Fact-checked by Grok 2 weeks ago

OCS Inventory

OCS Inventory NG (Open Computers and Software Inventory Next Generation) is a free and open-source IT solution that enables organizations to inventory and track , software, and network devices across their . It operates through lightweight agents deployed on client machines, which collect detailed configuration data—such as specifications, installed software, and system settings—and transmit it to a central management server for storage in a database, allowing administrators to generate reports, monitor compliance, and manage assets efficiently. Developed and maintained by the French company FactorFX, OCS Inventory NG has been actively available since 2001, evolving into a robust tool that supports large-scale deployments of over 150,000 machines while remaining compatible with major operating systems including Windows (Vista and later), Linux, macOS, and Android. Key features include SNMP-based network scanning for discovering and inventorying non-agent devices like printers and switches (introduced in version 2.0), automated software package deployment via HTTP/HTTPS to ensure uniformity across endpoints, and extensive plugin support for customization. The solution integrates seamlessly with third-party IT service management tools such as ITSM-NG, iTop, and , enhancing its utility for comprehensive IT operations and providing a flexible, cost-effective alternative to proprietary inventory systems.

Introduction

Overview

OCS Inventory NG (Open Computers and Software Inventory Next Generation), often abbreviated as OCS-NG, is an open-source solution designed for collecting and managing IT asset across computer networks. As a project, it enables organizations to automate the discovery, , and tracking of , software, and network devices in environments. The system operates through a centralized that aggregates from client machines, providing a web-based console for accessing and analyzing results. The primary purpose of OCS Inventory NG is to streamline IT asset management by automating the collection of detailed information on system configurations, installed software, and connected peripherals, thereby supporting efficient and . This reduces the need for manual audits, which traditionally consume significant time and resources in large-scale deployments. Additionally, it aids in by maintaining accurate records of software licenses and specifications, helping organizations meet auditing requirements for standards such as ITIL or GDPR. By offering centralized oversight, OCS Inventory NG empowers IT administrators to monitor asset lifecycles, detect unauthorized changes, and plan upgrades proactively. A foundational capability of OCS Inventory NG is its multi-platform support, accommodating agents on Windows (from Vista onward), Linux, Unix variants (including BSD, Sun Solaris, IBM AIX, and HP-UX), macOS, and Android devices. This broad compatibility ensures comprehensive coverage in heterogeneous environments, where diverse operating systems coexist. The agent-based data collection mechanism allows for flexible deployment via HTTP/HTTPS protocols, facilitating integration with other IT management tools where needed.

Key Features

OCS Inventory NG provides comprehensive hardware inventory capabilities, capturing detailed information on CPUs, , devices, peripherals such as screens and USB devices, and interfaces including addresses and addresses. This allows administrators to maintain an up-to-date record of physical and configurations across diverse environments. The software feature catalogs installed applications, including their names, versions, publishers, paths, and details (32-bit or 64-bit), along with lists for operating systems. While usage data such as runtime metrics is not natively collected in the core , the system supports extensions for enhanced tracking if needed through plugins. Reporting and search tools are accessible via a web-based administration console, enabling users to query assets by various criteria, generate customizable reports on data, and visualize and software distributions through charts and tables. This interface facilitates quick asset location and compliance audits without requiring external software. OCS Inventory NG supports IP-based device discovery through the IpDiscover tool, which scans s using ARP protocols to identify active devices, and refines data via SNMP for non-agent devices like printers, switches, and routers. This capability extends visibility to unmanaged elements. Extensibility is a core strength, with modular plugins allowing custom data collection for specific assets such as printers (via SNMP queries) and virtual machines (through plugins for hypervisors like ). Agent-side scripts in /PowerShell for Windows or shell/ for Unix/ enable tailored inventory extensions, while server-side / modules enhance data processing and interface customization. Compliance features include tracking software licenses by comparing installed applications against entitlement records in the database, aiding in license optimization and audit preparation. Additionally, integration with CVE databases enables vulnerability scanning, where the system daily queries for known exploits matching inventoried software versions and displays risks by CVSS score.

