A wide range of administration programs for every taste!

New in the Administration category:

Free
Wakeup 1.6 is an application that allows you to turn on your computer over a network. The Wakeup application uses Wake-On-Lan (WoL) technology and to perform a power-up, you only need to select the desired computer in the list and click on the power button.

Free
NetOp Remote Control 9.0 is an application that will help you remotely control and administer other computers using a TCP / IP network or the Internet.

Free
TeamViewer 7.0.12979 is an application that will help you access your remote computer even if it has a firewall installed, ports blocked or NAT-routed for local IP addresses.

Free
Advanced Administrative Tools 5.92 Build 1610 is a large set of powerful and unique utilities for working and exploring the network. Among other things, the application is equipped with utilities: Resource Viewer, Proxy Analyzer, Email Verifier, Port Scanner, Links Analyzer, Trace Route, Whois, Network Monitor and others.

Free
Hidden Administrator 4.1.777 is an application that allows you to manage remote computers on a network or via an Internet connection.

Free
LanSpy 2.0.0.155 is a scanner for discovering computers on a network. The LanSpy application allows you to get a lot of information about your computer from the network.

Free
LanSpector 1.3.108 is a LAN application. The LanSpector application will help you view the available shared resources on the local network, as well as scan the ranges of specified ip addresses to search for commonly used services.

Free
X-NetStat Professional 5.57 is an application that provides information such as your current internet or network connections. The X-NetStat Professional application will help you track your online activities, online activities, Internet connection activities and much more at any time.

Free
IP-Tools 2.58 is an indispensable application for active users Internet, as well as administrators of any local networks. The IP-tools application consists of a large set of a wide variety of utilities that amaze with their capabilities for analyzing and collecting data from the network and computers connected to networks.

Free
Bopup Scanner 2.1.7 is an application that acts as a free network scanner. The Bopup Scanner application is able to scan the space and display all available computers, as well as the names of the logged in users, MAC or IP addresses and determine the presence of HTTP or Web servers.

Free
NetOp Remote Control 9.0 is an application that will help you remotely control and administer other computers using a TCP / IP network or the Internet. The NetOp Remote Control application allows you to use a built-in set of numerous tools that can manage and collect data about remote servers and workstations.

Free
Radmin 3.4 is the best application for secure remote control and management of reporting computers.

Free
LanShutDown 3.0.2 is an application that can shut down or restart computers connected to a network. The LanShutDown application will also help you write a message and it will be displayed to the user before the shutdown.

Free
Lan Keylogger 1.1.3 is an application that constantly monitors the Internet and the local network. The Lan Keylogger application will help track all the activities of network users and will be most useful when used by administrators with a large number of reporting computers.

Free
RAdmin Client 2.1 is a new word in the field of applications for remote administration. The RAdmin Client application will greatly facilitate the work of any administrator who controls many computers.

Free
WinGate 7.0.8 Build 3364 is an application that is an advanced firewall and mail server proxy server that will allow you to connect to the Internet on a LAN using an IP address or a single modem. The WinGate application works with protocols such as SMTP, HTTP, POP3, FTP, NNTP and others.

Free
Network inventory of office equipment 1.0 is handy application, releasing IT specialists from the duties of a routine inventory of office equipment. The application "Network Inventory of Office Equipment" makes it possible to keep records of the material part, repairs made and installed software. The application is divided into two parts: resident and server.

Free
Inventory of Computers on the Web 3.95.1755 is a tool for automatic inventory computer networks. The Network Computer Inventory program can display all information about the hardware or software in the form of a report, with the choice of any combination of parameters.

Free
AdmAssistant 1.1 is a free program with the ability to remote control computers in the local network, as well as having the ability to remove the configuration from remote computers and carry out their inventory. The program also allows you to restart or turn off the remote computer, as well as install on it necessary programs or remove unnecessary ones.

PC remote control programs are well known to any system administrator or technical support employee, since in their daily activities they are constantly faced with the task of administering servers and PCs of local network users. The most common utility for remote control of a PC is, of course, Remote Desktop Connection, which is included in the package. operating system Windows. This fact is explained not so much by functionality how much so what she is integral part OS, and therefore you do not need to purchase it separately. As for the functionality of this utility, in practice it is usually not enough, so specialized third-party software packages are often used. In this article, we will consider specialized software packages designed for remote control of computers.

