Free Software asset Management

Free Kit to monitor your LAN and installed software.

Read more...

Powerful Report Engine

A report engine with a simple SQL query allows infinite analyses.

Read more...

Software and Hardware Inventory

Discover the Hardware and software of your Network Clients.

Read more...

Easy to Start

Easy to integrate for everyone. Download and Scan!!

Read more...

Articoli

To allow IT Asset Tool to receive events from Linux Operating Systems it is necessary that the Forward of the logs is configured correctly.

A tool named SendSyslog.exe is available to test the receipt of events by IT Asset Tool by sending them directly from a Windows computer. The tool is contained directly in the "Server" folder of our installation.

Once verified that IT Asset Tool receives our Logs, we can dedicate to the installation and configuration of one of the many packages that will forward events from our Linux server. In our guide we will use "rsyslog" in a Debian LIKE environment.

Installation command: apt-get install rsyslog

Once installed we proceed with the forward configuration by editing the file with a text editor: vi /etc/syslog.conf

At the end of the file we add the following wording *. * @Servername: 514 and save the file.

This row set the syslog manager to send all events (*. *) to port (514) of the server (servername).

We then restart the service with the following command /etc/rc.d/init.d/rsyslog restart

 

With this simple configuration we can start receiving logs from our Linux system.

 

N.B. The above commands are an example that can change depending on the Linux distribution in use. For a more exhaustive guide, please refer to the manufacturer of the operating system itself.

 

 

Activate IT Asset Tool now and take advantage of one Free month of Enterprise subscription. (No card insertion necessary or other data)

You will thus be able to take advantage of the advanced features and carry out the inventory in a complete and fast way.

 

Below is a list of advanced features: 

  • Scan the network in Agent Less mode
  • Integration with Active Directory
  • Support for Microsoft Sql databases
  • Software License Compliance Audit
  • Syslog analysis
  • Centralized notification system
  • Multi User Management

 

Network Monitor with IAT

* The free month starts when you register your IT Asset Too account, hurry up and activate it now!

 

Once installed, you can activate IT Asset Tool directly from the "config" menu, by entering in the Subscription Activation field the email used when registering your account.

 

Attivazione di IT Asset Tool

 

Once inserted, click on "Activate" to take advantage of all its features for a month!

You will be able to take advantage of a high-performance database such as Microsfot Sql and Agent Less data collection directly integrated into Active Directory.

 

 

The Enterprise subscription makes it possible to remotely manage the IT Asset Tool server by installing a Remote Management Console and configuring it to access the existing server.

 

To do this you will need to perform the following steps:

 

  1. Download IT Asset Tool from https://www.it-asset-tool.com in the client computer which the Management Console must be installed
  2. Install IT Asset Tool
  3. Run the first Time IT Asset Tool
  4. When asked to select a new password, select "Exit"
  5. Go to the remote IT Asset Tool server and copy the database "db.sqlite" in the "Server" folder
  6. Overwrite the existing "db.sqlite" file in our client with the one just copied
  7. Run IT Asset Tool and verify that the client works properly and connects to our remote Microsoft Sql server and IT Asset Tool.
     

 N.B. The credentials remain unchanged and therefore the login credentials are the same as those used on the server.

 

 

IT Asset Tool offers the possibility to receive and monitor any network device that supports the forwarding of events via the Syslog protocol on the UDP 514 port.

IT Asset Tool integrates a Syslog Server that allows centralization, analysis and archiving in a structured way.

 

The logs are archived and encrypted in the "Archive" folder present in the Server folder of our IT Asset Tool installation. This archive is useful for being able to re-import and validate the logs previously received.

You will have a personalized dashboard that filters and displays logs of your interest, you can from your created rules, have full control of your network.

You will also have the possibility to download pre-built templates from our servers through the Enterprise Subscription, containing basic default Signatures within them.

  

Consult the Syslog events report filtered with your customized rules

The "SyslogConfig" section accessible from the "Syslog" item is divided into two Tabs, "Groups Host" and "Syslog Rules Messages".

