Total network inventory inventory and PC accounting. Automated network audit

Inventory of computer equipment

For every company, there comes a time when everything related to the IT infrastructure needs to be put in order.

This applies to activities such as relocation, inventory of computer equipment, maintenance planning of the service cloud and its components, software, planning of orders and purchases.

It is at such moments that many companies think about such a service as an inventory of office equipment.

What is an IT Infrastructure Inventory?

It is important to understand that the task of inventory is primarily to assess the condition and composition of IT assets. Most often, representatives of medium or large businesses turn to us for such a service, since they have a sufficient number of jobs and various network facilities.

Accounting of computers in the network is most often carried out for two reasons. The first of them is the modernization of computer equipment, software and the entire IT area in the company.

The second reason is the renewal of the composition of staff members who work in the field of information technology.

What is included in the inventory?

These are servers, peripheral equipment, personal workstations (computer equipment) of employees, ventilation systems, server cooling, power supply components for user workstations and central nodes. In addition, software (application, server, special and general) can be subjected to such activities.

All activities of the data system are carried out together with the staff of the client, as it is necessary to provide authorized access to information repositories, to obtain all necessary permits and permits.

IT verification is carried out on the basis of the terms of reference provided by the customer.

Such documents contain information about what goals the inventory of IT equipment sets for itself, the relevance of the system is checked, and its cost is analyzed.

Also, when inventorying workplaces and equipment, a specific methodology is selected that will ensure the completeness of the results of the inventory.

Identifiers for inventory of IT equipment - it's easy and simple

There are special identifiers, each of which is a unique program. With it, you can quickly and efficiently carry out such a procedure as an inventory of computer equipment.

For a small company that has only a few computers and one server, Excel is used for such purposes.

But in the future, even for a small company, this option becomes inconvenient, because it is not known how to determine where and at what point in time this or that equipment is located.

That is why we need a specialized program for inventory, accounting of computers and network equipment. Just such a program is Total Network Inventory 3.

This program is useful in that it allows you to perform inventory of hardware, software, computer equipment and other tools, including individual workstations and entire servers.

In addition, such popular tasks as network scanning, scheduler, change log, reports, and much more can be included in the standard features of the platform.

Switching to TNI 3 is also worth it because the program makes it possible to create the most complete database of all users who work with all workstations in the enterprise.

In addition, here you can store passwords and protocols, monitor the status of the equipment of any of the workplaces online.

Additionally, the user can get a significant number of benefits and useful functions, thanks to which the management of the entire IT system becomes as convenient and simple as possible, without requiring much effort and cost.

Earn money withTNI 3

It is important to understand that the product makes it possible to obtain the maximum possible set of tools for conducting a full inventory of computers of company employees.

We can also offer IT inventory software that will provide you with the easiest and most affordable option for doing this work.

To get more detailed information about such products, just contact our employees and ask them how they work with such software.

It Invent is a hardware inventory software that can quickly and easily deal with any problem that users or employees of your organization may have. This is software that allows you to carry out activities such as inventorying server hardware or other types of tools.

The program can be used by administrators, general users, business owners, department heads and other people who may have access to the entire system or its individual components.

What are the main functions of the program? First of all, this is accounting for equipment, including components and inventory, it can also be scanning computers on the network, accounting for repairs and orders from suppliers, created labels with bar codes and other mandatory attributes. Also, to create an inventory number and a label on which it will be written, you need to use ITAM software, with which IT asset management becomes a simple and affordable action that does not require significant costs from the employer.

In addition to the fact that it makes it possible to take into account such a type of activities as an inventory of IT equipment over the network, it provides:

  • conducting a qualitative analysis of the entire IT system;
  • control of licensed products;
  • taking measures to implement the financial report;
  • creation of labels to provide an effective record of the work carried out, which includes such an operation.

All of the above is the main base, thanks to which the system administrator or any employee of the IT department will be able to control the equipment, license compliance and other important parameters responsible for running a business and successfully building an infrastructure. More information can be found on the phone numbers listed on the website.

Source: https://helpit.me/articles/inventarizacia-komputernoi-tehniki

In pursuance of the order of the Ministry of Fuel and Energy of Russia dated November 9, 1999 N 380, in order to improve the organization of work on servicing the local area network, computer equipment and office equipment in the Ministry, as well as the organization of accounting for the technical means of the local area network, computer equipment and office equipment

I order:

1. Create a commission for the inventory of technical means of a local area network, computer equipment and office equipment and the following composition:

Yanovsky L.B. Secretary of State - Deputy Minister (Chairman)
Bondarenko Yu.M. Head of the Department of Affairs (Deputy Chairman)
Tsurkan V.M. Deputy Head of the Economic Department
Vorobieva T.B. Deputy Head of the Budget and Finance Department
Zhuravleva N.E. Deputy Head of Accounting and Reporting Department
Sizov I.V. Chief Accountant of the Economic Department
Kazakov A.I. Head of the Department of Special Administration
Parshutina O.V. Chief Specialist of the Legal Department
Ivanov V.V. Deputy Director of SE "CDU TEK"
Balantsev A.A. Chief Specialist SE "CDU TEK"
Kurkin N.N. Head of the Dispatch Service of Information Systems and Maintenance of Computer Equipment of the State Enterprise "CDU TEK"

2. Heads of structural subdivisions of the Ministry:

2.1. Within two days, by your orders, appoint persons responsible in structural divisions for accounting and the technical condition of computer equipment and office equipment. Copies of orders to transfer to the commission (Bondarenko Yu.M.);

To oblige responsible persons in subdivisions for the accounting and technical condition of computer equipment and office equipment before November 1, 2000 to conduct an inventory of all computer equipment and office equipment located in subdivisions. Submit the results of the inventory to the commission (Bondarenko Yu.M.): in the form according to the appendix in printed form, in in electronic format on diskette or by e-mail to: [email protected]

3. Before November 1, 2000, the Commission shall conduct an inventory of the technical means of the local computer network. Present the results of the inventory in the form according to the application.

4. Economic management (Astashkin A.V.

) before November 20, 2000, reconcile the data obtained during the inventory process with the database of material and technical means registered in the accounting department of the Economic Department of the Ministry, and submit the reconciliation results to the commission (Yu. M. Bondarenko).

5.1. Carry out marking of all computer equipment and office equipment in accordance with the inventory data;

5.2. Prepare a list of technical means of a local area network, computer equipment and office equipment transferred for maintenance to the State Enterprise “CDU TEK”, and submit it for approval to the leadership of the Ministry;

5.3. To carry out an inventory of all existing contracts of the Ministry of Energy of Russia for service maintenance and prepare proposals on the advisability of their further prolongation.