If you try to classify remote control programs, then they can be conditionally divided into two types: utilities that provide access to the desktop of a remote PC, and utilities that provide access to the command line of a remote PC. The first of these provide users with the ability to work with a remote PC in the same way as with a local one. Utilities of the second type allow you to automate the operation of the network by running on several selected computers on the network the same or different applications, as well as, for example, create a schedule for launching programs on remote PCs. It is completely pointless to try to compare these two types of utilities, as they are used in different situations and for different purposes.

Note that most remote control programs operate on the "client-server" principle, that is, they imply the presence of the server and client parts of the program, which are respectively installed on the managed computer and on the PC from which the control is performed. To gain control over a remote PC, it is necessary that the appropriate program module (server part) be launched on it. Some remote management utilities allow you to remotely install the server part (if you have the appropriate administrative rights), and sometimes this procedure is completely transparent to the local PC user (as a rule, in this case, the server part is installed as a service on a remote PC). But some utilities require a "manual" installation of the server part of the program.

In this article, we will present to your attention remote control programs focused on use with Windows platforms. It should be noted that in the process of preparing the publication, we looked through several dozen utilities for remote control of a PC (fortunately, finding them on the Internet is not difficult). However, as it turned out, not all utilities are efficient and generally deserve mention. Therefore, we will focus only on those that really work and have been tested by us in a real local network.

Anyplace Control 3.3 (www.anyplace-control.com )

Anyplace Control 3.3 is a client-server application.

The Host module is installed on the managed PC, and the Admin module of the program is installed on the PC from which control is performed. Of course, it is possible to simultaneously install both modules on any PC in the local network. But the most interesting thing is that the Anyplace Control 3.3 program provides the ability to remotely install the Host module on any computer on the local network. And all that is needed for this is to select a computer on the local network and start the procedure for remote installation of the Host module. Naturally, for this you need to have administrator rights.

Note that the Anyplace Control 3.3 program supports the Russian-language interface.

Anyplace Control 3.3 allows you to work in two modes: view and control. In the first mode, it is possible to display the desktop of a remote PC on the screen and observe the user's actions, and in the control mode, it is possible to completely intercept control of the remote PC. An interesting feature of the remote control mode is that the work of the remote PC user himself is not blocked. However, in both modes, the user of the remote PC receives a notification in the form of an icon in the system tray that his computer is "under the hood".

To connect to a remote PC, you must first select it from the list. The built-in scanner allows you to display all computers on the local network (domain or working group), and you can configure the filter to display only PCs that already have the client part of the program installed, that is, those that can be connected to.

After selecting the computers to which you want to connect, they are added to the list and become available for remote management (Fig. 1).

Rice. 1. The main window of the Anyplace program
Control 3.3 with a displayed list of computers,

The undoubted advantage of this utility is that it allows you to remotely control several PCs at the same time. In this case, it is possible to simultaneously execute commands such as shutdown, reboot and end the user session on managed PCs.

To prevent unauthorized access to the PC during the installation of Anyplace Control 3.3, you can set a password to access the managed computer. Other interesting features of the program include setting up traffic encryption for remote PC control and the use of a shared clipboard between the managed computer and the PC from which the control is performed. True, it will not work to transfer pictures through this buffer, but text fragments are transferred without problems.

In conclusion, we note that the demo version of Anyplace Control 3.3 is valid for 30 days after installation. Price full version program depends on the number of PCs on which it is installed, at the rate of $17.5 per PC.

Access Remote PC 4.12.2 (www.access-remote-pc.com )

The Access Remote PC 4.12.2 utility also belongs to the category of client-server applications and allows you to intercept the desktop and get full access to any PC where the server part of this program is installed from any other computer (Fig. 2). Note that the server part of the program is installed on the managed PC, and the client part is installed on the computer from which the control is performed. When installing the server part of the application on computers subject to remote control, the user name for which remote control is authorized and the access password are specified.

Rice. 2. Transfer files between computers
in the Access Remote PC 4.12.2 utility

The Access Remote PC 4.12.2 program provides the ability to control computers both over a local network and over the Internet, and even through modem connections. With remote control of the computer, the work of the local user is not blocked, and the local user can find out that the computer is controlled from the outside, as well as who exactly controls the computer, by the icon in the system tray. In addition, the server part of the program allows, if necessary, to disconnect all remote users from the PC, change passwords, and view statistics for each remote control session.

Access Remote PC 4.12.2 provides two modes of operation: full control mode of the remote PC and monitoring mode.

The disadvantages of this utility include the impossibility of remote simultaneous control of multiple PCs using a single interface. However, you can run multiple connection sessions at the same time (each in its own window), and then you can manage multiple remote computers. Another drawback of the program is the impossibility of remote installation of its server part.

