local or Domain administrator rights
  • Enabled NetBIOS over TCP/IP
  • Enabled File and Printer sharing
  • Enabled access to the ADMIN$ share
  • An ability to ping the computer within 1500 ms
  • Started services: Computer Browser, Remote Registry
  • TCP ports opened: 135, 139, 445
  • UDP ports opened: 137, 138