6. Economic management (Astashkin A.V.):

6.1. By December 31, 2000, conclude an agreement with SE "CDU TEK" for service maintenance in 2001 of technical means of a local area network, computer equipment and office equipment in accordance with the approved list;

6.2. By December 20, 2000, jointly with SE “CDU TEK”, to develop organizational and technical proposals to reduce the Ministry's costs for consumables for the operation of computer equipment and office equipment in 2001;

6.3. By December 1, 2000, submit to the State Enterprise "CDU TEK" the actual layout of the departments and offices in the building of the Ministry at the address: Kitaygorodsky proezd, 7, as well as a plan for the long-term placement of the Ministry's divisions;

6.4. At least one month in advance, submit to the State Enterprise "CDU TEK" (Gordeeva O.G.) information on the movement of the structural divisions of the Ministry in the building with an attachment to the plan of jobs.

7. State Enterprise “CDU TEK” (Gordeev O.G.) until January 1, 2001 to conclude agreements with third parties for the maintenance of computer equipment and office equipment in 2001.

8. To impose control over the execution of this order on the Secretary of State - Deputy Minister Yanovsky A.B.

Minister
A.S. Gavrin

Application. Form for presenting the results of the inventory of technical means of a local area network, computer equipment and office equipment

Name of department (department)

List of equipment codes(column 6)

Instructions for filling the farm.

When entering the inventory results in column 6, the equipment code from the code table is entered.

If the equipment is not in the list, then code 16 (other equipment) is assigned to it, and the name of the equipment is entered in column 12 (Note) of the form.

Columns 1, 2, 3, 4, 5, 6, 10 and 11 are mandatory for each piece of equipment.

The electronic form of the application (the form for filling in the results of the inventory) is located on the file server of the Ministry Z:\COMMON\INVENTORY\inv_form.хls.

The electronic application form can be obtained on a diskette in room N 4020. All answers to questions about filling out the form can be obtained by calling 220-58-22, 220-59-17, 220 59-46.

Copies of signed documents must be transmitted electronically on a diskette or by e-mail to: [email protected]

The text of the document is verified by:
official distribution

Source: http://docs.cntd.ru/document/901775403

Overview of Total Network Inventory - utilities for automatic inventory of a fleet of computers

With the growth of the computer fleet in organizations, the danger of forgetting which peripheral device is inside a particular workstation, or even losing one of them, increases.

The loss may be due to the negligence of an employee of the technical support department or through the malicious intent of an employee who decided to improve the speed of his home computer at the expense of the company.

There are several ways for the technical service manager or system administrator to prevent this kind of incident. For example, you can seal the cases of system units and regularly inspect the integrity of the seals.

You can make an inventory of components every morning (or evening). It may also be effective to install means of visual observation. All of these methods have their pros and cons.

The main disadvantage of these tools is their increased labor intensity, as well as a very serious costly part (visual observation tools, seals, increased working time for control). There are no such disadvantages for another accounting option - software.

The Total Network Inventory system from Softinventive allows you to keep a complete inventory of the software installed on your computer, as well as control the hardware of computers in offices, small and large corporate local networks.

Without leaving his seat, the administrator can scan the network and get comprehensive information about each computer. No pre-installed modules are required - they are installed automatically. The program allows you to scan the network both in real time (immediately) and, using a script, at the moment the client connects to the domain.

Appearance of the program

Total Network Inventory has both a mandatory wizard in our time, which gives the user a very impressive result with a minimum of brain strain, and a manual scan mode that allows the user to configure all the parameters on their own.

The capabilities of the scanner are impressive. Scanning is based on three types of information: hardware, installed software, and real-time system information (processes running in the system, services, shared resources, environment variables).

The appearance of the program resembles “Explorer”, clearly displaying the local network tree in the left panel, broken down into groups. The name of the group corresponds to the position of the workstation in the network hierarchy or is selected manually by the user.

When a computer is selected, information about it is displayed in the central part of the main program window. Detailing about a particular subsystem is selected based on the marked category in the corresponding panel displayed on the right.

The interface of the program is scalable and can be easily customized to your taste.

A large number of visual themes, customizable panels, tools, as well as saturation with keyboard shortcuts will allow even the most fastidious user to adapt the program interface for themselves.

When the program is launched for the first time, the user will be offered options for further work: launching the network scan wizard, scanning the current computer, or opening the main window and further work. The main mode of operation for the system administrator will most likely be the work in the main window. However, in order not to manually enter computers, you can use the Network Scan Wizard in the first step.

Network Scan Wizard

The wizard offers two options for working: online scanning and logon script. Each option is accompanied detailed description, indicating which permissions and security policies should be enabled. Which path to choose depends on the specific situation.

When scanning computers using a logon script, the administrator can add the scanner program call string to the domain logon script, allowing collecting information about each computer that connects to the domain using this script (when the WMI service is installed and running). The wizard allows you to select a shared folder where the scanner program files are placed and a folder for saving the scan results. Further, by modifying the logon script, the administrator can only wait for users to start connecting to the domain and from time to time control the information obtained using the program.

Online scanning has more steps to achieve the result. This type of scan includes two options for finding computers: “Network Neighborhood” and “IP Address Range”. In the first case, the program looks through the tree of computers visible through the network environment. This option allows an administrator to see the structure of their Microsoft Windows network (workgroups, domains) and visually select hosts to scan. If the network environment is displayed slowly, or the administrator has several subnets to scan, or there is no NetBIOS connection to them, you should select the second path - “IP address range”. This path will allow you to specify one or more address ranges that will be scanned. In each of the options, you need to specify a username with the appropriate privileges (having the rights to work with administrative resources).

Two options for searching computers - “IP Address Range” and “Network Neighborhood”

The result of the wizard will be a list of groups, domains, nodes, as well as detailed information about them.

Additionally, an account card is created for each computer, which contains information about the owner and the computer:

  • computer name;
  • inventory number;
  • registered user;
  • computer cost;
  • Name of the organization;
  • date of payment and installation;
  • workgroup or computer domain;
  • IP address;
  • personal data;
  • additional information fields.

The program can automatically generate inventory numbers for any newly found computer, and also allows you to create additional information fields containing information about the peripherals connected to the computer (for example, an uninterruptible power supply, a scanner, a camera).

The completeness of the information collected by Total Network Inventory allows you to monitor any hardware or software component of the system, tracking any changes and responding to them in a timely manner. For efficient work with data, the program provides a category panel, duplicated by buttons on the toolbar. The user, choosing a category, receives comprehensive information about it. For example, if you select the “processor” subcategory from the “hardware” category, the program will display everything about the processor, starting from its name and ending with the core voltage and the frequency of the L2 cache.

To organize all this ocean of information, the system provides a report builder. Using the "Reports" menu or by clicking the corresponding button on the toolbar, the user gets access to the tools associated with reports.

The builder is able to summarize data in a convenient form based on user-selected criteria. The selection criteria in the program are conditionally divided into four main groups: general information, equipment, programs, and others.

When switching to the reporting mode, the administrator has access to reporting tools, as well as multiple selection of criteria in the corresponding panel.

Thanks to this, the operator of the Total Network Inventory program has many opportunities to control the current situation with the technical and software base of an office or corporate network.

Depending on the realities of a particular company, the program provides an opportunity to use either pre-installed report schemes, or create your own, which most fully displays the required picture with equipment. The “Reports” menu contains schemes for displaying reports.