The advantages of Access Remote PC include the fact that it can work with firewalls, supports dynamic IP addresses and, importantly, practically does not slow down even on slow network connections, including modem ones. Besides this utility allows you to easily transfer files between computers, for which a special Transfer Files mode is provided (Fig. 2), and also supports working with the clipboard, that is, it allows you to synchronize clipboards on the local and remote PC, which simplifies the transfer of text fragments between PCs. Another advantage of the program is the support for encryption when transmitting data using the RC4 algorithm with a 160-bit key.

The free version of the program is fully functional, but the number of launches is limited - only 30 times.

LanHelper 1.61 (www.hainsoft.com)

LanHelper 1.61 (Fig. 3) is a small utility that allows you to automate the process of managing a local network.

Rice. 3. Main window of LanHelper 1.61 utility

With its help, you can remotely shutdown or restart several computers on the network at the same time. Applications can be launched on remote PCs (if they support launching from command line), in addition, the simultaneous launch of the same applications on a group of managed PCs is supported.

The LanHelper utility has a built-in set of commands that can be executed on remote PCs (Figure 4). At the same time, it is possible to specify the time when the application is launched, and the time interval according to which applications are launched on the PC (minimum interval 1 minute). You can also schedule applications to run on remote PCs. The most important advantage of the program is that it does not require installation of the client part on remote PCs to implement all its features.

Rice. 4. Remote command execution
simultaneously on multiple computers
using the LanHelper 1.61 utility

In addition to remote command execution, the LanHelper 1.61 utility allows you to view, start and stop various services on remote PCs (Fig. 5), as well as send messages to users (to implement this feature, you must activate the Messenger service on all PCs).

Rice. 5. Working with services on a remote PC
using LanHelper 1.61 utility

To implement the ability to run applications and execute commands on remote PCs, you must have administrator rights.

The demo version of LanHelper LanHelper 1.61 has a limited validity period of 30 days and a license price of $49.95.

DameWare NT Utilities 5.5.0.2 (www.dameware.com)

DameWare NT Utilities 5.5.0.2 is a powerful system remote administration local network. It is based on the complex Microsoft utilities Windows NT administration utilities, united by a very convenient single interface. Most of the utilities included in the package from the set Microsoft Windows NT administration utilities have advanced features, and in addition, it has a number of unique utilities. In particular, the package includes the DameWare Mini Remote Control utility, which allows you to fully control the desktop of a remote PC, as well as a utility for implementing command line mode on a remote PC.

When DameWare NT Utilities 5.5.0.2 is launched, the entire network is automatically scanned and the main program window displays all available domains and workgroups, as well as computers in the selected domain/workgroup (Fig. 6).

Rice. 6. Main window of DameWare NT Utilities 5.5.0.2

Let's briefly list the features of the DameWare NT Utilities 5.5.0.2 package: with its help, you can view information about hard drives on remote PCs, get acquainted with the contents of the Event Log, view information about connected printers, about running processes and services, about installed apps, gather detailed information about PC configuration, receive service information about PCs activated by users, and much more. There are also additional features: you can quickly edit the registry on a remote PC, send messages to users via the Messenger service, remotely shut down or restart computers, and, as already mentioned, take full control of a remote PC through the command line or desktop.

The undoubted advantage of this software package is that for the implementation of remote control it is not required to manually install the client part of the program on a remote PC. When you try to control a remote PC through the desktop or command line, DameWare NT Utilities 5.5.0.2 automatically prompts you to install and start the required service on the remote PC. In this case, the user of this remote PC will find out about the interception of control in a pop-up window that displays information about which particular PC the remote control is being performed from.

The advantages of DameWare NT Utilities 5.5.0.2 include the ability to simultaneously connect to multiple computers to manage them, as well as the fact that the remote control does not block the work of a local user.

In general, this software package is a powerful and convenient network management tool.

The demo version of the program is fully functional, but with a limited validity period of 30 days. The price per license is $289. Alternatively, you can purchase the DameWare Mini Remote Control package separately for remote control of computers via the desktop, one license will cost $89.95.

Omniquad Instant Remote Control 2.2.9 (www.omniquad.com )

Current version Omniquad Instant Remote Control - 2.2.9 - is far from new, but still remains one of the best in its class.

The Omniquad Instant Remote Control 2.2.9 utility allows you to get full control over a remote PC through the desktop. Distinctive feature of this utility is that it does not require installation of the client part on the managed PC. When accessing a remote PC, the corresponding service is initially launched on it in hidden mode, and the user of the PC controlled using this program does not receive any notification and has no way of knowing that control of his computer has been intercepted. This allows you to use this utility for covert monitoring of user actions. Note that not all remote control utilities have the ability to control a PC without prior notice to the user.