The first "Groups Hosts", allows you to create groups of hosts to which a set of RegEx rules (Regular Expressions) can be applied to their Logs (from the "Syslog Rules Messages" Tab). If then these logs perform the match, they will be displayed in the "Report" section of Syslog.

 

Configure groups of devices to analyze their Syslog messages.
 

 

You can add a new group of devices or hosts using the Add button, then clicking on the IPs in the "Hosts" section, you can assign it to one or more IP addresses.

Remember that for the "Hosts" list to be populated it is necessary that the device or host has previously sent at least one Syslog message to the IT Asset Tool Server.

 

From the Tab "Syslog Rules Messages" you can view a list of hosts and their related Syslog Messages sent in the last 10 minutes.

If these logs perform the match, they will be displayed in the "Report" section of Syslog.

  1. Select the host IP that generates the Syslog Message
  2. Select the Syslog message that will have to match the rule I am creating
  3. Assign a Rule Name
  4. Assign the Host group to the rule
  5. Create the regular expression that the Match must perform and extract the fields of our interest
  6. Click the "Verify" button to test the newly created rule, if correct IT Asset Tool will show the extracted results on the left side. If correct they are correct you can go to the next point otherwise we will modify the rule and repeat step 6 until the result is correct.
    Creation Rule
  7. From the "Syslog Rule Creation" section you can assign headers to the data just extracted. You can select them from a predefined set or customize them to your liking by removing the Flag from the “Wizard Audit” Checkbox.
  8. Click on "Save Config" to create our rule that will be automatically assigned and applied to all messages from the assigned Host Group.

 

Now, we will display all the extracted values with their headings in the "Report" Tab previously described.

 

Two other important functions are available in the "Syslog Rule Messages" section, the first called "Re-Import" and the second "Download".

The first allows you to take the Syslog Messages previously archived by IT Asset Tool and reanalyze them with the currently selected rule.

You will be able to select a limit date from which all the log matches subsequently collected will be deleted and recreated. This functionality is important in case of adding or modifying some existing rule.

 

 

The second called "Download" allows you to download or update the default templates containing the Syslog rules created and maintained by the IT Asset Tool Team. So you can take advantage of the Syslog data collection without even knowing the regular expressions.

 

30/10/2019 - New version 1.3.19 of IT Asset Tool was released!!!

IT Asset Tool Free Asset ManagementIt is with great pleasure that we announce the release of the new version 1.3.19 which improve the New alert System for control your network.

Register and discover the new features !

Stay updated and follow us on Facebook or Youtube!!

 

  

IT  ASSET TOOL

Software License Agreement

 

NOTICE TO USER: PLEASE READ THIS AGREEMENT CAREFULLY. BY DOWNLOADING, BY COPYING, INSTALLING OR USING ALL OR ANY PORTION OF THE SOFTWARE YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT, INCLUDING, IN PARTICULAR THE PROVISIONS ON: TRANSFERABILITY IN SECTION 4; LIABILITY IN SECTION 6; CONNECTIVITY IN SECTION 7. YOU AGREE THAT THIS AGREEMENT IS LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. THIS AGREEMENT IS ENFORCEABLE AGAINST YOU AND ANY LEGAL ENTITY THAT OBTAINED THE SOFTWARE AND ON WHOSE BEHALF IT IS USED: FOR EXAMPLE, IF APPLICABLE, YOUR EMPLOYER. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT USE THE SOFTWARE. 

CREMA LUCA OWNS ALL INTELLECTUAL PROPERTY IN THE SOFTWARE. THE SOFTWARE IS LICENSED, NOT SOLD. CREMA LUCA PERMITS YOU TO COPY, DOWNLOAD, INSTALL, USE, OR OTHERWISE BENEFIT FROM THE FUNCTIONALITY OR INTELLECTUAL PROPERTY OF THE SOFTWARE ONLY IN ACCORDANCE WITH THE TERMS OF THIS AGREEMENT. 