They (reports) are divided into two groups: complete and brief. For example, a report on the criterion “Computer and mat. payment” takes up a page in its entirety and contains detailed information.

This is information about the system unit, motherboard (manufacturer, name, serial number, version), BIOS information (name, manufacturer, release date, SMBIOS version). In short form, this report takes up a third of the page and summarizes the same information, but without specifying dates, serial numbers, and so on.

The builder allows you to generate reports both for the entire network and for computers or groups selected in the Network Overview panel.

You can include any number of computers and categories in the report in any combination, that is, select several computers from different networks or groups, combining this with any combination of information categories.

And finally, the program settings.

Depending on the network security settings, as well as the network configuration, the program allows you to configure options for connecting to remote stations.

This can either be using named administrative pipes over the SMB protocol, or connecting to the WMI service over the RPC protocol, or a combination of the two.

The settings also allow the administrator to take into account the presence or absence of a DNS server on the network and determine whether to allow IP addresses during scanning or not.

Many other settings allow you to very flexibly manage certain program parameters, depending on the current need of the administrator or the configuration of the local network.

So, in the matter of remote monitoring, ordering and saving information about the technical and software component of the organization's computer park, this product has been very successful. It has a reasonable price, good performance, an excellent processor of the collected information, as well as all the necessary tools for working in networks of varying complexity. We are confident that Total Network Inventory will save a lot of effort and nerves to the system administrator. View the cost and terms of purchase

Source: https://www.ixbt.com/soft/total-network-inventory.shtml

Order of Regular Software Inventory 20 No.

I ORDER:

  • Appoint responsible for conducting regular inventory [person responsible for accounting and storage of the SBPPO].
  • Conduct an inventory every year [June] and [December] according to the regulation "Instruction on the procedure for conducting a software inventory", using the approved reporting forms:
    • "Software Register";
    • "Register of accompanying documentation and related software assets";
    • Computer Inventory Card.
  • I reserve control over the implementation of this order.

Application: for 3 liters.

Director of the educational institution ___________________ Acting Surname

APPROVED

by order

dated "__" ____ 20__ No. ___

INSTRUCTIONS

according to the procedure for conducting a software inventory

  • Software inventory (SW) is carried out on all computers, without exception, that are on the balance sheet. Personal computers of teachers are not subject to inventory.
  • All instances of the software, without exception, are subject to inventory, including both those installed by standard means and visible in the "Add or Remove Programs" section of the Windows Control Panel, and copies of distribution kits and working copies of programs located on all, without exception, rewritable media connected to the computer, including hard drives, memory cards permanently used with this computer, optical rewritable discs, etc.
  • For each computer, an electronic inventory card (hereinafter - "EC") is compiled in the form " Computer inventory card».
  • In the process and results of the inventory, the software found must be clearly classified according to the following six characteristics of the “accounting unit”:
    • Manufacturer (example:Microsoft)
    • Name (example:office)
    • Package (example:professional)
    • Version (example: 2007)
    • Language (example: Russian)
    • Platform (example: forwindows)
  • If the found software can be unambiguously identified as a component of the SBPSS, a corresponding note should be made.

    In addition to the executable software and its components, the following are also subject to calculation:

    • Fonts;
    • Sound, graphics and video files that are subject to copyright.
  • At the end of the software inventory, based on the completed ECs, a summary table is compiled in the form “ Software registry» indicating the total number of software copies for each accounting unit.

    The following assets are subject to a separate recheck and inventory:

    • Documents for the purchase of software;
    • carriers;
    • Package;
    • User manuals;
    • Accompanying materials.
  • The results of the inventory of assets are entered into the register in the form " Register of accompanying documentation and related software assets».

    The results of the inventory of assets are verified against the following materials:

    • Latest previous asset inventory results;
    • Journals of issuance of SBPPO;
    • Acquisition and retirement records for the period between this date and the previous inventory date.
  • If discrepancies and / or loss of documentation and / or other assets are found during the reconciliation, a memorandum is drawn up addressed to the director listing the shortcomings, their causes, planned and taken measures to eliminate them.

    If, during the inventory process, any assets are found outside the specialized vault and it is found that these assets were not issued to perform any work in strict accordance with the issuance regulations, the assets must be immediately placed in the vault, and a memorandum must be drawn up in the name of the director. a note listing the shortcomings, their causes, planned and taken measures to eliminate them.

    Information about licenses that are legally available and/or disposed of is entered into the software registry .

    The number of actual copies of the software and licenses for it is compared, discrepancies are indicated in a special column of the table. ATTENTION! The SBPPO package does not limit the number of installations.

    Opposite SBPPO in the software registry should indicate "the number is not limited by license."

    Information from the EC and the software register is verified with the SBPPO installation accounting cards included in the SBPPO kit.

    If discrepancies are found during the reconciliation process, a memorandum is drawn up addressed to the director listing the shortcomings, their causes, planned and taken measures to eliminate them.

  • Based on the results of the inventory, the director is presented with a report (report) on the inventory in free form with the signatures of the persons who carried out the inventory, with the appendix:

    • Software Registry;
    • Register of accompanying documentation and related software assets;
    • If deficiencies are found - relevant memorandums.

STEP-BY-STEP INSTRUCTIONS FOR INVENTORY OF SOFTWARE IN AN EDUCATIONAL INSTITUTION

Stage 1: Gathering the necessary initial information

This phase is preparatory in nature, during its implementation it is necessary to collect the information required for the implementation of license management in the organization.

The information includes answers to the following questions:

  • the number of servers in your local network;
  • the number of PCs in the organization, how many of them are networked, how many are standalone;
  • determine the software installed on computers (in general terms: Windows, office, office composition, special programs according to the profile of your organization ...);
  • who is responsible for acquiring and operating the installed software.

The implementation of all stages of license management technology will require a certain amount of time and effort not only on the part of the staff of the information technology department, management, but also on the part of ordinary employees.

Understanding the need for this work by all employees of the educational institution can significantly reduce the time for the implementation of license management technology in the organization.

Once all the necessary data has been collected, you can proceed to step 2.

Stage 2: Conducting an inventory of installed software

Conducting a software inventory is the second step in the license management process.

There are two ways to inventory software:

Manual inventory

The user can conduct an inventory manually by viewing the hard drives of all computers and capturing all the information in a video report. One easy way is to use the Add or RemovePrograms option.

Automatic inventory

Special programs can be used to automatically inventory software on computers and servers of the OS. The product catalog for software inventory and license management contains a complete list of all types of programs.

In addition, you can use the Microsoft Software Inventory Analyzer (MSIA) program to identify all major installed Microsoft products. These automated tools greatly simplify the inventory process.

Using MSIA or the Software Inventory and License Management Product Catalog tool, you can perform software inventory for both stand-alone and LAN-connected computers.

When analyzing stand-alone computers, you need to install the appropriate programs on each of them. Most software inventory programs automatically generate inventory reports.