When the program starts, the network is automatically scanned, and the computers in the network environment are displayed in the main program window (Fig. 7). After selecting any computer by pressing the Remote Control button, control of the remote PC is intercepted. The work of the local user is not blocked. In addition, it is possible to launch this utility in the mode of monitoring the desktop of a remote PC.

Rice. 7. The main window of the Omniquad Instant Remote Control 2.2.9 utility

Note that for remote control, you must have the appropriate rights to access the PC. If you use a firewall (Firewall) on a remote PC, you must open port 6003, which is used by this utility by default. In addition, you can assign any other port to Omniquad Instant Remote Control (and open ports can be scanned).

The disadvantage of the program is that it does not support simultaneous connection with several remote computers.

The demo version of the utility has a limited validity period of 30 days, the license price is $39.

EMCO Remote Desktop Professional 4.0 (www.emco.is )

In terms of functionality, this product (Fig. 8) is somewhat similar to DameWare NT Utilities 5.5.0.2. The EMCO Remote Desktop Professional software package is a set of functional tools to implement remote control of the local network and monitor its status.

Rice. 8. Main window of EMCO Remote Desktop Professional utility

When you start the program, you can activate a network scanner that allows you to collect detailed information about all computers on the local network, about the applications installed on them, about running processes, about the versions of the existing operating system, about the installed equipment, etc. In addition to automatically collecting information about network computers (this process takes a long time), PCs can also be added to the list manually.

The package allows you to remotely start and stop services, restart and shut down computers. The most interesting feature of this program is the ability to gain full control over a remote computer - to do this, just select the desired computer in the list and go to the Viewer tab. If you are managing a computer for the first time, then you need to install the NetServer service on the remote PC. This procedure is carried out remotely and is completely invisible to the local user. Once the NetServer service is running on a remote PC, you can connect to it, take full control of the management, and then work with the remote PC in the same way as with the local one. When managing a computer remotely, the work of a local user is not blocked; however, if you use the mouse at the same time, it is unlikely that anything will work.

Because the local user is not notified that the computer is being controlled from outside, EMCO Remote Desktop Professional can be effectively used to covertly monitor user activity.

Another important advantage of the program is that it allows you to remotely control multiple PCs at the same time. In this case, a special window is assigned for each connection session with a remote PC.

Among the shortcomings of this program, we note the complexity of its configuration when using Windows XP SP2 on a managed PC. Moreover, as practice shows, the need for configuration depends on which patches are installed. Of course, the program comes with step-by-step instruction those changes that will have to be made in this case (more precisely, the program downloads the appropriate instructions from the site), but all this is rather inconvenient and impractical.

The demo version of the program is designed for 30 days and supports only 25 computers on the local network. The package price depends on the number of computers in the network: 50 computers (minimum quantity) - $135; 1000 computers - $1295

Radmin 3.0 Remote Control (www.radmin.com)

Of all the products we reviewed, Famatech's Radmin 3.0 Remote Control utility is the "freshest" - its a new version came out in early 2007.

This utility is designed to monitor and gain full control over a remote PC within a local network.

Radmin 3.0 Remote Control is equipped with only the most necessary tools for managing a remote PC and is very easy to configure (Fig. 9). Thanks to this, it is easy to master it. The utility works on the principle of a client-server application and includes two parts: the first (server) part is installed on the managed PC, and the second one is installed on the PC from which it is controlled.

Rice. 9. Main window of the Radmin 3.0 Remote Control utility

The disadvantages of the program include the lack of built-in tools for remote installation of the server part (Radmin Server) on a managed PC, so if you need to gain control over any PC on the network, you will first have to install the appropriate module on it locally.

A serious, in our opinion, disadvantage of this utility is the lack of a built-in network scanner, which does not allow you to get a list of PCs that you can connect to.

Well, the last drawback that was discovered during testing of this program is that for the utility to work correctly, you need to configure or simply disable the Firewall on the managed PC if it uses Windows XP SP2.

The utility works in several modes: file transfer, full control, view only, Telnet, shutdown and command line mode. There is a built-in file manager, with which files are transferred from one PC to another. The program keeps statistics of the traffic used and can encrypt data.

With the help of Radmin 3.0 Remote Control, you can manage both one remote computer and several at once, while each one has its own password. To provide an increased level of security, you can take additional precautions: enable password protection and create a list of banned IP addresses.

