× Search
Thursday, May 30, 2024

CopyRight2's Infrastructure Reporting Feature

CopyRight2 includes a flexible reporting solution, collecting information about your network infrastructure providing the data in a user chosen output format.

Collect Data With CopyRight2's Infrastructure Reporting Feature

CopyRight2 Infrastructure Reporting FeatureCopyRight2 includes a flexible reporting solution, collecting information about your network infrastructure providing the data in a user chosen output format. This data can be useful for planning purposes, audits, accounting or for ITIL configuration and capacity management.

It features a graphical user interface to create, schedule and monitor scan jobs of computers or Active Directories.

You can run one-time scans interactively or schedule repetitive jobs that will provide you with data continually.

CopyRight2 performs the required tasks by launching a remote agent running directly on the target system for maximum performance. Once the agent has finished collecting the required information, it will compress the data to preserve bandwidth during transmission.

Next the compressed data package will be imported by the computer running centrally where the data will be decompressed. CopyRight2 supports an export to text files, Microsoft Access MDB files or into Microsoft SQL Server (version 2005 up to 2016).

CopyRight2 features a predefined reporting model founding on Microsoft SQL Server's Reporting Services. The Reporting Services will provide users with easy access to predefined reports and a tool to build custom reports without any SQL knowledge.

Additionally the user has the possibility to navigate through actual live data using a browser by clicking on shown entities moving along the data model (This feature requires Microsoft SQL Server Standard Edition).

Decentral Data Gather

Decentral collection of data from remote computers using a service that gets automatically deployed and removes itself after execution.

Central Data Collection

Collection of compressed data from remote computers and unpacking it to a central location. Optional import into SQL database.

Supports Server and AD Information

Delivers information about remote computers and Active Directory.

What Information can the Infrastructure Reporting Feature Collect?

The CopyRight2 infrastructure reporting module can collect a huge variety of information. It offers different types of scan jobs, one for computer information and one for data from Active Directory domains. A third type of job is used to collect the gathered data from remote systems to a central location and optionally import the data into a SQL database.

Information Collected by "Computer Scan" Job

These jobs collect general computer information, such as information about disks, volumes, the file systems, local users, local groups and more.

  • Disk volume information (capacity, cluster size)
  • Files and folders including version information
  • NTFS permissions for files and folders
  • Shares including share permissions
  • Printers
  • Computers, users, groups, trusts (on NT4 Domain controllers or Active Directory members)
  • Operating system and service pack level
  • Installed Windows components
  • Installed software applications including version information
  • Device drivers and services including version information


Information Collected by "LDAP Scan" Job

LDAP Scan Jobs are used to gather data from  Active Directories. You can define additional attributes within the job settings that you would like to be retrieved.

In case of a SQL database import you can additionally define table relationships in case an attribute represents entries that you would like to be grouped in a sub-table (1:n) or in a link table (1:n:1) for e.g. group memberships linking users with groups. CopyRight2 will dynamically create a SQL database depending on your settings.

  • Users
  • Groups
  • Contacts
  • Computers
  • Container and organizational units
  • foreignSecurityPrincipals

Pre-Installed Reports

CopyRight2 ships with the following predefined and ready-to-run reports, that can be easily customized using the Report Builder.


  • Volume capacity and cluster size
  • File and print shares
  • Files and folders
  • NTFS permissions

User Management

  • Users who cannot change their passwords
  • Deactivated user accounts
  • Users that never logged on to the domain
  • Last logon time of users
  • Locked out accounts
  • Users contact details
  • Users home shares and profiles
  • Users and email addresses
  • Users and memberships
  • Inactive user accounts
  • Users with logon scripts
  • Users without logon script
  • Recently logged on users
  • Recently changed user accounts
  • Users with never expiring passwords
  • User password changed within last month
  • User password expired
  • User password last set
  • User passwords older than a period of time
  • Local users and memberships

Computer Management

  • Computers of the domain
  • Deactivated Computers
  • Last Logon Time of Computers
  • Recently changed computer accounts
  • Installed Services and Device Drivers
  • Installed Software

Group Management

  • Empty domain groups
  • Empty local groups
  • Groups and Members
  • Recently changed groups
  • Local groups and members


  • Organizational units
  • Contacts
  • ...
Terms Of UsePrivacy StatementCopyright © Sys-Manage, 1998-2024. All Rights Reserved.
Back To Top