History

Origins and Early Development

OCS Inventory NG originated as an open-source project initiated by the Gendarmerie Nationale around 2001, aiming to provide a cost-effective solution for IT in large-scale environments. Developed by a team of developers within the Gendarmerie and the broader open-source community, the project addressed the growing need for automated tracking of hardware and software assets across extensive networks, where proprietary tools were often prohibitively expensive or restrictive. This effort marked a shift toward accessible, community-driven inventory systems, leveraging a client-server to centralize without . The project's early development focused on building a robust , where lightweight agents installed on client machines would gather data and transmit it to a central for and . By early 2007, the first stable public release, version 1.0, was made available in , introducing the foundational that enabled periodic or on-demand scans via HTTP/HTTPS protocols. This release emphasized simplicity and scalability, supporting deployment on Windows, Linux, and other systems, and quickly gained traction among organizations requiring reliable asset visibility. A subsequent minor update, version 1.01 in 2007, addressed initial bugs to stabilize the platform for wider use. Early adoption was prominent within European IT communities, particularly in , where large entities like the Gendarmerie Nationale (managing over 60,000 workstations) and the Caisse Nationale d'Assurance Maladie (CNAM, overseeing around 100,000 systems) integrated OCS Inventory NG as one of their initial implementations. These deployments highlighted the tool's suitability for high-volume environments, fostering community contributions and refinements. In version 1.0rc3, released prior to the stable 1.0, developers introduced a module system to enhance extensibility, allowing users to customize and extend core functionalities such as inventory parsing and reporting without altering the base code. This feature laid the groundwork for future adaptability, solidifying OCS Inventory NG's role as a flexible open-source alternative in IT management.

Major Releases and Milestones

OCS Inventory NG's development progressed significantly with version 2.0 in 2011, which introduced the "NG" branding to emphasize its next-generation capabilities and featured an enhanced web console built on a PHP/MySQL backend for improved data management and user interface. In 2014, agent compatibility expanded to include support for mobile devices such as Android. In 2019, version 2.6 further improved overall inventory capabilities. The 2022 release of version 2.10 incorporated CVE vulnerability scanning to help identify security risks in inventoried assets and enhanced the to facilitate integration with third-party tools. In 2015, the project migrated to , which opened development to a wider community for collaborative contributions, and was taken over by the French company FactorFX for professional maintenance. As of September 2024, the latest stable server release is version 2.12.3, accompanied by agent updates reaching version 2.11.0.1 in May 2025, which introduced enhanced protocols to strengthen data transmission and protection. Key milestones include the launch of annual OCS User Conferences starting in to foster knowledge sharing among users. The community has driven substantial growth, with approximately 70 user-developed plugins created since 2010 to extend functionality, such as custom inventory extensions. As of November 2025, the project is developing 3.0, a complete overhaul of the software, with a stable release targeted for the first half of 2025.

Technical Architecture

As of 2.12.3 ( 2024), the infrastructure of OCS Inventory NG consists of a management that centralizes inventory data from client , comprising a database for storage, a communication for agent interactions, and a web-based console for . The core software stack includes the web (versions 2.2.x or 2.4.x) to host the application, a 8.0 or higher, or 10.3 or higher database (using the engine) to store inventory information, and scripting languages such as 5 for the communication and 7 or higher for the web interface. This LAMP-based architecture enables efficient processing and retrieval of asset data on or systems. Agent-server communication occurs over HTTP or protocols, with data exchanged in XML format and compressed using zlib to optimize usage. The key modules include OCSReports, a PHP-based web console for querying and managing inventory data, and the Communication Server, a Perl-based module that processes pull and push requests from agents. The , named "ocsweb" by default and accessible on port 3306, features core tables such as hardware for device identifiers and links to other entities, accountinfo for custom fields and account details, bios for firmware information, and softwares for installed applications. Additional tables handle logs and configurations, with relations established via JOINs on hardware_id rather than enforced foreign keys, supporting data organization for , software, and user accounts. Installation prerequisites favor Linux distributions such as RHEL 7 and newer, Debian 10 and newer, Ubuntu 18.04 and newer, CentOS/Rocky/AlmaLinux 8 and newer, or Gentoo, requiring root privileges and activation of the MySQL InnoDB engine. For small deployments (under 10,000 devices), a single server with at least 2 GB RAM is typically sufficient, though separate servers are recommended for larger scales. Security features encompass SSL encryption for communications, particularly required for the deployment server, and user authentication integration with LDAP or to delegate console access.

