Updated in 2022.1
You configure a Network Folder Audit Source when you create a new Site, or create or modify an Audit Source within an existing Site. Before configuring a Network Folder Audit Source, make sure you have configured a proper Audit Profile.
To create a Network Folder Audit Source:
In the Sidebar, right-click the Site where you want to create the source and select Properties from the pop-up menu. The Site [Site Name ] window opens.
Under Audit Sources, click New > Network Folder.
Fill out the source details in the Network Folder Audit Source [Source Name] window.
NOTE: In case a Network Folder Audit Source is configured successfully, it is represented by the network folder icon . If the Automation Server cannot access the source (for example, when the shared folder is unavailable), the red flag icon appears.
To edit the properties of an existing Network Folder Audit Source:
In the Sidebar, right-click the desired Site and then choose Properties from the pop-up menu. The Site [Site Name ] window opens.
Under Audit Sources, double-click the desired network folder audit source.
Modify the source as needed in the Network Folder Audit Source [Source Name] window.
This tab allows you to review and modify basic properties of a Network Folder Audit Source.
Site Tag - displays the tag of the Site to which the Audit Source belongs. This field can not be modified.
Name - shows the name of the source.
Under Deployment you define the folders to deploy Inventory Analyzer package and specify permissions for accessing these folders.
Shared Folder -displays the path to the shared folder designated for the source. The Inventory Analyzer executable and configuration files are located in this folder.
Audit Data Folder (automatically created)- displays the Intermediary Repository folder where the audit snapshots produced by the Inventory Analyzer are stored. This folder, named AuditData, is a subfolder of the Shared Folder. When you check for new audits, Network Inventory uploads the audit snapshots from this folder to the database.
Log Folder (automatically created)-displays the folder where log files of Inventory Analyzer are stored. This folder, named Log, is a subfolder of the Shared Folder.
Location - click this button to define the location of the Shared Folder. Use the Shared Folder Location window to choose another folder.
Folder Permissions - click this button to define the access permissions on the Shared Folder in the Folder Permissions window.
Audit Profile - allows you to specify the desired Audit Profile. You can choose the audit profile either in the drop-down list or in the Select Audit Profile window that opens on clicking the ellipsis button . To edit the audit profile, click the ellipsis button , select the desired audit profile from the list, click Edit, modify the profile as needed, and click OK. To create a new audit profile, click the ellipsis button , click New, define the profile, and click OK.
Interactive Mode - in this mode, the Inventory Analyzer displays a start screen prompting the user to confirm the audit and optionally enter some additional information about the user and/or their computer.
Silent Mode - in this mode, the audit starts automatically without requiring any input from the user.
Interactive Once - this mode is a combination of Interactive and Silent modes. The audit runs interactively only for the first time. Information collected during this interactive session is saved for subsequent audits that will run silently.
NOTE: If you modify the audit configuration but leave the audit mode at Interactive Once, the very next audit will run interactively again.
Run Interval - The Network Folder Audit runs as you automate it (see Automating Network Folder Audit). You can reduce the frequency of the audit by specifying the interval in the Run Interval field.
Use separate run interval for software and file scan (optional) - when clear, Network Inventory scans computers’ hard drives each time the Network Folder Audit runs. When the check box is selected, you can set a separate run interval for scanning computers’ hard drives.
NOTE: Separate scheduling for the file scan is available if only the current Audit Profile has the File Scan option enabled or its Software Discovery option is set to Discover installed software and recognize software in files. For details, see Software Discovery, File Scan.
This tab allows you to choose the options for performing the audit, scanning the designated shared folder and updating deployment packages.
Audit Delay - specify the time interval in minutes, to delay starting the audit process, when some resource-intensive logon tasks needs to be finished.
Upload Interval - define the time interval to auto-check the shared folder for new audit snapshots.
Update Deployment Packages - enables you to update Inventory Analyzer package manually by clicking the Deploy Now button.
This window allows you to either type in the path for the shared folder (in UNC format) where the executable and configuration files of the Inventory Analyzer package resides, or click Browse and select it from the list.
The Share button allows creating a network share for a local folder. If the path entered in the Folder location field is a local path (i.e. not a UNC path) the Share button becomes available. Click Share to share the folder in the Shared Folder window.
This window allows you to enter a name for the folder you want to share.
This window allows you to set access permissions for the shared folder and its subfolders by choosing one of the options:
Set minimum necessary permissions - creates the most secure environment for the shared folder and audit snapshot files stored there by enabling only those permissions that are absolutely necessary for the Inventory Analyzer and Network Inventory to operate. Click here to view the detailed description of these minimum access permissions.
Permission Shared Folder (and all files in it) Audit Data Folder (and all files in it) Log Folder (and all files in it) Automation Server account Everyone Everyone Everyone
Traverse Folder/Execute File
List Folder/Read Data
Read Extended Attributes
Create Files/Write Data
Create Folders/Append Data
Write Extended Attributes
Delete Subfolders and Files
Set maximum permissions - enables full access permissions to everyone. This setting provides the least secure configuration. Any user on the network is allowed to access these folders and perform whatever actions they want. For this reason, it's recommended that you apply the minimum necessary permissions.