The latest version of the program has a lot of interesting innovations:

  • support for Windows Vista;
  • text and voice chat with the possibility of conferences and private messaging and password protection;
  • enhanced security that provides protection against attacks and protection of active data on the network;
  • different access rights for each user;
  • IP filters to restrict access to specific IP addresses and subnets.

In general, it should be noted that this utility loses in its functionality to similar remote control utilities. Lack of a built-in network scanner, the need local installation module Radmin Server - all this significantly limits its functionality.

In conclusion, we note that the cost of a license for Radmin 3.0 Remote Control is $49 per PC.

Atelier Web Remote Commander 5.59 (www.atelierweb.com)

Atelier Web Remote Commander 5.59 (fig. 10) is a small utility that, by design, should provide complete control of a remote PC. It consists of two parts and works on the "client/server" principle. In addition, it provides the ability to remotely collect information about the hardware configuration of a PC, etc. However, it hardly makes sense to list all the features of the utility in this case, since it is so crude that it is unlikely to be used.

Rice. 10. Information window of the utility
Atelier Web Remote Commander 5.59

Of the obvious shortcomings, one can single out the lack of reference. In addition, the program does not have a built-in network scanner, which makes it necessary to explicitly enter the name or IP address of the computer to which you want to connect, which is extremely inconvenient. But the main drawback is that in order to connect to a remote PC, you first need to install the appropriate program module on it (there are no built-in tools for remote installation) and somehow configure it.

Unfortunately, no matter how we set up the program, to implement remote connection we never succeeded (the connection was made via a local network between two computers running Windows XP SP2). Although the program is paid (the demo version has a limited validity period), it is absolutely useless and inoperable. Our verdict - "into the furnace" such programs.

Remote Desktop Control 1.7 (www.remote-desktop-control.com )

The Remote Desktop Control 1.7 program belongs to the category of client-server applications, that is, the Host module of the program is installed on the managed PC, and the Admin module is installed on the PC from which control is performed.

In terms of its interface (Fig. 11) and functionality, the Remote Desktop Control 1.7 package is very similar to Anyplace Control 3.3, but it also has some important differences (and for the worse), for example, it lacks the ability to implement remote installation of the Host module on any local computer. networks. In addition, for the Remote Desktop Control 1.7 package to work, it is necessary to configure the Firewall on the managed computer (to add the program to the list of allowed ones), while the Anyplace Control 3.3 program does this automatically.

Rice. 11. Main program window
Remote Desktop Control 1.7 with a displayed list of computers,
to which you can connect remotely

In terms of functionality, Remote Desktop Control 1.7 is similar to Anyplace Control 3.3: it allows you to work in two modes: view and control; in view mode, you can display the desktop of a remote PC on the screen and observe user actions, and in control mode, you can completely intercept control of a remote PC.

Utilities allow you to remotely control multiple PCs at the same time. This provides for the simultaneous execution on managed PCs of such commands as shutdown, reboot and end the user session.

In conclusion, we note that the demo version of Remote Desktop Control 1.7 is valid for 30 days after installation. The price of the full version of the program depends on the number of PCs on which it is installed - $15 per PC.

TightVNC for Windows 1.3.8 (www.tightvnc.com)

TightVNC for Windows 1.3.8 is an absolutely free utility for remote computer control, which works on the principle of "client-server" and has two modules: TightVNC Viewer and TightVNC Server. The TightVNC Server module is installed on the managed PC, and the TightVNC Viewer is installed on the managed PC. There are no tools to remotely install the TightVNC Server module. In addition, before starting work, you must configure the TightVNC Server module by specifying a connection password. To connect to a remote PC, just specify its DNS name or IP address and select the connection type (Fig. 12).

Rice. 12. Connecting to a remote PC using the utility
TightVNC for Windows 1.3.8

The only function of TightVNC for Windows 1.3.8 is to get full access to the desktop of a remote computer and control it using the mouse and keyboard. Given that the utility is absolutely free, it can be recommended to home users.

UltraVNC 1.0.2 (www.uvnc.com)

The UltraVNC 1.0.2 utility is another absolutely free, but nevertheless very effective utility for remote control of a PC, working according to the "client-server" scheme. The UltraVNC Server module is installed on the managed computer, and the UltraVNC Viewer module is installed on the computer from which the management is performed. There are no tools for remote installation of the UltraVNC Server module in the program, so you need to install the modules locally.

The UltraVNC Server module has a lot of settings (Fig. 13) and allows you to set a password for the connection, select the ports used, etc.