Client Agents

The OCS Inventory NG client agents are lightweight software components installed on devices to collect and transmit data to the management server. These agents operate periodically, gathering details on , software, and system configurations before packaging the information for secure transmission via HTTP or . Designed for minimal intrusion, they support a variety of operating systems and deployment scenarios, enabling automated across diverse IT environments. OCS Inventory NG provides native agents tailored to specific platforms, including an installer for Windows, Perl-based scripts for systems, a package for Mac OS X, and an for Android devices. The Windows agent supports both 32-bit and 64-bit architectures and runs as a system service. Unix agents rely on Perl modules for cross-platform compatibility, while the Mac OS X agent integrates with for scheduling, and the Android agent can function as a background service or standalone app. These agent variants ensure consistent inventory collection regardless of the host OS. Installation methods vary by platform but emphasize simplicity and scalability. For Windows, agents can be deployed manually via the executable, through Objects (GPO) in domains, or via scripted tools like PSEXEC for silent installation. Unix agents are typically installed locally using package managers, repositories for or Red Hat-based distributions, or manual compilation from source with Perl's Makefile.PL, requiring root privileges. Mac OS X uses a graphical installer with interactive prompts, while Android agents are sideloaded from files or installed via the Store. Automated tools like the OCS Agent Unix Packager or roles facilitate bulk deployments on Unix systems. The core functions of the agents center on periodic inventory scans, which run at configurable intervals—defaulting to 24 hours via the PROLOG_FREQ setting—and package collected data into XML format for transmission. Scans capture details (e.g., CPU, , peripherals), software inventories, and information, with options to exclude certain categories like software to reduce overhead. Agents briefly reference components for data handoff but focus on local execution, supporting features like SNMP for devices on Unix platforms. Supported platforms for current agents include SP1 and later, major recent Linux distributions (e.g., 8+, 11+, 20.04+), BSD variants ( 12+, 7+), 11+, AIX 7+, 11i v3+, macOS 10.13 and later, and 6.0 and later; legacy agents are available for older systems. Compatibility matrices ensure ongoing support for enterprise environments, with updates addressing newer OS versions. Agent configuration is handled through platform-specific files, such as ocsinventory-agent.cfg on Unix and Mac OS X, or INI files on Windows, allowing customization of server URL, SSL/TLS settings, logging levels, and tags for grouping. Options include proxy support for HTTP/HTTPS connections (specified via --proxy or config entries like proxy=url:port), wake-on-LAN compatibility for remote activation (enabled through BIOS/UEFI and agent timing), and custom fields on Unix agents via Perl hooks in extension modules (e.g., adding user-defined data collection scripts). These settings enable adaptation to network constraints and organizational needs. Resource usage remains low to avoid impacting performance, with agents occupying under 10 of disk space post-installation and consuming minimal CPU during scans—typically brief bursts under 5% utilization on modern hardware. No persistent inbound ports are required, as communication is outbound-only.

Operation and Functionality

Inventory Collection Process

The inventory collection process in OCS Inventory NG begins with the client initiating contact with the management through a mechanism known as the prolog phase. During this phase, the sends basic identification data, and the responds with instructions on whether a full is needed, based on factors like the age of the last . Inventory collection can be triggered in multiple ways to ensure timely data gathering. Scheduled runs occur automatically, with the agent contacting the server every PROLOG_FREQ hours (default 10 hours), incorporating a randomization delay between 0 and PROLOG_FREQ to distribute load across multiple clients. On-demand collection is possible via manual execution of the agent with the /force or --force option, bypassing the prolog check. Event-based triggers include the agent's first launch or server-directed requests during prolog, often integrated with system events like user login through deployment scripts. The agent gathers a comprehensive set of categories to provide a detailed asset . Hardware information includes details (such as , manufacturer, and model) obtained via WMI or DMI queries; drives (size, type, model, and serial); monitors (manufacturer, resolution, description, type, and ); processors, modules, video and sound cards, interfaces, controllers, slots, and ports. Software data encompasses installed applications (name, publisher, version, language, architecture, and installation details) collected through registry scans or WMI queries, including lists from Add/Remove Programs. specifics cover addresses, addresses, masks, and related configurations via like IpHlpAPI. User information captures logged-in or last-logged users, along with OS details like product ID, owner, and registered company. Printers are inventoried as connected input devices, including manufacturer, model, and type. Once collected, the is formatted into an XML structure by the and transmitted to the server via HTTP or request to the /ocsinventory. The transmission uses uncompressed XML for direct sends or compressed .ocs files in , with the server—typically running on with mod_perl—parsing the XML and updating the database accordingly. Authentication may be required using user credentials if configured. To manage duplicates, the system identifies machines using unique keys such as the , BIOS serial number, or the agent-generated device ID stored in ocsinventory.dat. Upon receipt, the server merges updates for existing entries or flags potential duplicates for administrative , preventing redundant records in the database. Error handling ensures reliability during collection and transmission. The agent implements retry logic for failed server contacts and buffers data locally in cases of network interruptions or offline scenarios, resending upon reconnection. Detailed logs are generated for diagnostics, with verbosity levels adjustable (0-2) via options like /debug or LOGLEVEL, stored in paths such as %ProgramData%\OCS Inventory NG\Agent\ocsinventory.log on Windows or /var/log/ocsinventory-agent on Unix systems, capturing issues like HTTP errors. For scalability, OCS Inventory NG supports environments with thousands of endpoints through features like load-balanced s and distributed architectures. A single tuned with 4GB and 2 vCPUs can handle up to 10,000 nodes, while larger deployments (over 20,000) benefit from splitting components across multiple s or using master-slave configurations to manage high volumes of concurrent agent contacts.

