

In AccessEnforcer UTM Firewall, you can find this under Home > DHCP Clients. This shows all the devices on your network that have been assigned an IP address by the DHCP server (which is usually in a router). You can also supplement your scan data with information from a DHCP clients list.
#Free inventory management for mac free
You can do this will free smartphone apps: Supplement your network scans with scans for wireless devices. However, free and basic scanning tools are good enough for most small businesses. Other tools are complete inventory management systems, and scanning is only a small part of what they offer. Some connect to a switch via port mirroring to monitor traffic.
#Free inventory management for mac download
You can also Download our FREE Network Inventory Excel Template – We did the work for you! For example, you may wish to record the following: In a spreadsheet, create columns for each detail you wish to record about the devices.

Any other devices authorized to use the network.

The hardware you will eventually list in the spreadsheet may include: This spreadsheet will be the master list of authorized network devices. The five steps to create your network inventory are below. Small offices do not need a fancy and expensive tool to make an inventory. It’s a powerful way to keep your network security and management organized. The inventory is simple: it’s a list of devices that may attempt to connect to the network. That’s one reason the first of the CIS 20 Critical Security Controls is to create an “inventory of authorized and unauthorized devices”. Before you can secure a network, you have to know what’s on it.
