top of page

Machines List

image.png

The Machine List displays all PCs detected by the automatic procedure.

  • GREEN: Machines for which the last scan was successful

  • RED: Machines with problems during the last scan (see Internal Events for details)

  • YELLOW: Machines currently being scanned

​

The following information is displayed:

​

  • Last Scan: Indicates when the scan was performed to retrieve logs

  • Last Access: Date and time of the last interactive access

  • Available Space: The available space on disk C (in GB)

  • Scan Time: Time taken (in minutes) by the remote scanning process

  • RT: Indicates whether the machine is monitored by the BLogRT system

  • Client Version: The version that RT clients should have; if different, it is displayed in RED

  • IP: Initially indicates the IP used to resolve the machine name (based on the DNS Reverse Zone)

  • User: The last user who logged in to the corresponding machine

  • Type: The machine type (WIN, SYS, or RT)

  • [Force Inventory]: Starts a machine scan within one minute

  • [Book Scan]: Books the selected machine for the first available scan

 

Note: All workstations not included in an active license are shown in gray rows, even if selected.

​

Machines that count towards the license are:

​

  • WIN: Windows machines that are selected

  • RT: Machines registered with the RT agent

  • SYS: Machines or devices registered with Syslog

General Settings

These options allow you to update the specified settings for all machines at once, making them ideal for applying general configurations and then managing exceptions.

image.png
  • Maintain Application: Useful when information or error messages are generated by management clients on these machines. In this case, the Application category is never reset.

  • Clear Registry: The Application and Security categories are cleared at every scan cycle.                           This option is useful for keeping the registry clean and avoiding possible corruption.

  • PowerShell Capture: If PowerShell command logging is enabled, you can also enable log capture to obtain a complete view of all PowerShell commands executed on the machines.

By clicking [Open] on each machine, the corresponding technical sheet opens:

image.png

In this tab, you can modify several settings related to the selected machine.

On the right-hand side, a list of all users who have accessed the machine is displayed.

In the relevant boxes, the available space on disk C is shown.

You can configure a threshold alarm by entering a value in the Space Alarm field.

You can also click [New] to manually enter the machine name (or IP).

image.png
image.png
bottom of page