Software Deployment

OCS Inventory NG provides a built-in capability that enables administrators to distribute packages and execute commands on managed endpoints, leveraging collected to inform targeting decisions. The feature operates through a central console where packages are uploaded and configured, allowing for automated rollout to selected computers without manual intervention on each device. This deployment system integrates seamlessly with the module, using asset details such as operating system versions or hardware specifications to define deployment criteria. The deployment engine utilizes the OCS Inventory NG agent installed on client machines to handle downloads and executions. Administrators access the web console via the "Deployment > Build" menu to upload packages in formats like MSI installers, ZIP archives for Windows, TAR.GZ for Linux, executables, or batch/PowerShell scripts. Targeting is criteria-based, employing the search functionality to select computers by inventory attributes, such as specific OS versions (e.g., Windows 10) or hardware specs (e.g., CPU type), or by assigning packages to static groups of machines. For instance, a package might be targeted to all computers with insufficient RAM based on prior inventory scans. The deployment process involves several steps managed by the : packages are assigned priorities (0-10, with 0 being highest) and downloaded via HTTP/ in fragmented chunks to minimize network load, especially for large files exceeding configurable thresholds like 5 MB per fragment. Upon communication—typically during cycles—the system performs pre-deployment notifications and executes actions silently in the background, such as running scripts or installing software, without user interaction. Status is tracked in the central database, with outcomes like "SUCCESS," "ERR_EXIT_CODE_1," or "ERR_DOWNLOAD_FAILED" viewable in the console for and . Scripts and commands support dynamic variables derived from data, such as %USERNAME% for user-specific paths or %SystemDrive% for drive locations, enhancing customization. Scheduling occurs through configurable agent cycles, with deployments queued within a default period of 10 cycles and latencies (e.g., between cycles) to control timing and avoid overload. Common use cases include rolling out software updates across fleets, enforcing policies like patches, and ensuring license compliance by deploying or removing unauthorized applications based on inventory reports. For example, administrators might deploy an antivirus update to all Windows machines missing the latest version, using inventory criteria to identify targets. Limitations include a reliance on the presence of the OCS agent for execution, with no support for native deployment, and primary testing focused on Windows environments, though agents are compatible for TAR.GZ packages. mechanisms are not natively provided, requiring custom scripting for reversals, and offline machines cannot be directly woken without external tools.

Network Discovery

OCS Inventory's Network Discovery feature utilizes the IpDiscover tool, a Perl-based scanner designed to identify unknown devices on a network without requiring the installation of OCS agents. This tool employs SNMP queries, ICMP pings, and port probes to detect active devices, enabling the discovery of hardware such as printers, routers, and switches that may not support agent deployment. The discovery operates in two primary modes: passive and active. In passive mode, OCS agents on inventoried machines listen on network interfaces and scan local subnets for MAC addresses and other indicators of connected devices, with the server electing suitable agents based on criteria like operating system, connection quality, and fidelity. Active mode involves server-initiated sweeps using the ipdiscover-util.pl script, which targets configurable subnets and integrates tools like for more thorough probing. Upon detection, IpDiscover generates XML-formatted output that can auto-register devices directly into the OCS database or produce download links for manual on compatible systems. This output populates sections in the OCS web interface, such as inventoried, non-inventoried, and identified hosts, facilitating further SNMP-enhanced scanning for detailed attributes. For non- devices like network equipment, the process supports automatic population of inventory data without prompting for installs. Configuration options allow administrators to define XML rules for classifying device types and behaviors during scans, ensuring accurate identification and categorization. Exclusion lists can be implemented to prevent scanning of sensitive network areas or known devices, reducing unnecessary traffic and false positives. These settings are managed through the OCS administration console, with parameters like scan latency and maximum host timeouts tunable for optimal operation. Performance is enhanced by multi-threading in the IpDiscover scanner, enabling efficient handling of large-scale networks; for instance, it can process up to 20,000 hosts across 250 subnets, updating approximately 15,000 addresses daily in production environments. This scalability makes it suitable for enterprise networks while minimizing disruption through configurable delays between probes.