Rice. 13. Configuring the UltraVNC Server module

When accessing the desktop of a remote PC in full control mode, the work of the local user is not blocked. In addition, the UltraVNC 1.0.2 utility offers a number of additional features. For example, there is a built-in chat with which you can exchange messages with a remote PC. It also provides the ability to transfer files. In addition, the UltraVNC 1.0.2 utility provides encryption of transmitted data, for which key exchange between computers is provided.

In general, it can be noted that the UltraVNC 1.0.2 utility is a highly efficient tool for remote PC control and can be recommended for both home users and corporate use (especially considering that the utility is free).

RealVNC (www.realvnc.com)

There are three versions of the RealVNC program: Free Edition, Personal Edition and Enterprise Edition, which differ from each other in functionality and cost.

RealVNC Free Edition has minimal functionality and is absolutely free. Actually, in this case we are talking only about the possibility of gaining access to the desktop of a remote PC.

RealVNC Personal Edition offers a number of additional features. First of all, this is traffic encryption using the AES algorithm with a key length of 128 bits (Fig. 14), and automatic generation of the encryption key is supported. In addition, it is possible to use user authentication, as well as transfer files between computers, and much more.

Rice. 14. Setting up traffic encryption
and user authentication
in RealVNC Personal Edition

A distinctive feature of the RealVNC Enterprise Edition variant is its multiplatform nature. That is this program, having all the functionality of RealVNC Personal Edition, can be used to remotely control computers running Linux, Solaris, HP-UX and MAC, as well as Windows 95/98/Me/NT 4/2000/XP/2003/ Vista.

The cost of the RealVNC program depends on the number of licenses (number of managed computers) and on the delivery option. For example, the Personal Edition costs $30 per license, while the Enterprise Edition costs $50 per license.

Hidden Administrator 1.5

The Hidden Administrator 1.5 program (Fig. 15) is another free program for remote control of computers, and, as the name suggests, it allows covert monitoring of computers.

Rice. 15. Main window of the Hidden Administrator 1.5 utility

The program works on the principle of "client-server". The server part is installed on a managed computer, and there are no tools for remote installation.

In addition to the function of gaining access to the desktop of a remote computer in full control mode, Hidden Administrator 1.5 offers a number of additional features: get information about the configuration of a remote PC, exchange files with a remote PC, send messages to a remote PC, turn off or restart a remote computer, work with registry of a remote PC, receive and send the clipboard, run programs on a remote PC, and much more (Fig. 16). Listing everything that this program is capable of would take a lot of time. Note that the only thing she can't do is encrypt traffic. Naturally, it is possible to set a password for connecting to a remote PC and even configure an IP filter on computers from which remote control is possible.

Rice. 16. Select action with remote PC
in Hidden Administrator 1.5

This utility is the best in its class and can be recommended to home users.

Built-in OS and software administration tools are often not always convenient or functional, so the system administrator's arsenal eventually acquires useful utilities that simplify some tasks. At the same time, many solutions are available completely free of charge and cover a variety of aspects of system administration: from configuring certain parameters, managing audit accounts, troubleshooting, and Reserve copy. With their help, you can not only ensure the smooth operation of your IT infrastructure, but also make it more efficient and secure. Consider the 15 most useful solutions affecting different areas of administration.

Advanced IP Scanner

The system administrator must know everything about the systems operating on the network and quickly access them, but using network environment Windows cannot do this. This task can be solved by the Advanced IP Scanner program (radmin.ru/products/ipscanner), designed for fast multi-threaded scanning of a local network. AIPS is provided completely free of charge, without any reservations. The program is very simple and easy to use. After starting, AIPS checks the IP network interfaces of the PC on which it is installed and automatically prescribes the IP range in the scan settings, if IP does not need to be changed, then it remains just to start the scan operation. The result is a list of all active network devices. For each, all possible information will be collected: MAC address, manufacturer network card, network name, logged in user, available shares and services (shared folders, HTTP, HTTPS and FTP). Almost all scanning parameters can be configured - change the speed, exclude scanning of a certain type of network resources (shared folders, HTTP, HTTPS and FTP) and the Radmin server. You can connect to any resource with one click, you just need to mark it in the list. AIPS is also integrated with Radmin program and during the scan it finds all machines running Radmin Server. The scan result can be exported to a file (XML, HTML or CSV) or saved to Favorites (supported by Drag & Drop) and then access the desired PC as needed without rescanning the network. If the remote device supports the Wake-On-Lan function, it can be turned on and off by selecting the appropriate menu item.
AIPS is supported on any computer running under Windows control, the program has the status of Microsoft Platform Ready, Windows 7 Compatible.

