Open-AudIT
Network Discovery and Inventory SoftwareDiscover what's on your network.
Open-AudIT is the world's leading network discovery, inventory and audit program. Used by over 130,000 organizations.
When a discovery is run, the relevant discovery scan option is chosen and those settings used by Nmap to scan the target devices. If no option set is chosen, the default configuration item (discovery_default_scan_option) is selected and used.
If a device is individually discovered using the “Discover Device” link on the device details page, we first check if this device has been discovered previously (by Discovery) and if so, use the discovery options from that scan. If it has not been previously discovered, we revert to the configuration item discovery_default_scan_option the settings.
Open-AudIT Feature Compaison Chart
Community | Professional | Enterprise | Cloud | |
---|---|---|---|---|
Agentless Device Discovery |
* |
* |
* |
* |
Software / Hardware / Configuration Change Monitoring |
* |
* |
* |
* |
Software License Management |
* |
* |
* |
* |
IT Asset Tracking |
* |
* |
* |
* |
Customizable Fields |
* |
* |
* |
* |
Customizable Queries |
* |
* |
* |
* |
Easily Export Information to CSV, JSON |
* |
* |
* |
* |
Role Based Access Controls |
* |
* |
* |
* |
Interactive Dashboards |
* |
* |
* |
* |
Geographical Maps |
* |
* |
* |
|
Time-Based Reporting |
* |
* |
* |
|
Schedule Discoveries, Reports, Baselines, Integrations and more |
* |
* |
* |
|
Selectable Options per Discovery |
* |
* |
* |
|
Cluster Documentation Options |
* |
* |
* |
|
User Configurable Rule Based Device attribute setting |
* |
* |
* |
|
Commercial Support |
* |
* |
* |
|
External Integrations |
* |
* |
||
Racks Management and Visualisation |
* |
* |
||
Cloud discovery and Audit |
* |
* |
||
File Monitoring |
* |
* |
||
Device Baseline and Comparison |
* |
* |
||
Use Collectors for Discovery on remote networks |
* |
* |
||
Customisable Dashboards and Dashboard Widgets |
* |
* |
||
Customisable Discovery Options |
* |
* |
||
Customisable Role Based Access Controls |
* |
* |