Integrations and Ecosystem

Compatibility with Other Software

OCS Inventory NG primarily integrates with the IT (ITSM) suite through the dedicated OCS Inventory NG , which enables the import of data from OCS into GLPI and facilitates linking inventory items to tickets for enhanced . It also integrates with ITSM-NG, a of GLPI, which uses OCS Inventory for and helpdesk functionalities, including a for extended capabilities. Additionally, OCS Inventory NG connects with iTop for managing shared infrastructures and through dedicated connectors. The system provides RESTful API endpoints, available since version 2.4, that allow third-party tools to export and retrieve data. In commercial environments, OCS Inventory NG can serve as a data source for IT (ITAM) platforms, where details can be pulled via API or database connections to populate systems. Additionally, its / backend supports direct SQL queries, enabling custom scripts to integrate data with () systems for synchronized asset and procurement tracking. Practical examples of compatibility include syncing user and group data from via LDAP synchronization to enrich inventory records with organizational context, or exporting datasets to format for analysis in tools like . However, OCS Inventory NG lacks built-in integration with (SIEM) systems, necessitating custom plugins or scripts to achieve such connectivity.

Plugins and Modules

OCS Inventory NG features an extensible module system that allows users to enhance inventory collection and reporting through custom plugins. The architecture relies on -based hooks for both the and components, enabling the integration of additional gathering mechanisms without altering the core codebase. Plugins are structured around XML definitions that specify fields and database schemas, paired with scripts responsible for and processing on the . Installation can be performed manually by extracting plugin files to designated directories, such as /usr/share/ocsinventory-reports/ocsreports/extensions/ for the or -specific paths like C:\Program Files (x86)\OCS Inventory Agent\Plugins on Windows, or via the web console's Extensions tab for automated deployment and activation. Since version 2.6, the plugin installer has incorporated Python 3 and the scp package to facilitate secure file transfers during setup. Official plugins provided by the OCS Inventory NG project include Winusers for tracking local user accounts and profiles on Windows systems, SNMP for detailed information retrieval from network equipment, and for inventorying VoIP hardware configurations. These plugins leverage the hook system, such as the Map.pm module, to map collected data into the central database. For instance, the SNMP plugin extends core network scanning by querying MIBs to gather specifics like printer models or switch ports. The maintains a at plugins.ocsinventory-ng.org, hosting over 60 plugins as of 2025, with contributions covering diverse areas such as environments and monitoring. Examples include VMware Vcenter for ESXi host and details, and the plugin for status and vulnerability assessments. These community extensions are developed collaboratively on under the PluginsOCSInventory-NG organization, ensuring open-source accessibility. Plugin development follows a standardized : developers define custom data fields via XML files to extend the , implement collection logic in scripts executed by the , and include version compatibility checks to align with OCS Inventory NG releases. For example, a custom might add fields for environmental sensors in data centers using SNMP queries or extract keys from registry entries via targeted modules. Developers test agent-side modules, such as Myplugin.pm, before packaging for distribution. Maintenance of plugins occurs independently from core updates, with developers releasing versions compatible with the latest extension engine. After , an server restart is typically required, and deactivation through the console handles uninstallation by removing files and database entries. Version mismatches can prevent execution, so compatibility verification is essential during upgrades.

Licensing and Community

License Details

OCS Inventory NG is licensed under the GNU General Public License version 2 (GPLv2), a that has governed the project since its inception in 2001. for OCS Inventory NG is held collectively by its contributors, with no single entity owning the full codebase; various individuals and organizations, such as IBH IT-Service for specific components, retain rights to their contributions under the GPLv2. Under the GPLv2, users are granted broad permissions to freely use, study, modify, and distribute the software, provided that the source code remains openly available and any modifications or works are also released under the same GPLv2 terms. Attribution to the original developers is required through preservation of copyright notices and license texts in distributions. Obligations include ensuring that all derivative works adopt the GPLv2 license, prohibiting the incorporation of OCS Inventory NG code into without releasing the source code, and maintaining the freedoms for downstream users. Commercial use of OCS Inventory NG is permitted within proprietary environments as long as the source code is made available in compliance with GPLv2 requirements; however, the license explicitly states that the software is provided without any , and users assume all risks. OCS Inventory NG does not employ dual-licensing; it remains strictly under the GPLv2, though professional and services are offered separately by the project's maintainers through dedicated channels.