NetWrix Inactive Users Tracker

NetWrix, a company specializing in the development of solutions for auditing IT infrastructure changes, offers system administrators 10 free and very useful utilities (goo.gl/sfQGX) that can significantly simplify the administration of Windows OS. For example, NetWrix Inactive Users Tracker (goo.gl/jWEj9) allows you to solve one of the most pressing security problems - the presence of inactive accounts that no one uses for some time (dismissed employees, business trip, promotion, temporary, etc.) . The IT department is rarely warned about changes, but such an account can easily be used by an attacker or simply “come back” by a fired employee. The utility periodically checks all accounts in domains and reports those that have not been accessed for a certain number of days. AT Free versions as actions, it is possible to specify only a warning by email (it is enough to set the SMTP parameters), the admin performs all other operations manually, although a warning is enough in our case. In paid available - automatic installation random password, account deactivation and moving to another OU, and an OU filter to search for accounts. The PowerShell cmdlet get-NCInactiveUsers is offered separately, which allows you to get a list of inactive users (by checking the “lastLogon” attribute) and simplify writing the corresponding scripts.

WinAudit Freeware

WinAudit is a free utility (also for commercial use) from Parmavex Services (pxserver.com/WinAudit.htm) that allows you to perform a complete system audit. Does not require installation, can also be run on the command line. The program has a simple and localized interface, can be run on all versions of Windows, including 64-bit ones. The data itself is collected for about a minute (may vary depending on the operating system and computer configuration), the resulting report consists of 30 categories (can be customized). As a result, the administrator can get data: about the system, installed software and updates indicating the version and vendor, connected devices, a list of open network ports (number, service, program, etc.) and open folders, active sessions, security settings, access rights to peripherals , accounts and groups, list of tasks/services, startup programs, log entries and system statistics (uptime, memory usage, disk usage) and much more. In fact, everything that is usually required in the process of work. You can also set the search for specific files by name. For example, to find music and videos on the user's hard drives, it is enough just to set the appropriate extensions (avi, mp3, etc.). The result can be opened as a web page, exported to a file of many popular formats (xml, csv, pdf, text), database (using a wizard, all popular MS SQL, MS Access, MySQL, Oracle and others are supported), sent by email and print.

Computer Accounting CheckCfg

The problem of accounting for office equipment and the software used is acute in any organization, it can be solved in different ways, one of the options is offered by the developer of CheckCfg (checkcfg.narod.ru) Andrey Tatukov. This solution periodically collects hardware, OS, and software data, including CPU type, RAM size, disk space, S.M.A.R.T. status, modem connection information, and more. At the same time, CheckCfg is easily managed with several hundred computers. The result is displayed in a convenient tree form, local directories are easy to access. All PCs can be assigned an inventory number, if necessary, it is easy to generate a report in RTF format. CheckCfg consists of several components. For the direct collection of data about the computer, CheckCfg is “responsible”, which starts at OS startup and writes the result to a file. Management and archiving of information is carried out using the accounting program - Sklad, which processes the files created by CheckCfg and saves it to its database, after which it is possible to generate reports. Using the Sklad_w program, you can conveniently view the current computer configurations and basic data on office equipment (by IP addresses, CPU, Memory, software). To analyze changes in the PC configuration and notify the administrator about this, another utility is used - Doberman. The setting may not seem quite native, since you have to manually create the necessary configuration files, but the description on the site and the available templates allow you to deal with everything without any problems.
CheckCfg is distributed free of charge on an "as is" basis, without the consent of the author, it is prohibited only to sell programs to third parties or change the code of programs.

MailArchiva Open Source Edition

Business processes in any modern company, regardless of size, are inconceivable without e-mail. This is a very convenient tool for exchanging information, both within the enterprise and with external correspondents. Some mail servers, like MS Exchange, have mail archiving features that allow you to find old messages if necessary, including when investigating incidents to identify leaks confidential information. In other cases, you have to provide desired functions on one's own. A solution option is the development of MailArchiva (mailarchiva.com), which provides the necessary functionality and is compatible with most modern mail servers, including Lotus Domino, MS Exchange, MDaemon, Postfix, Zimbra, Sendmail, Scalix, Google Apps and others. It is possible to archive via SMTP, IMAP/POP3, WebDAV and via Milter (the program has a built-in SMTP and milter server, IMAP/POP client). In order not to collect all mail, you can create any archiving rules. There are three levels of access to saved data - user (only own mail), administrator (settings and own mail) and auditor (all mail, can be limited by rules). The OpenSource version of MailArchiva (openmailarchiva.sf.net) also includes intuitive search functionality, including among attachments (Word, Powerpoint, Excel, OpenOffice, PDF, RTF, ZIP, tar, gz). MailArchiva runs on a variety of operating systems - Windows, Linux, OS X and FreeBSD.

