Network Inventory allows you to audit individual nodes using the following methods:
Audit a remote computer or network device chosen by its name or IP address. For details, see Auditing a network node selected by its name or IP address.
Audit any discovered or audited network node. For details, see Auditing a single network node.
Before auditing a computer, make sure that the default Audit Profile is set properly.
To choose appropriate methods for auditing a computer, Network Inventory identifies the type of computer's operating system (Windows, Mac, or Linux) before the audit. If the computer is already discovered or audited and its operating system is known to Network Inventory (either identified automatically during the discovery or manually defined), Network Inventory uses this known type of operating system and doesn't perform the identification of operating system again.
You can also audit any discovered Chromebook or network device. Auditing a Chromebook or network devices is renewing its inventory data. For details, see Auditing a single network node.
To audit a computer or network device selected by its name or IP address:
Select Audit > Audit by Name/IP from the main menu to launch the Audit by Name/IP Wizard and follow its steps.
During the audit of an individual node Network Inventory uses the node's audit credentials. Make sure you have specified the appropriate credentials before you start the audit. You select the node's audit credentials in the Node Properties [Node Name] window that opens when you right-click a node in the grid and select Properties from the pop-up menu.
The audit will be performed by the Automation Server. For detailed information about managing Automation Server, see Configuring the Automation Server.
To audit a single discovered or audited node:
Right-click the node in a grid and select Audit Now from the context menu. The corresponding audit task will be added to the Task List so that you can monitor its progress.
NOTE: In case you audit a node from within a Collection, the discovery/audit of the node can be presented in several tasks, for details, see Working with Collections.