Development and Support

OCS Inventory NG operates under an open-source development model hosted on within the OCSInventory-NG organization, where code contributions are submitted via pull requests and bugs or feature requests are tracked through the issue system. The project emphasizes collaborative maintenance, with and documentation repositories enabling transparent development workflows. Active since 2001, the project is primarily driven by developers, led by the company FactorFX as the main publisher and contributor, alongside participants who author plugins and extensions to broaden functionality. The supports ongoing involvement through dedicated forums at ask.ocsinventory-ng.org, where users exchange knowledge and troubleshoot issues, complemented by comprehensive wiki documentation covering installation, administration, and advanced configurations. events, such as the OUCE conferences, have historically fostered discussions on project advancements and integrations. Support options include free assistance from the via forums and paid provided by FactorFX, offering expert guidance for deployment, customization, and enterprise-scale implementations. As of November 2025, the project is planning the release of OCS Inventory NG 3.0 by the end of 2025, which will introduce an API-based backend, a model-based system, a unified and computer asset , a reworked , a dedicated device agent, and updated documentation. Containerization enhancements, including image support and charts for deployments, facilitate simplified server setups and scalability in modern environments. Key resources for users and developers encompass the official website at ocsinventory-ng.org for news and overviews, for software downloads and historical archives, and the extensive for detailed guides and references.

