…e first two logins (for 5 hours and 3 hours) both are summarized under “LAB-B-5” since both occurred on the hardware that is now named LAB-B-5. Since that computer record is now associated with the LAB-B division, all usage appears within that division. This aspect of where usage is reported is one reason that you might want to use the Computer Name as the ID, instead. Even though the first login used the hardware that is now in LAB-B, it happened…
Read more…usage data for each product or component application separately. While policy level-usage reports will aggregate usage for all products managed under each policy, product- and program-level reports will break usage out accordingly (product reports can also display family level usage)….
Read more…ccess control, and while this can be complex if required, some of the most common combinations are: To record all usage of a Program/Product: Use a Universal Observe or a Site Manage Policy. All usage is permitted and recorded, on all KeyServer clients. We recommend Observe policies for freeware and Site Manage policies for purchased software. To record use of a Product within a group, while permitting/ignoring launches outside that group: Use an…
Read more…ver, and not blocked by firewalls. By design, the protocol is tolerant of typical firewall configurations that will block some KeyServer traffic. But this fault tolerance comes at a small price in performance, which can be reclaimed by configuring firewalls (whether network- or client-based) to allow all KeyServer traffic. Network Speed (Bandwidth) of modern networks is plenty fast for KeyServer, which was designed to support networks slower than…
Read more…e same thing happens. Laptop is shut and reopened again off-network If the computer is re-opened with no internet connection or on a network where the route to KeyServer is blocked by firewalls, then the KeyAccess saveMe will not reach KeyServer. Any program in use via a Node locked or Leased policy will continue to run, and it can be launched offline. Any program in use via a Site or Concurrent policy with the “Detachable” option set on will cont…
Read more…customers scattered around the globe precisely because of KeyServer’s time-tested ability to help our users control costs and save money. We know that the initial investment for most KeyServers is recouped within the first year through improved efficiency and reduced costs because we’ve seen it happen again and again. When customers see true usage data, they react in disbelief, then quickly start to understand how that data can be leveraged. We o…
Read more…, be careful with the formatting, because the feature requires the proper syntax in order for it to work properly. Here’s what that looks like, for reference: That’s it! Head to the Asset tab in a computer or device record to confirm the options work as expected. Reach out at support@sassafras.com if you have any questions or run into trouble and need assistance….
Read more…? Our professional Support team is only an email or phone call away. We are open Monday – Friday 8:30am – 6:00pm EST. (603) 643-3351 support@sassafras.com…
Read more…than any other product in the world at computer hardware and software usage tracking. If you’re interested in more information, check out our reviews at softwarereviews.com, and then head on over to our testimonials page to see what others think. Watch the embedded video below: ×…
Read more…ct: Marisa Devlin Director of Sales and Marketing marisad@sassafras.com 603-643-3351 About AllSight Sassafras AllSight is the the most lightweight, reliable, and comprehensive IT Asset Management and Usage Tracking software on the market. From purchase tracking to active license management, login and usage reporting to lifecycle management, and automatic configuration and software discovery and normalization to powerful integrations with enterpris…
Read more