The wizard driven Network Detective data collectors are non-intrusive and so easy to use. All the individual modules are accessed and controlled through a common user interface. It only takes minutes to upload the data and run the automated report generator. With about 15 minutes of hands on work, you are ready to create hundreds of pages of meaningful reports.
Step 1: Install the Network Detective Reporter and Remote Data Collectors
Install the Reporter software in your network. On every network you wish to scan, install Remote Data Collectors.
Step 2: Configure and schedule Scans
Using the Network Detective desktop application, configure what you want to scan and when you want to perform scans.
Step 3: Choose which reports and how you want them delivered
Select the reports you want to generate and if you want the reports saved to a network share, made available for download into the Network Detective application, or emailed.
Step 4: Scans performed and results delivered
Network Detective takes care of the rest. At the scheduled time, scans are performed and automatically uploaded to the on-site Reporter. The Reporter then generates the reports you selected and delivers them.
Network Detective employs a multitude of data collection to provide as much discovery and issue detection as possible. Techniques used for data collection include:
Active Directory discovery
File and print sharing discovery
ICMP and Port Scans
Hyper-V and VMware discovery
SQL Server queries
Exchange and Office 365 discovery
Event log analysis
Software and Hardware inventory
Mac OSX discovery
Network device identification
Layer 2/3 discovery
External vulnerability scans
Internal vulnerability scans
Group Policy and RSOP analysis
Windows Patch assurance
BDR needs analysis
Outbound firewall rule testing
Personal Data (PD) and Personally Identifiable Information (PII) discovery