Computer technology is used today in every enterprise. Like other fixed assets, it is subject to inventory. This procedure is unique. The procedure for conducting an inventory of property is regulated by: Law on Accounting No. 402-FZ of 06.12.2011, Guidelines, approved. Order of the Ministry of Finance No. 49 dated 06/13/1995, Regulation on accounting, approved. Order of the Ministry of Finance No. 34n dated 07/29/1998. Let us consider in detail in the article how the inventory of computers takes place, what the inspectors need to know about this type of accounting.

Basic Inventory Concepts

Checking the availability of computer equipment involves an inventory and related components. The main objects of the inventory are presented in the table.

The inventory of computer equipment has the following objectives:

  • Property safety control;
  • Determining the correspondence of actual availability to accounting data;
  • Optimization of expenses for the purchase of computers;
  • Identification of unused objects;
  • Formation of a list for write-off;
  • Control of changes in the value of property;
  • Maintaining the discipline of persons responsible for the technique.

Inventory of computers over the network

Currently, there are a large number of special programs that allow you to quickly perform an inventory of computer equipment. To carry out an inventory in an automated way, it is necessary that all the company's equipment is connected to a single network. The order of further actions is given in the table.

The use of an automated program has several advantages:

  • Ability to use template or self-developed reporting forms;
  • Checking in the background;
  • Saving time;
  • No need to interrupt employees from performing their duties;
  • One hundred percent accuracy of the received data.

The entire amount of data on computer hardware and software products is subjected to verification.

A feature of a specialized program for inventory is that you can schedule a scan according to a specific schedule. According to the specified scheme, the program will view network data and present final reports. This allows you to find out at the right time what condition the computer equipment of the company is in.

Computer inventory accounting

The shortage of computers is written off at the residual value to the 94th shortage account. If the culprit is identified, then he must pay damages. Its value is determined by the value of the property on the balance sheet. If the guilty person is not found or the court refused to collect funds from him, then the shortage is written off to the financial result. Similarly, take into account the loss from force majeure.

The surplus is taken into account at market value. It is determined by the price of a similar object, confirmed in writing, for example, by the manufacturer or according to the opinion of expert appraisers. The cost must be documented. The corresponding amount is charged to the financial result.

In the income statement, the surplus is shown under the item "Non-operating income".

Example. A computer worth 48,000 rubles on the balance sheet disappeared at Vympel LLC. The depreciation amount is 14,000 rubles. The investigating authorities did not establish the culprit and issued a corresponding decision. The object is subject to write-off to the financial result.

Dt 01.2 Ct 01 48 000 rub. - reflected the initial cost of the missing computer;

Dt 02 Ct 01.2 14 000 rub. - depreciation is taken into account;

Dt 94 Kt 01.2; Dt 91.2 Kt 94 34 000 rub. - shortage written off.

Timing of the audit

Computers are the main assets of the company. In accordance with the law, their planned inventory is carried out once every 3 years before filling out the final financial statements. Management can independently determine the timing and frequency of verification and reflect this in the accounting policy.

Conducting an inventory is mandatory for the following reasons:

  • Change of responsible employees;
  • Identification of cases of theft and damage to property;
  • Liquidation of the company or its reorganization;
  • Emergencies and natural disasters;
  • In other cases prescribed by law ( p. 1.5, 1.6 of the Recommendations, approved. Order No. 49).

The procedure for conducting computer accounting

Before starting inventory activities, it is necessary to carry out preparatory measures. To simplify the procedure, a label should be attached to each object. It displays the following information:

  • Company name;
  • Name of the object according to accounting data;
  • Inventory number;
  • Responsible officer.

The order of the inventory is reflected in the table:

No. p / p Stage Actions
1 PreparatoryAppointment of a commission, drawing up an inspection plan, issuing an order, printing inventory records
2 ExaminationInspection of objects by divisions of the organization in the context of financially responsible persons, filling out inventories
3 Registration of discrepanciesDocumentation of surpluses or shortages (memorandums, inventories) indicating the reasons for discrepancies
4 Registration of resultsDrawing up an act
5 Data mappingReconciliation of received data with accounting

The order can be drawn up in the INV-22 form or in any form. The document indicates the reason for the inspection, the composition of the commission, the start and end dates, what property is being inventoried. The data during the inspection are recorded in the inventory records (, for intangible assets).

The information in them is grouped by responsible employees and structural units. They contain accounting information about the nomenclature, quantity and inventory numbers of objects to be checked. During the inspection of the equipment, the commission enters into the inventory similar data on the fact.

If faulty equipment or its absence is detected, a report is drawn up addressed to the director. Names, numbers of equipment lost or unsuitable for further use are recorded in it. The reasons for the identified defects are also indicated here, the signature of the employee and members of the commission responsible for the safety of valuables is put. The identified surpluses are processed in the same way.

Based on these inventories, the commission draws up an act on the results of control. The final stage is the reconciliation of the received information with accounting data. Necessary adjustments are made, the perpetrators are punished, etc.

Example. In October 2016, during the inventory at Udacha LLC, it turned out that a computer purchased in July last year was in operation. He was not taken into account. The cost of the object is 50,150 rubles, including VAT - 7,650 rubles.

The computer must be registered and depreciated for the entire period of its operation. The service life is defined as 30 months. Depreciation is calculated using the straight-line method.

1 / 30 * 100 \u003d 3.33% - depreciation rate;

(50,150 - 7,650) * 3.33% = 1,415.25 rubles. - amount of depreciation per month.

In October 2016, the accountant made the following entries:

Dt 08 Kt 60 50 150 rub. - the computer is taken into account;

Dt 19.1 Ct 60 7 650 rub. - VAT on the purchased object is taken into account;

Dt 01 Ct 08 50 150 RUB - the computer is included in fixed assets;

Dt 91.2 Kt 02 7 076.25 rub. - reflected depreciation for 2015 (1,415.25 * 5);

Dt 26 Ct 02 RUB 14,152.50 - the amount of depreciation for the current year at the time of detection of the error was taken into account (1,415.25 * 10).

Automated Inventory Program

With an automated inventory method, barcode labels are printed for each object from the computer credential database. Subsequently, they are glued to the appropriate equipment. When coding in this way, the 1C program “Accounting for equipment” is used for inventory. On the Internet, you can download its demo version and watch the presentation.

Checking computers by scanning barcodes is performed by the well-known Hardware Inspector program.

All specialized programs on the market have a similar workflow. For example, it's easy to download and use the Network Computer Inventory product. It allows you to detect outdated models, schedule equipment updates, select computers whose resource does not match the tasks performed on it, etc.

The IT Invent program has proven itself well. It supports network scanning and collects information on all network devices. With its help, you can carry out inventory accounting of network computers in all branches of the company.

The free version contains a limited set of functions, their full list is available in the commercial version of the product. Another program "10-Strike: Computer Inventory" is offered in several modifications. The organization can choose the most suitable one for its purposes.

Accounting entries for accounting for surpluses and shortages

To reflect the results of the inventory in accounting, the following typical operations are provided:

Surplus Accounting:

Dt 08.3 Ct 91.1 - income in the form of fixed assets was taken into account;

Dt 01 Kt 08 - the object is accepted for accounting at the market price.

Dt 91.1 Kt 99 - reflects the profit from the acceptance of an unaccounted object for accounting.