THE SOFTWARE MAY CAUSE YOUR COMPUTER TO AUTOMATICALLY CONNECT TO THE INTERNET. SEE SECTIONS 7 FOR ADDITIONAL INFORMATION.

THE SOFTWARE MAY INCLUDE PRODUCT ACTIVATION AND OTHER TECHNOLOGY DESIGNED TO PREVENT UNAUTHORIZED USE AND COPYING. THIS TECHNOLOGY MAY CAUSE YOUR COMPUTER TO AUTOMATICALLY CONNECT TO THE INTERNET AS DESCRIBED IN SECTION 7. 

 

1. Definitions.

“Owner” means Crema Luca residents to via Trentino 34, Thiene (Vicenza), Italy. 

“Computer” means a virtual or physical computer device that accepts information in digital or similar form and manipulates it for a specific result based on a sequence of instructions.

“Internal Network”means a private, proprietary network resource accessible only by employees and individual contractors (i.e., temporary employees) of a specific corporation or similar business entity. Internal Network does not include portions of the Internet or any other network community open to the public, such as membership or subscription driven groups, associations and similar organizations.

“Output File”means an output file you create with the Software.

“Permitted Number”means one (1) for Server Application and unlimited number of client application unless it is not differently specificated.

“Software” means (a) all of the information with which this agreement is provided, including but not limited to (i) stock photographs, images, sounds, clip art and other file bundled with software.

 

2. Software License.

2.1 General Use. You may install and use one copy of the Software on up to the permitted number of your compatible Computers as long as, when required by the Software, you present a valid subscription number for each copy; and

2.2 Distribution from Server. You may copy an image of the Software into file server(s) within your Internal Network for the purpose of downloading and installing the Software into Computers within the same Internal Network for use as permitted by Section 2.1; and

2.3 Server Use. You may install the Software on Computer file server(s) within your Internal Network only for use of the Software initiated by an individual from a Computer within the same Internal Network as permitted by Section 2.1. and

2.4 Backup Copy. You may make a reasonable number of backup copies of the Software or database, provided your backup copies are not installed or used for other than archival purposes.

2.5 Content Files. Unless stated otherwise in the “Read-Me” files or other license associated with the Content Files, which may include specific rights and restrictions with respect to such materials, you may display, reproduce and distribute any of the Content Files. However, you may not distribute the Content Files on a stand-alone basis (i.e., in circumstances in which the Content Files constitute the primary value of the product being distributed), and you may not claim any trademark rights in the Content Files or derivative works thereof.

2.6 Tryout Software. The Software, or portions of the Software, may require a serial number to install or operate, for example, when configured to allow trial or tryout for a limited period of time or for a limited number of launches. You are not permitted to use the Software in a manner inconsistent with its design or Documentation. For example, you may not use the Advanced features of Software after its tryout period has ended unless you renew a valid subscription. ACCESS TO ANY OUTPUT CREATED WITH THE SOFTWARE USED ON A TRYOUT OR TRIAL BASIS IS ENTIRELY AT YOUR OWN RISK.

 

3. Intellectual Property Ownership.

The Software and any authorized copies that you make are the intellectual property of and are owned by owner. The structure, organization and code of the Software are the valuable trade secrets and confidential information of owner. The Software is protected by law, including but not limited to the copyright laws, and by international treaty provisions. Except as expressly stated herein, this agreement does not grant you any intellectual property rights in the Software and all rights not expressly granted are reserved by Owner.

 

4. Restrictions and Requirements.

4.1 Notices. Any permitted copy of the Software that you make must contain the same copyright and other proprietary notices that appear on or in the Software.

4.2 Use Obligations. You agree that you will not use the Software other than as permitted by this agreement and that you will not use the Software in a manner inconsistent with its design or Documentation.