References

  1. [1]
    Solution open source d'inventaire de ... - OCS Inventory Professionnel
    Open computers and software inventory is an asset management solution. It is an open source software. It allows you to scan and inventory all your devices in ...OCS Inventory Documentation · OCS Inventory Plugins · OCS Professional · News
  2. [2]
    OCS inventory features
    OCS Inventory NG uses an agent that launches an inventory on client computers, a management server centralizes the results of inventories.
  3. [3]
    Downloads – OCS Inventory Professionnel
    Supported operating systems ; Sytem, OCS Inventory Agent, OCS Inventory Server ; Windows Vista et + ; Mac OS ; Linux ; Android ...
  4. [4]
    The open source reference for IT asset inventory
    Published in France by FactorFX, OCS Inventory is the open source reference for IT asset inventory and the essential tool for IT directors to well manage ...
  5. [5]
    Newbie documentation - What you should know - OCS Inventory ...
    OCS-NG collects information about the hardware and software of networked machines running the OCS client program ("OCS Inventory Agent").
  6. [6]
    OCS Inventory NG — NethServer 6.10 Final
    OCS Inventory NG collects information about the hardware and software of networked machines running the OCS client program (OCS Inventory Agent). OCS Inventory ...
  7. [7]
  8. [8]
    Using IP discovery feature - OCS Inventory Documentation
    IP discovery feature allow OCS Inventory to discover all network connected devices on the network. For this, Communication server asks a number of most “active ...Retrieving information · Server tuning · Show inventoried and non...
  9. [9]
    CVE Search, detect CVE vulnerabilities - OCS Inventory
    OCS Inventory's CVE Search identifies known vulnerabilities in software, automatically scans daily, and provides a view of all CVE vulnerabilities in your IT ...
  10. [10]
    OCS Inventory (ocsinventory.WebHome) - OW2 Project Marketplace
    A project initiated by French Gendarmerie Nationale 20 years ago, OCSInventory ... developing a network of international partners to provide local support.
  11. [11]
    A complete overhaul to embrace tomorrow's ... - OCS Inventory
    OCS Inventory is FactorFX's flagship software. It was originally a community project, developed for nearly ten years by the French Gendarmerie and the open- ...
  12. [12]
    ocsinventory-news Mailing List for OCS Inventory NG - SourceForge
    We are pleased to announce that OCS Inventory NG version 1.01 was released on 2007/02/22. OCS Inventory NG 1.01 only fix bugs detected in 1.0 final, and ...
  13. [13]
    Updates - Latest Improvements and Features - OCS Inventory
    Discover OCS Inventory's latest updates, improvements, and features to optimize IT asset management. Stay informed to boost IT infrastructure efficiency.Missing: development origin
  14. [14]
  15. [15]
    OCS Inventory Plugins
    OCS plugins can retrieve firewall configurations, gather listening ports, display event viewer logs, retrieve security details, and gather UEFI settings.Missing: community | Show results with:community
  16. [16]
    Setting up OCS Inventory Server
    OCS Inventory server setup involves 4 components: database, communication, admin, and deployment servers. Download the server, unpack, and run the setup.sh ...Install From Source · Requirements · Installing Management Server
  17. [17]
    OCS Database Schema - Ocsinventory Q&A
    Sep 22, 2014 · I need the OCS database schema to understand the relations between tables and what kind of data can I get from.Missing: software | Show results with:software
  18. [18]
    Hardware Requirements - Ocsinventory Q&A
    Mar 16, 2021 · Hello, I'm looking into standing up a Linux test version of OCS inventory so we can compare OCS against other similar software. From what I have ...
  19. [19]
    Manage authentification with LDAP - OCS Inventory Documentation
    It is possible to delegate authentication of the administration console of OCS Inventory. So we will see how to delegate the connection to the OCSInventory NG ...Missing: SSL | Show results with:SSL
  20. [20]
    OCS Inventory NG Agent 2.X on Windows Operating Systems
    OCS Inventory NG Agent for Windows can run as a Windows service automatically at computer startup. It can also work as a stand alone application.
  21. [21]
    OCS Inventory NG Agent 2.x on Unix Operating Systems
    OCS Inventory NG agent for Linux can only be set up locally. You cannot deploy the agent through the network currently as this is possible for Windows agent.Missing: hardware specs
  22. [22]
    OCS MacOSX agent 2.X documentation
    Download OCS MacOSX agent from OCS Inventory NG website download page ( Download page ), unzip the file and double click "Ocsinventory_Agent_MacOSX.pkg".
  23. [23]
    Android Agent Documentation
    OCS Inventory NG Agent for Android can run as a service automatically at boot time. It can also work as a stand alone application launched manually.Configuration Of Agent · General Configuration Of... · Configuration Concerning...
  24. [24]
    Setting up the UNIX agent using repository on client computers
    OCS Inventory has now his own repository for Debian based and Redhat based distributions. You will find below how to install OCS Inventory agent unix using our ...
  25. [25]
    ocsinventory-agent(1) - Linux man page - Die.net
    ocsinventory-agent creates inventory and send or write them. This agent is the successor of the former linux_agent which was released with OCS 1.01 and prior.
  26. [26]
    Compatibilities matrix – OCS Inventory Professionnel
    List of compatible guaranteed OS ; Server version, Compatibility ; 2.7 and newer · RedHat 7 · Debian 9 · Ubuntu server 16.04 · Ubuntu server 18.04 · CentOS 7 ...Missing: platforms | Show results with:platforms
  27. [27]
    I con't communicating OCS Server and Agent with Proxy server