Deficiency accounting:

If the culprit is not found, the damage is reflected as follows:

Dt 94 Kt 01 - a shortage was detected;

Dt 02 Kt 01 - depreciation of the missing object is written off;

Dt 91.2 Kt 94 - the loss was charged to other expenses.

If the culprit is found, then the operations look like:

Dt 73 Kt 94 - the shortage is written off to the culprit;

Dt 50 Kt 73 - the employee repaid the debt;

Dt 70 Kt 73 - the debt is deducted from the employee's earnings.

Frequently Asked Questions and Answers

Question number 1. What is the maximum amount that can be withheld from the salary of the guilty employee to cover the shortage following the results of the inventory?

Monthly you can keep no more than 20% of earnings.

Question number 2. What consequences can threaten an organization if tax authorities discover unaccounted computers?

Such errors in accounting lead to distortion of financial statements. If it is equal to or greater than 10%, then the minimum fine will be 5 thousand rubles.

Question number 3. Is it possible to recover the identified shortage from a financially responsible employee who quit before the start of the inventory?

No. According to Art. 232 of the Labor Code of the Russian Federation, termination of an employment agreement with an employee does not relieve him of liability for a shortage. To prove that the damage was caused by the employee, it is necessary to conduct an inventory upon his dismissal. After a while, it is impossible to prove his guilt and to recover the shortage too.

Question number 4. How to take into account the shortage of equipment that arose due to a fire?

The loss at book value is attributed to the loss of the current year:

Dt 91.2 Kt 94 - damage from force majeure is written off.

Question number 5. Do I need to draw up an INV-1 form for computer equipment leased to other firms?

No need. The tenant must inspect such property. He sends one copy of the inventory with the results of the inventory to the lessor.

An inventory of computer equipment is necessary to account for the number of objects and determine the productivity of their use. With this procedure, the organization optimizes the cost of acquiring computers, components and software. Special programs allow you to conduct it without spending time and labor, to obtain accurate data.

The IT park of any organization often has more than a dozen systems of very different configurations. And there will always be a couple of freethinkers who want to dilute the authorities for an extraordinary upgrade or install software for personal purposes. Without a system of accounting and control, the administrator risks at least his premium. Consider solutions to simplify this task.

WMI and Powershell

In WinNT 4.0SP4, administrators received a new tool for centralized management and monitoring of various parts of the operating system - WMI (Windows Management Instrumentation, Toolkit for Windows controls). True, in the first versions of the embedded components there were few (only 15). But in subsequent Win2k+, their number increased along with the possibilities. Today, WMI is available for all versions of Windows, including Se7en. By querying various WMI classes on local and remote systems, we can get all the information we need about the company's software and hardware.

In the examples, I suggest not to use VBScript, JScript or other scripting languages, they are too cumbersome and inconvenient, especially since we already have a luxurious PowerShell that can do the lion's share of the work for us (read more about PS in ][ 09.2009 and 05.2010).
First, let's get a list of BIOS on slave computers:

PS> Get-WMIObject Win32_BIOS
-computerName synack.ru

As you understand, after "-computerName" the host name is indicated. Although this parameter can be omitted when polling the local system, which we will do in the future for brevity. By writing a simple script, it is easy to pass Get-WMIObject a list of systems from which information will be collected. The result, if necessary, is saved to a text file for further analysis.

Similarly, we poll the remaining parameters. For example, we request information about the CPU:

PS> Get-WMIObject Win32_Processor

A complete list of data, as a rule, is not needed, so we select only the necessary parameters:

PS> Get-WmiObject Win32_ComputerSystem | Select Manufacturer, Model

Let's see what kind of motherboard we have:

PS> Win32_Baseboard | Select Manufacturer, Name, Product | ft-a

The Win32_ComputerSystem, Win32_ComputerSystemProduct, and Win32_OperatingSystem classes allow you to collect general information about the computer and system:

PS> "127.0.0.1", "synack.ru", "pc01" | Check Online |
Foreach-Object ( Get-WMIObject
Win32_ComputerSystem -computerName
$_ }

Request OS version:

PS> Get-WmiObject Win32_OperatingSystem | Select CSName,Buil
dNumber,ServicePackMajorVersion

PS> Import-CliXML C:\check.xml |
Out GridView

A complete list of Win32_* classes and properties is available in the MSDN documentation "Win32_Classes" (http://msdn.microsoft.com/en-us/library/aa394084%28v=VS.85%29.aspx). An alternative is to use the search function.

For example, let's look at a list of objects that have the word disk in their names:

PS> Get-WmiObject -List | where($_.
name -match "disk")

Ready-made utilities and applications

If you search well on the Internet, you can find more than a dozen ready-made WMI scripts in a variety of programming languages ​​that are easily adapted to your needs.

My attention was drawn to the Hardware Inventory HTA application (www.robvanderwoude.com/hardware.php) with a web shell. Just enter the name of the computer and get information about the installed equipment. If necessary, you can edit the raw file in a text editor, adding the necessary parameters to it (the polling of WMI objects is implemented in VBScript).

Third-party developers have created a number of special cmdlets that make it easier to write scripts. The Computer Inventory Script (CompInv) script, which is available on powershellpro.com, allows you to get information about the hardware, OS and save all the collected data in an Excel file for further analysis. After running the script, it will ask several questions, answering which, the administrator selects data collection mode.The list of computers to be checked is determined using a special text file, the script can also automatically check all systems or servers included in the domain.Alternatively, the computer name is set manually.The current account is used by default, but answering "Yes" to the question "Would you like to use an alternative credential?", you can specify the required account.

In order not to run the created script on our own, we will entrust this to SchTasks. For example:

> SchTasks /CREATE /TN CheckScript /TR "powershell.exe`
-noprofile -executionpolicy Unrestricted`
-file check.ps1" /IT /RL HIGHEST /SC DAILY

As a result, a task called CheckScript is created, which will execute the check.ps1 PS script daily, and with the highest priority. Together with the equipment inventory system and installed apps NetPoint (www.neutex.net) offers a set of PS-scripts (GetNet*) designed specifically to collect a certain type of data about subordinate systems. For example, let's look at the availability of free space on the hard drive:

PS> Get-NetLogicalDisk -DriveType "Local Disk"
| where ( $_.FreeSpace / $_.Size -lt .10 ) | %(
$_.ComputerSystemName )

Now let's try to collect information about installed programs Oh:

PS> Get-NetProgram -System synack.ru -Uninstalled $False
| % ( $_.DisplayName ) | sort-unique

In total, the package includes 20 cmdlets. A free NetPoint Express Edition is available that runs on 32/64-bit WinXP/2k3/2k8/Vista/Se7en and can be used on networks of any size. To install NetPoint, you will need PS 2.0, IIS, and SQL Server (Express Edition is enough).

By the way, the list of installed programs can be obtained by simply reading the desired registry branch:

PS> Get-ItemProperty HKLM:\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\* | Format Table
DisplayName, Publisher | Out GridView

The Out-GridView cmdlet displays data in a separate searchable and sortable window.