4.3 No Modifications. 

4.4 No Reverse Engineering. You will not reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software.

4.5 No Transfer. YOU WILL NOT RENT, LEASE, SELL, SUBLICENSE, ASSIGN OR TRANSFER YOUR RIGHTS IN THE SOFTWARE, OR AUTHORIZE ANY PORTION OF THE SOFTWARE TO BE COPIED ONTO ANOTHER INDIVIDUAL OR LEGAL ENTITY’S COMPUTER EXCEPT AS MAY BE EXPRESSLY PERMITTED HEREIN. 

 

5. Updates.

If the Software is an upgrade or update to a previous version, you must possess a valid license to such previous version in order to use such upgrade or update. After you install such update or upgrade, you may continue to use any such previous version in accordance with its end-user license agreement only if (a) the upgrade or update and all previous versions are installed on the same Computer, (b) the previous versions or copies thereof are not transferred to another party or device unless all copies of the update or upgrade are also transferred to such party or device.

 

6. LIMITATION OF LIABILITY.

THE OWNER WILL NOT BE LIABLE TO YOU FOR ANY LOSS, DAMAGES, CLAIMS OR COSTS WHATSOEVER INCLUDING ANY CONSEQUENTIAL, INDIRECT OR INCIDENTAL DAMAGES, ANY LOST PROFITS OR LOST SAVINGS, ANY DAMAGES RESULTING FROM BUSINESS INTERRUPTION, PERSONAL INJURY OR FAILURE TO MEET ANY DUTY OF CARE, OR CLAIMS BY A THIRD PARTY, DAMAGES, CLAIMS OR COSTS. 

 

7. Internet Connectivity.

Automatic Connections to the Internet. The Software may cause your Computer to automatically connect to the Internet to verify if a new update is available to the IT-ASSET-TOOL.COM website, to verify your current Subscription state to the IT-ASSET-TOOL.COM or to send anonymous usage statistics or filter.

 

8. Privacy

The use of IT Asset Tool implies your agreement of the policies present at the following url:

https://www.it-asset-tool.com/index.php?option=com_content&view=article&id=166

 

9. Icons

https://icons8.com/

 

IT Asset Tool is available in two Edition, below is a list that lists their respective functionalities:

 

Functionality description

Basic
Free

Enterprise
94,00€

  Unlimited number of asset managed
  Software inventory 
  Hardware inventory  
  Admin Auditing  
  Analysis of Security Component  
  Depth analysis of system processes
  Analysis of changes to the software installed on your network  
  Support for SQL Lite database
  Support for Microsoft SQL Server 
  Software License Compliance Audit 
  Agent Less support and integration with Microsoft Active directory. 
  Alerting System Automatized 
  Integrated Syslog Server  
 TrySubscribe Now!

 

    

 

 

 

IT Asset Tool has two ways to capture host data from your LAN:

  • Client / Server
  • Agent Less

 

Client / Server

The first method has no special requirements and can also be adopted in small workgroup Enviroments where no Windows domain exists. This acquisition mode needs to have the IT Asset Tool client run on each host, which when properly configured sends data to the server for processing.

 

Agent Less

This mode is suitable for use on medium / large Enviroments. IT Asset Tool Server is able to analyze the entire Windows domain network without any installed Agent of the various hosts to process them independently.

 

ModeEnviromentRequirementsDatabaseAvailable in the Edition
Client / Server

Small Company

Domain/ Workgroup

.Net Framework 

SQLITE (integrated)

or

Microsoft SQL

Basic

&

Enterprise

Agent Less

Enterprise Company

Windows Domain 

.Net Framework 

Windows Domain Environment

Microsoft SQL

Microsoft SQLEnterprise

 

 

 

 

In the next Release new features and improvements will be implemented. Find out below and stay updated by signing up for our Newsletter or follow us on facebook !!

  • Monitoring of Windows Services
  • Enable / Disable Assets
  • Automatic Detection Microsoft Office Versions
  • Antivirus Endpoint Detection
  • Windows Firewall Status Detection
  • Print Asset Summary
  • New "Open Source / Freeware" License Type
  • New reporting for asset analysis without software installed

Subcategories

The section site "Features" collect all peculiarity of IT Asset Tool highlight the improvement.

Go to top