    Feb 2, 2016 · In my system “NOT” connected proxy server but “before” Installation & configuration of OCS those two (Server & Agent ) system are Connected in ...
  28. [28]
    ocsinventory-agent: Unified client for OCS-Inventory | Man Page
    The agent will first contact the server during the PROLOG period. If the server doesn't know the machine or has outdated information, it will ask for an ...
  29. [29]
    [PDF] www.allitebooks.com - Programmer Books
    • /hkcu: The agent looks into the HKCU registry hive for installed software. ... • Launches the OCS Inventory NG agent for the first time ... SOFTWARE, HARDWARE, ...
  30. [30]
  31. [31]
    Deploying packages or executing commands on client hosts
    OCS Inventory NG includes a package deployment feature for client computers. From the central management server, you can upload packages which will be ...Using Ssl Certificates In... · Using Self Signed... · Using Pki With Certificate...
  32. [32]
    Introduction to OCS Deployment - OCS Inventory Documentation
    OCS deployment manages software installation/updates via a four-step process: OS selection, interactions, options, and resume. Generated packages contain ...
  33. [33]
    Deployment configuration - OCS Inventory Documentation
    In this chapter, we will get through how to configure properly the OCS Inventory deployment feature. The deployment configuration is available on Configuration ...
  34. [34]
    Using SNMP scan feature - OCS Inventory Documentation
    OCS Inventory integrates a new SNMP scan feature. The main goal of the SNMP integration in OCS Inventory is to enhance data collected by Ipdiscover.Configuring Snmp Scan · General Options · Manage Snmp CommunitiesMissing: hardware | Show results with:hardware
  35. [35]
    Plugin ocsinventoryng for GLPI - GitHub
    This plugin allows you to synchronize with GLPI inventory solution OCS Inventory NG (http://www.ocsinventory-ng.org/fr/). It replace native mode OCS of GLPI ...
  36. [36]
    Administration of OCS Inventory
    OCS Inventory NG agent for Windows is able to query the registry of inventoried computers for a value of a key or for all values of a key under registry hives ...List Of Configuration... · Using Registry Query Feature · Editing Administrative...Missing: hardware collect<|control11|><|separator|>
  37. [37]
    Introduction - OCS Inventory Documentation
    The OCS Inventory REST API helps third parties retrieve inventory information. This documentation helps with installation, configuration, and usage of the API.
  38. [38]
    [FEATURE] Integrate OCS Inventory with Grafana or Zabbix to ...
    Nov 25, 2020 · In Zabbix the OCS inventory can be used in a rudimentary way if you know which values you want to monitor.
  39. [39]
    Using FusionInventory agent on OCS Inventory-ng server 2.0rc1
    The Ocs Inventory team just released the first release candidate of their new version 2.0, with new features like UTF8 support, new web ...
  40. [40]
    Using extension engine - OCS Inventory Documentation
    To install unix agent plugin, copy the Myplugin.pm, usually located in the agent subfolder of your plugin's zip file, to /usr/local/share/perl/{perl version}/ ...
  41. [41]
    OCS Inventory NG Plugins - GitHub
    Plugins for OCS Inventory NG. OCS Inventory NG Plugins has 60 repositories available. Follow their code on GitHub.
  42. [42]
    PluginsOCSInventory-NG/example: This plugin does ... - GitHub
    A simple plugin example. This plugin does absolutely nothing. Its meant to show the OCS' extension engine possibilities.
  43. [43]
    LICENSE about Ocs Inventory Ng - Ocsinventory Q&A
    Jul 31, 2017 · We use the GPL v2 licence ( https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html ) and distribute the software free of charge.Missing: GPLv2 | Show results with:GPLv2
  44. [44]
    OCS Inventory NG download | SourceForge.net
    Rating 4.8 (18) License. GNU General Public License version 2.0 (GPLv2). Follow OCS Inventory NG. OCS Inventory NG Web Site. Other Useful Business Software. Gen AI apps are ...<|control11|><|separator|>
  45. [45]
  46. [46]
    OCSInventory-NG/UnixAgent: This is the OCS unified agent ... - GitHub
    Ocsinventory-Agent is an agent for ocsinventory NG. It supports Linux, Solaris and AIX. *BSD support is in progress.
  47. [47]
    OCS Inventory NG - GitHub
    OCS Inventory NG (Open Computers and Software Inventory Next Generation) is an asset management and deployment solution. Since 2001, OCS Inventory NG has been ...<|control11|><|separator|>
  48. [48]
    OCSInventory-NG/Wiki: Official repository for OCS Inventory ... - GitHub
    This is the new Documentation for OCS Inventory-NG since Version 2.4. English documentation. ENGLISH DOCUMENTATION. Contribution.
  49. [49]
  50. [50]
    Ocsinventory Q&A
    Welcome to OCS Inventory NG community support, where you can ask questions and receive answers from other members of the community.
  51. [51]
    OCS Inventory Documentation: OCS Inventory NG 2.x Documentation
    The OCS Inventory NG documentation has been divided into 15 sections. Prerequisites, Newbie documentation, Basic documentation, Deploying softwares and execute ...Setting up OCS Inventory Server · Setting up OCS Inventory... · Using Wake On Lan
  52. [52]
    OUCE 2014 - OCS Inventory NG Introduction - YouTube
    Jan 24, 2015 · ... events/78 http://www.ocsinventory-ng.org/en/ http://ocsinventory-ng.factorfx.com/en/Missing: conferences | Show results with:conferences
  53. [53]
    Community – OCS Inventory Professionnel
    OCS inventory has the advantage of having a vibrant and responsive community. Need support? Report a malfunction? Follow the development?<|control11|><|separator|>
  54. [54]
    Helm charts for OCS Inventory implementation on Kubernetes - GitHub
    OCS Inventory NG asks its agents to know the software and hardware composition of every computer or server. OCS Inventory also ask to discover network's ...