Cons of using scripts

While collecting data using WMI/PowerShell is quite simple, all reports and configuration changes have to be controlled manually. Of course, you can complicate your scripts by trying to automate the process, but not everyone wants to spend time on this. Here it is worth recalling that Microsoft offers the necessary functionality in SCCM (System Center Configuration Manager), which we already wrote about in the issues 08.2009, 09.2009 and 01-02.2010. But in cases where the admin also has *nix systems, all kinds of routers and other equipment that needs to be taken into account, WMI is no longer a helper. In addition, the problem of visual presentation of data and reports remains. Here you will have to resort to third-party programs (including those distributed under free licenses), fortunately, there are plenty to choose from.

Myzci inventory system

Many who tried the zCI inventory system (zci.sf.net) found it to be a pretty good solution, but it lacked the ability to manually enter data and a localized interface.

Of course, these are not critical moments, but there are other little things. For example, you cannot delete a device via the web interface - you must manually create an SQL query to clear data from tables. The MyZCI inventory system (sf.net/projects/myzci) is a fork of zCI. Yury Vinnik is engaged in the development, he brought zCI to the required conditions: the interface has been translated into Russian and Ukrainian, new fields have been added to the tables (for example, computer placement) and management has been simplified.

MyZCI requires any web server with PHP support (with PECL, PHP Extension Community Library) and MySQL.

Unpack the myzci-1.2.1.zip archive to the root directory of the web server and specify the MySQL access parameters in the zciconfig.php file:

$ sudo nano zciconfig.php
return dbx_connect(DBX_MYSQL,"local
host","zci","zci","passwd");

To create tables in the database, use the mysqlscript.sql script located in the engine directory. The records inside need to be aligned with the data:

$ sudo nano mysqlscript.sql
create database zci;
...
grant all on zci.* to
"zci"@"localhost" identified by
"passwd";
# If you do not plan to access the database with
other systems, comment the last line
# grant select, delete, insert, update
on zci.* to "zci"@"%" identified by
"zci";

Localization of the interface is done by setting the “$Lang” variable to “ru” in the langconfig.php file.

To collect information on a Windows system, Windows Script Host is used, on Linux - lshwclient in Java. All components are in the add-ons and engine subdirectory. MS Windows Scripting Host 5.6 and MS WMI Core 1.5 are also located here, which are necessary for the client part to work in Win95/98/NT4. Before deployment, the takedata.js and lshwclient.java files should change the value of the MyZCIpath and MyZCIserver variable to point to the URL of the server.

The process of setting up the client part on end systems is simplified. So, the install.sh script used when installing on Linux checks for the presence of the lshw, jdk and read-edid packages (monitor info) and displays an explanatory message if they are missing. The next step is to build the Java client and install the cron job. After deploying MyZCI, you need to connect to the server from a remote system and register the computer by clicking the appropriate link on the main page. Information about the new system should appear in the MyZCI database. Download the archive with the client part from the main page and run the installer.

After that, the scripts will start sending data to the server. The interface is extremely simple and allows you to display detailed information about the hardware, enter and edit data about computers, group, search for systems by a certain criterion (for example, the type of video card and monitor), track changes.

The admin menu allows you to define the status (pinned, leased) and location of the system.

OCS Inventory NG system

The OCS Inventory NG solution (OCSNG, Open Computers and Software Inventory New Generation, ocsinventory-ng.org) allows you to inventory components and software installed on computers on a local network and track their changes, periodically receiving data on the system configuration. Another useful feature is the ability to remotely install programs and execute commands. An agent program is installed on client computers to collect information.
The agent is available to almost everyone Windows versions 95 to 2k8R2, Linux, Mac OS X, *BSD, Solaris, IBM AIX and HP-UX. All collected data is sent by the agents to the management server as an XML stream compressed using the Zlib library. For transmission, the standard HTTP / HTTPS protocol is used, so problems with the firewall usually do not arise. With the help of agents, the "IP discovery" function is implemented, which helps to find all network and peripheral devices operating in the local area, including those that cannot be accessed install an agent (switches, printers, webcams, etc.) Agents scan the network for such devices and send information about them to the server for analysis.

The Windows version is written in C++, the *nix version is written in Perl and C.

The OCSNG backend includes four components that do not have to be installed on the same server. It is a DBMS (MySQL) for data collection, as well as a web server that can play one of three roles:

  • Communication service - provides HTTP communication between the database server and agent programs (Apache 1.3.X/2.X with integrated Perl, Debian/Ubuntu package libapache-dbi-perl);
  • Deployment Service - storage of installation files for agent programs (any web server with SSL support);
  • Management console - view the collected data in the browser (web server with PHP support with ZIP and GD).

The OCSNG server part can be installed on a computer running Win2k/XP/2k3, Linux, *BSD, Solaris, IBM AIX and MacOS X.

Installing Ocsng

The required package is available in the repositories of most distributions, although this is usually not the most current version. self-assembly from source code with a careful approach should not cause difficulties. The setup.sh installation script, located inside the archive, will check for the presence of the required components and issue recommendations for troubleshooting, if necessary.
On Debian/Ubuntu, for manual assembly, you need to roll packages:

$ sudo apt-get install libapache2-mod-perl2
libdbi-perl libapache-dbi-perl libdbd-mysqlperl
libsoap-lite-perl libxml-simple-perl
libnet-ip-perl libcompress-zlib-perl php5-gd

And XML::Entities from the CPAN repository:

$ sudo cpan -i XML::Entities

The installation process will create all the necessary configuration files and aliases for the web server. Since the files that can be distributed with OCSNG are often large, the post_max_size and upload_max_filesize variables in the /etc/php5/apache2/php.ini files (defaults to 8 and 2 MB) and ocsinventory-reports should be set to the desired values. conf. After all the settings, we call the browser and run the installation script http://localhost/ocsreports/install.php, where we specify the parameters for accessing the database. During the installation process, an account “ocs” with a password “ocs” will be created to access the ocsweb database. If access to the database is not limited to the local system, the default password should be changed for security reasons. Installing the agent on Linux will require some Perl modules (XML and Zlib) and dmidecode.

$ sudo apt-get install libcompress-zlib-perl libnet-ipperl
libnet-ssleay-perl libwww-perl libxml-simple-perl
po-debconf ucf dmidecode pciutils

After that, the agent is installed in the standard way for Perl's applications:

$ tar xzvf Ocsinventory-Agent-1.1.2.tar.gz
$ cd ocsinventory-agent-1.1.2
$ perl Makefile.PL
$make
$ sudo make install

Next, the script will start asking a series of questions about the placement of configuration files. We enter the server data, create a tag (for grouping systems), activate the task for cron. When configuration is complete, the collected computer configuration data is sent to the server. If the connection is established and we receive the response “Success!”, the agent installation can be considered complete. Its data will appear in the web console, in the " All computers". An XML file containing the current computer configuration will be created in the /var/lib/ocsinventory-agent directory. If the connection fails, run the agent in debug mode:

$ ocsinventory-agent -l /tmp --debug --server http://ocsng-server/ocsinventory

Usually, the information received is enough to diagnose errors. Agent for Windows can be installed in several ways. The simplest is manually or using the included logon script.

