Assets view (preview)

The Assets View allows you to monitor assets efficiently using filters, searches, and actions. This view helps identify patterns, trends, and anomalies, uncovering opportunities, risks, and areas for improvement. Though primarily designed for help desk technicians, it is accessible to anyone needing to manage or search for assets and devices.

Assets view highlights

  • View assets (based on your view permissions)

  • Scan devices without having to leave to get important details

  • Open the All Devices view in another tab

  • Create custom filters that allow you to quickly find a specific assets.

  • Export all data to Excel or CSV format

  • Choose columns to display or hide based on the data you want to view

    Assets view column descriptions

    Column name Description
    Asset Name The unique identifier assigned to an asset, enabling efficient tracking, management, and troubleshooting. You can update this information within the classic platform (N-central or N-sight)
    Azure ID The Azure ID is a unique identifier assigned to a resource or object within Microsoft Azure. It helps in tracking, managing, and distinguishing individual resources, such as virtual machines, storage accounts, or applications, within the Azure cloud environment.
    Azure Region An Azure Region is a geographical location where Microsoft Azure has data centers. Each region contains one or more data centers and allows users to deploy resources closer to their users or services to reduce latency and meet compliance requirements. Examples include East US, West Europe, and Southeast Asia.
    Azure Size Azure Size refers to the configuration of virtual machines or other computer resources in Azure, including specifications like the number of CPUs, memory, storage, and network performance. It determines the resource capacity and cost of a virtual machine or service. Common sizes include Standard_B2ms (2 CPUs, 8 GB RAM) and Standard_E64 (64 CPUs, 432 GB RAM).
    Azure Subscription An Azure Subscription is a billing and access control container for Azure services. It organizes resources and defines the payment model for services used. Users can create multiple subscriptions to separate workloads, teams, or environments like development, testing, and production. Each subscription has its unique ID and is tied to a specific billing account.
    Chassis Type The physical enclosure or framework of a server, network switch, or computing device. Examples: Rack-Mount: Designed to fit into standard racks for data centers. Blade Chassis: Houses multiple blade servers in a compact design. Tower: Resembles a standard PC case, often used for standalone servers. This is provided by the Operating System.
    CPU Cores The individual processing units within a CPU (Central Processing Unit). Each core can handle one task at a time, so more cores mean better multitasking. For example, a quad-core CPU can handle four tasks at once.
    CPU Count The number of physical processors in a computer. For example, A server might have two CPUs, each with multiple cores.
    CPU Name

    The brand and model of the processor. For example, Intel Core i7-12700K or AMD Ryzen 9 7950X

    CPU Speed How many cycles a CPU can perform per second, expressed in GHz (Gigahertz). For example, a 3.5 GHz processor can perform 3.5 billion cycles per second.
    CPU Type The processor's architecture, category, or intended use. For example, x86 (32-bit) or x86-64 (64-bit).
    Customer Name Name of the client the asset belongs to.
    Description The description/notes listed on the device in the classic platform (N-central/N-sight).
    Device Status Shows whether the agent is currently connected to the cloud servers or not.
    External IP . The external IP address the device is using.
    Host Name Name that uniquely identifies a device on a network. It provides a human-readable way to reference devices and can be mapped to IP addresses for easier communication and management.
    IP Address A comma-separate list of IP addresses assigned to the device.
    Last Boot Time The last boot time of the device.
    Logged in Users The accounts with active, authenticated sessions on a system or application. Tracking them is crucial for system monitoring, security, troubleshooting, and compliance.
    MAC Address A comma separated list of MAC address on the device. MAC addresses are essential for technicians to identify devices with accuracy and precision on a network. They play a crucial role in tracking and managing individual devices.
    Manufacturer The manufacturer of the asset.
    Memory Total Size (GB) The total installed RAM on a device measured in gigabytes (GB).
    Model The model of the device.
    NetBIOS Name

    A short name (up to 15 characters) that identifies a computer or device on a local network. It’s like a nickname for the device, making it easier for other computers to find and connect to it.

    For example:

    • A computer might have a NetBIOS name like OFFICE-PC.

    • A printer might have a name like MAIN-PRINTER.

    OS Icon denotes operating system type of the device;
    Windows operating system Windows
    Mac operating system macOS
    Linux operating system Linux
    OS Name

    The name of the Operating System.

    OS Version OS version details of the device, including bit version and build number.
    OS Install Date The date and time the operating system was installed on the device.
    Serial Number The serial number of the device.
    Service Organization Name The name of the MSP or service organization that the asset resides in.
    Site Name The name of the client site where the device resides.
    Status Change Time A timestamp of when an asset's status last changed. Occurs when the state of an asset is modified, for example, from Active to Inactive
    Timezone Timezone refers to the time zone settings or related considerations can impact the tracking, management, and optimization of physical or digital assets across different geographic regions.
    TPM Activation TPM Activation is when a Trusted Platform Module (TPM) is enabled or set up on device. TPM is a small chip built into a device that adds extra security by storing sensitive data like encryption keys, passwords, and protecting the device against unauthorized access.
    TPM Version The specification versions supported by the Trusted Platform Module (TPM).
  • Start a Take Control session from the Actions menu

  • Perform column-specific searches to refine your search based on the data stored in each field

  • Resize and reorder columns

  • Fix columns

    Right-click the column to access the menu.

  • Format columns