Skip to main content
Version: 8.5.X

Asset Management

What are the key differences of Credential-Less and Credential-Based discovery?

A: The key differences include:

Credential-less DiscoveryCredential-based Discovery
Operates without authenticating into devices. It uses network-based scans (e.g., port scanning using Nmap and Npcap protocol and protocol analysis) to gather information.Requires valid credentials to log into devices, enabling deeper access to configurations, installed software, and other details.
Provides basic device information such as IP addresses, MAC Address, OS Name, and Device Type.Offers detailed insights into hardware and software inventories, OS details, configurations, and more.
Easier to set up as no credentials or account configurations are requiredRequires configuration and management of credentials.
This is used when:
  • Mapping unknown networks or identifying unmanaged devices where credentials are not available.
  • Preliminary scanning to quickly populate basic device inventories in environments with minimal initial configuration.
This is used when:
  • Gathering detailed hardware and software inventories, such as OS versions and installed applications, to enhance discovery accuracy.
  • Populating the CMDB with comprehensive and reliable inventory data for devices, ensuring robust IT asset management.
How can I view asset relationships?

A: You can view the relationships from the Asset Details > Relationships tab. Here, you can create and view the Relationships visually. Also, using the ‘View Relationships’ button you can view the list of relationships with the asset.

What methods are used to discover assets?

A: There are two methods used to discover assets:

  • Using Poller Service
  • Using Discovery Service For more details, refer to the page Asset Discovery.
Can I add multiple assets?

A: Yes, using import feature you can add multiple assets at once. For more details, refer to the Import Assets section.

Are automations applicable for Asset Movement and Asset Management? How?

A: Yes. Using workflows automations can be applied to certain Asset Movement and Asset Management operations.

How can I track the assets in movement?

A: Using the geolocation feature you can track the assets in movement.

How can I add custom fields for assets?

A: You can add custom fields by navigating to the Technician Portal > Admin > Asset Management > Asset Custom Fields page, selecting the desired custom field, dragging and dropping it on the form to the right-hand side, filling in the details, and clicking Add. The next time when you add an asset, this field will appear in the form.

How can I control the accessibility of USB devices?

A: You can control the accessibility by creating configurations that block or unblock the USB port of assets for users. For more details, refer to Asset Configuration.

How can I associate assets to users or tickets?

A: You can associate users by defining the ‘Used By’ field in the Other Info section of the Asset Details page. Also, tickets can be associated from the Linked Events > Request tab.

How can I get a list of my assets?

A: You can get a list of all your assets by doing export. For more details, refer to the Export Assets section.

Can I create password-protected files?

A: Yes, you can create password-protected file while downloading and exporting the assets list in Excel format.

How can I exclude the RDP agent from being blocked by Bitdefender Antivirus?

A: Yes, you can exclude the RDP Agent from scanning in the Bitdefender Antivirus. For more details, refer to the document How to Exclude Serviceops Agent from Bitdefender Antivirus Scan