After installing the server, the agent installation file can be imported into the OCSNG database. Just select the "Agent" tab and specify the location of the file, after which it will be available from any computer on the network. The installation is standard: at the last stage, we report the name or IP address of the OCSNG server, and in order to immediately generate and send a report, check the "Immediately launch inventory" checkbox. Next, the agent is added to autoload and starts as a service.

Working with the OCSNG interface

The interface is localized, so it won't take long to figure out how to use it. By default, the All Computers tab shows seven main characteristics of client machines.

The "Add column" list makes it easy to add up to 23 more fields. It is very convenient that the data can be edited manually. Also of note is the easy search and removal of duplicate systems.

As mentioned earlier, OCSNG has the ability to install applications and run scripts (bat, vbs, etc.). Such functionality helps a lot. We create a package in Deployment - Build and fill in the New package building fields: name, Priority (installation order) and action in Action. Three options are provided:

  • Store - copy to the target system;
  • Execute - copy and execute with a command;
  • Launch - copy and run.

The options in User notifications allow you to alert the user and allow them to cancel the task.

After creating the package, it should be activated in Deployment - Activate. Enter the server URL and click Submit. We select the computer on which we will install the package, go to the Customization menu and click the Add package link. We specify the package and start the process by pressing Affect. The task status is displayed in Customization, general statistics are available in the Activate table.

In OCSNG, the connection is initiated by an agent that connects to the server once a day, sends status information, and receives jobs. If the package you created needs to be installed earlier, you must force the ocsinventory-agent command to run on the client.

Conclusion

After setting up and filling in the database in the inventory system, you will always have up-to-date information about the current state of computers at hand and will be able to track changes. The reports it generates make it possible to quickly determine the configuration of a typical computer used in an organization, which will serve well for a planned upgrade or OS change.

Localization of OCSNG/GLPI

The OCSNG interface is localized, but there are still some minor issues that cause the Russian-language names of programs installed on Windows to be displayed incorrectly.

The fact is that OCSNG initially uses the ISO-8859-1 encoding (for displaying CP1251), while GLPI uses UTF8. When importing OCSNG -> GLPI data, there are also problems with encodings.

There are two known solutions:

  1. On the fly during export, change the data and fonts used. To do this, you need to fix the export.function.php file and use the ttf2pt1 package to create new fonts that support UTF8.
  2. Initially teach OCSNG to work with UTF8. For this, patches and rebuilt installation files for Windows are proposed. You can download them from ftp://linvinus.ru/ocs. There are also ready-made deb packages for Ubuntu/Debian here.

In addition, in the inc/ocsng.class.php file, you should change the line "$this->dbenc="latin1";" to "$this->dbenc="utf8";" and in /etc/php5/apache2/php.ini check the setting "default_charset = "utf-8"".

Links

  • A complete list of Win32_* classes can be found in the MSDN documentation "Win32_Classes" - msdn.microsoft.com
  • NetPoint project website - neutex.net
  • MyZCI project website - sf.net/projects/myzci
  • zCI project website - zci.sf.net
  • OCSNG project site - ocsinventory-ng.org

GLPI project

GLPI (Gestion Libre de Parc Informatique, glpi-project.org) is another project that is well-deservedly popular with admins. In addition to the tasks of accounting for computers and components, it allows you to store data on the rest of the "economy", including consumables. Unlike OCSNG, the administrator fills the database of devices on his own using a localized web interface.
But this problem is solved by using a plugin that integrates GLPI with OCSNG. Therefore, they are often installed together. To enable support, go to "Settings - General" and switch "Activate OCSNG mode" to "Yes". After that, a new tab "OCSNG Mode" will appear in the menu, in which you can synchronize data.

Based on GLPI, it is easy to organize a technical support service for users, which is very convenient, because instead of a call, the user leaves a request that is registered by the system. Then the IT department processes it. This disciplines users - they stop calling for trifles, and admins have a database of calls to report on the work done. But the possibilities of GLPI are not limited to this. It allows you to create a knowledge base consisting of articles, keep records of suppliers, contracts. The system is equipped with a large number of various reports with the ability to export the result to a PDF, CSV or SLK file. Calendar synchronization via iCal, Webcal protocols is supported.

The functionality is easily extended with plugins available on the project website (plugins.glpi-project.org). In addition to OCSNG, you can import data from a Cacti or Nagios server.

The GLPI package is available in the repositories of the major *nix distributions. Installing from source is standard for applications written in PHP that require a web server and MySQL.

An accurate PC inventory is something you cannot do without in a company or organization. Managing the inventory of hardware and software updates of the entire computer park on paper or even in Excel spreadsheets requires significant labor and time even for small enterprises, not to mention large corporations with hundreds and thousands of computers. Not surprisingly, system administrators are often overwhelmed with these chores and perceive the work of maintaining records and statistics as a burden that prevents such valuable time and resources from being used for more important projects.

AIDA64's fully automated network inventory takes that burden off the shoulders of IT professionals. AIDA64 Business and AIDA64 Network Audit, designed for business users, allow you to perform a detailed inventory of hardware and software of Windows-based computers connected to the same corporate network. The amount of information collected by the program can be fully customized to the needs of the user, and administrators can choose between several templates (report profiles).

Configuration flexibility

The program does not require installation, therefore, it can be run from a shared central folder on any client in a domain environment. Of course, AIDA64 allows you to set the frequency of reporting (inventory) of computers: reports can be collected once a month, once a week, once a day, or after each user logon. Because AIDA64 supports command line options, the process can be fully automated.

Reports can be saved in open formats ready for further processing, as well as in a SQL database. AIDA64 Network Audit and AIDA64 Business versions support the following report formats:

  • plain text format (.txt)
  • MHTML
  • ADO (for database insertion)

Integrated Audit Administrator

Audit Administrator allows you to view and analyze the software and hardware inventory of the computer park. Here you can also filter the data and create graphs. For example, system administrators can easily identify clients that do not meet the minimum system requirements of a new application being applied, or that do not have the latest operating system and security service packs installed. In the statistical report (which can be filtered by several criteria) provided by the program, you can immediately see the percentage of corporate computers with a certain type of processor, memory size, or installed version Windows.

You can also track changes between network audit snapshots taken at different times and detect changes in the hardware or software environment of computers. You can learn more about the AIDA64 Change Manager feature.

What are the clients saying?

"Replacing manual work, the program allows you to keep records and perform statistical tasks that were just a burden for IT professionals, and also frees up staff time for other work."

Josef Szabo, system administrator
Budapest Baths and Hot Springs Co.

If you are interested in the opinion of other customers about the AIDA64 program,

Today it is difficult to imagine a company without IT infrastructure. Every organization has computers. And like any property, they need to be inventoried periodically. What are the features of the inventory of computer equipment?

Dear readers! The article talks about typical ways to solve legal issues, but each case is individual. If you want to know how solve exactly your problem- contact a consultant:

APPLICATIONS AND CALLS ARE ACCEPTED 24/7 and 7 days a week.

