Devices not responding to Ping

Dear JDisc friends, in the past, we encountered the situation at some customers where devices did not respond to ping (e.g. devices within a DMZ). Devices that do not respond to ping have not been easy to deal with in JDisc Discovery. They have been invisible for most discovery scans. Only a manual scan helped…

Microsoft Exchange Server Discovery

Dear JDisc Friends, as you might know, we are working closely together with our partner SHI on features primarily targeted to the software license management area. SHI is offering software license management services and helps customers to optimize their license cost. Only with the great support from SHI engineers, we were able to improve the SQL…

Sometimes it’s so easy…

Dear JDisc friends, from time to time customers request features that are easy or trivial to implement. And whenever that happens, I am wondering why I didn’t implement this feature in the past! Yesterday, a customer asked whether it would be possible to gather the list of mapped disk drives. Up to now, we collected…

E-Mailing Report Feature

Hi JDisc friends, Generating reports from discovered devices in your network is such a neat and organized way to have always a complete overview of your IT network.  But we gave it some thought and asked ourselves: Why not deliver the reports right at your fingertips? Answering that question brought us to you today to announce our new E-Mailing Report…

JDisc Discovery 3.3 – Network Documentation with our new Major Release together with the new Security Add-On

Dear JDisc friends, after a development phase of approximately nine months, we are glad to announce a new member of our JDisc Discovery product family. Together with the new major release JDisc Discovery 3.3, we introduce the Security Add-On. The third highlight is the excellent collaboration with SHI. The Security Add-On covers security and permission…

Tip: How JDisc Discovery uses Passwords…

Dear JDisc friends, today, I would like to talk about how JDisc Discovery remembers access credentials once they have been successfully tested. Access credentials are essential for a high quality network discovery result. Without access credentials, the data quality will be very poor. Therefore, JDisc allows users to enter access credentials for many different protocols.…

Arrest the Culprit!

Dear JDisc Friends, I would like to share a pretty nice story that illustrates the value of having an up-to-date network documentation. Recently one of our clients contacted us and he said: “Look, we have some device on the network that uses the same IP address as our Microsoft Exchange server!”. Of course, that causes…