It's fast and IS FREE!

Absolutely all property of the organization is subject to inventory. But computers are quite different from other property values.

They are often part of the inventory. Often computers are upgraded. How to inventory computer equipment? What are the features of such verification?

What do you need to know?

Computers, office equipment, mobile devices and similar objects are something that almost no company can do without today.

Often, computer equipment is a fairly significant part of the property of the enterprise. And this means that it is necessary to carry out not only constant monitoring, but also periodic checks.

The presence of computers, as well as other property, is checked through an inventory. But how often should you check?

The legislation provides for a mandatory inventory at least once a year, before the preparation of the annual financial report.

All other cases of inventory checks remain entirely at the discretion of management, except for the occurrence of circumstances requiring an indispensable inventory.

In practice, organizations carry out the procedure in late December - early January. In addition, the Accounting Regulations provide for the possibility of inventorying fixed assets once every three years.

Here it is worth considering that a computer is a complex mechanism and it consists of many parts. Often repairs, upgrades, replacements of individual parts are made.

The accountant is aware of all these operations only in general terms, since the prerogative of servicing computers still belongs to representatives of the IT sphere.

Thus, in a year the computer can change beyond recognition and it will be very difficult to restore the accounting support for all transactions carried out.

It is better to inventory computers and similar equipment as often as possible. The order and timing of the inventory are determined by the head.

But it is advisable to check at least once a quarter. Moreover, there are many special computer programs that allow you to make an inventory of computer equipment in a matter of hours.

Basic terms

Inventory of property involves an audit, during which the actual number of objects is checked against the data on their presence in accounting.

Inventorying computers is no different from checking any other property. But we must understand that the concept of "computers" refers to all computer equipment available to the enterprise.

Computer technology is a complex concept. It describes the entire spectrum of computer technology, from a conventional smartphone to a heavy-duty computer.

Refers to computer hardware and software that is installed on a computer to perform certain functions.

In general, computer equipment and the programs running on them constitute a single hardware and software complex.

If we talk specifically about the types of computer technology, then these are:

For what purpose is

An inventory of computer equipment is necessary, first of all, to check the compliance of its quantity. But not only... In the course of check it is possible to find out how effectively this or that equipment is used.

This helps to optimize the cost of computer and software. Perhaps the organization does not have the necessary computer equipment or the necessary programs, which leads to a decrease in labor productivity.

Or, on the contrary, the enterprise has too many unnecessary computers and some programs are not used at all. Also, the inventory of computer equipment allows you to determine how much the cost of individual objects has changed.

It may turn out that some computers have become unusable due to their dilapidation and they need to be completely written off. The cost of other computers may increase due to upgrades.

The result of the inventory may be getting rid of unnecessary computer equipment and acquiring the necessary computers or programs.

The legislative framework

The inventory of computers is regulated by the regulatory framework regarding the general procedure for inventory.

Legislatively, the inventory procedure does not differ from the usual inventory of fixed assets. Inspection is also carried out in mandatory cases and according to the schedule approved by the organization.

The results of the check are drawn up in standard - unified forms established.

Emerging nuances

The nuances of computer inventory are that often computer equipment is moved from one office to another, responsible persons change, individual computers are portable portable devices.

Therefore, it is rather difficult to link with respect to location and accounting to computers. Another nuance in the identification of objects. In accounting, computers are registered according to their model, brand and inventory number.

Video: taking inventory

Only an IT specialist can distinguish a certain model by eye, and comparison with the inventory number will take a lot of time, especially if several identical models are used.

Therefore, to simplify the inventory, each individual object of computer equipment must have a special label. It must contain all the necessary data, including the name and inventory number.

Order of conduct

Conducting an inventory of computers is possible manually or with the help of automated accounting programs.

In both cases, it is necessary to carry out preparatory procedures. In particular, this concerns the simplification of identification. This is achieved by supplying each object with a label.

With the manual method, the label indicates:

  • name of the owner (organization);
  • the name of the object according to accounting (often in accounting, the name is very different from the real name);
  • inventory number of the object;

With an automated process, based on a database of computer technology, labels are printed for each object with the presence of bar codes. These are then glued onto the appropriate technique.

The usual scheme for inventorying computers, in general, looks like this:

Published about the need for an inventory of computers The document indicates the period of verification, its procedure and the composition of the inventory commission
The commission receives in the accounting department forms of statements with credentials Direct verification is carried out. With manual inventory, data on the actual availability is entered into the act. At the same time, it is not advisable to check in the sequence of the accounting inventory, since this way you can lose sight of individual objects. It is better to move around the room (rooms) and mark all available computer equipment along the way. With automated accounting, it is enough to go through the verification area with a scanner and read information from barcode labels. Then the information is transferred to the computer used for inventory, where the verification certificates are filled in automatically.
Verification of actual availability and accounting data is carried out The reasons for the identified discrepancies, the guilt of the responsible persons are determined
If there are inconsistencies Amendments to accounting

As a program that supports inventory through barcoding, you can use the 1C program "Equipment Accounting".

To get acquainted, you can download the demo-base of the program or watch the presentation "Equipment Accounting 1.0".

An equally popular solution is the Hardware Inspector program, which allows you to inventory computers using a barcode scanner.

Inventory of computers over the network

Computers in general are designed to simplify human work. This quality applies to inventory as well.

At this time, to conduct an inventory of computers, it is not at all necessary to move around the enterprise with a piece of paper and a pencil or a scanner.

What’s more, you don’t even have to leave your desk to check it out. Suffice it to use the inventory programs of computers on the network.

To implement such a program, all computers available to the organization must be connected to a single network. The process is more than simple:

An important advantage of the program is the ability to use both ready-made report templates and those developed independently.

It is noteworthy that in this way it is possible to carry out an inventory absolutely imperceptibly. The scan is performed in the background and no action is required from the users of the devices being scanned.

The speed of the inventory by the program and the accuracy of the data collected are especially significant. Even in a very large organization, an inventory of computers on the network is carried out in the shortest possible time.

In this case, the maximum amount of data is collected regarding the hardware and software of the device. That is, using the program, you can inventory not only the computers themselves, but also the software installed on them.

Another feature of the computer inventory program over the network is that in most cases, scanning can be scheduled according to a schedule.

At the indicated moments, the program will scan and provide ready-made reports. This will allow you to always be aware of the state of computer technology in the organization.

What is the program for this

There are many programs for inventorying computers on the network. Each of them has its own characteristics, but the general algorithm of their work is approximately the same.

As an option for the free version of such a program, you can download and apply the program "Inventory of computers on the network."

You can also keep an inventory of computer equipment using the IT Invent program. This product supports network scanning and automatically collects data from computers in the public network.

Using the program, you can inventory any computer equipment in several branches, if the objects are connected to a single database.

In addition, the program has many other functions that facilitate the accounting of computers. If you want to use the full range of functions, you can buy the program.

And if necessary, you can use the free version of IT Invent. Another program of this type is 10-Strike: Computer Inventory.

mob_info