Performance Analysis of Logs

In case of problems with system performance, it is very difficult to detect a bottleneck using the standard Windows Performance Monitor without experience. In order to understand what metrics need to be taken and how to correctly interpret the result, you will need to read the documentation. The PAL (Performance Analysis of Logs, pal.codeplex.com) utility makes this task much easier. Once launched, it scans the logs and analyzes them using built-in templates. Currently there are settings for most popular MS products - IIS, MOSS, SQL Server, BizTalk, Exchange, Active Directory and others. After launch, the administrator activates the necessary counters in the PAL Wizard by simply selecting a template from the list of suggested ones, specifies the current server settings (number of CPUs, etc.), the analysis interval and the directory for saving the result. After launch, after a while it receives a detailed report in HTML and XML containing a description, counter name, and indicators (Min, Avg, MAx and Horly Trend). The report can then be easily copied to any document. The only thing is that you will still have to understand the collected parameters on your own. Although if PAL shows that the characteristic is in the green sector, you should definitely not worry. The request itself is stored in the PAL.ps1 PowerShell script, which can be saved for later use. Templates are XML files, taking any as an example, you can create your own. To edit the parameters in the template, a built-in PAL Editor is offered.
Win7 is officially supported, but works on all OS from MS starting from WinXP (32/64). Installation requires PowerShell v2.0+, MS . NET Framework 3.5SP1 and MS Chart Controls for Microsoft .NET Framework 3.5.

Create an Access Point with Virtual Router

The situation when a computer with a WiFi card needs to be turned into an access point is by no means rare today. For example, you need to quickly connect computers on the network or expand the WiFi coverage area. Initially, the operation of the network card was provided only in one of two modes: point-to-point, when clients connect to each other or as an access point. No other options were offered. But in Win7 / 2k8 (except for Win7 Starter Edition) it became possible to virtualize network connections, when you can create several WiFi modules with their own settings using one physical wifi adapter. That is, such a computer works in wireless network and at the same time is also an access point. The corresponding technologies are called Virtual Wi-Fi (Intel has My WiFi), when one of the adapters can be configured in Software Access Point (SoftAP) mode. The connection to this virtual hotspot is secured using WPA2. Most WiFi cards compatible with new operating systems usually support this mode. You can turn a Win7 / 2k8R2 PC into an access point using the Netsh console utility and through the Network and Sharing Center, although many do not like to mess around with setting all the parameters. Therefore, we can recommend the Virtual Router application available in CodePlex (virtualrouter.codeplex.com) which has a clear GUI and very simple settings. After starting Virtual Router, you only need to specify the SSD and password for access, and then activate the access point. If necessary, you can also stop the hotspot by pressing one button. Additionally, the window displays the current connections to the point, for each you can set your own icon and change some parameters.

Managing RDC Connections - RDCMan

For remote control of servers and PCs running under Win, the Remote Desktop Connection snap-in is used. If connections with various settings a lot, then working with her is somewhat inconvenient. Instead of saving individual settings for each computer, you can use free tool Remote Desktop Connection Manager (RDCMan) automates this process somewhat. You can download RDCMan from goo.gl/QHNfQ. After launch, you should specify the RDG connection settings, which will be used by default and inherited by everyone. Here we set the general credentials, gateway, screen settings, security settings and much more. Next, we create the required number of system groups (for example, by purpose, location, OS version, etc.) for each, specific connection settings are specified that are different from the general ones and which will be inherited by those included in the PC. And the last step is to fill the groups with systems. To add a server, enter only it Domain name, although if any parameter differs from the group settings, it can be immediately overridden. If necessary, systems can easily be moved between groups by drag and drop. If there are many systems, it is easier to prepare text file, specifying one name per line, and then feed it to the utility. Now to connect, just select desired server and the Connect item in the context menu. You can activate multiple connections at the same time by switching between them. If space is tight, the window can be easily detached. Any operating system that supports RDC 6 and higher will work.

Free Active Directory Tools

Managing many Active Directory settings using standard tools is not always easy and convenient. In some situations, the kit will help Utilities Free Active Directory Tools (goo.gl/g11zU) developed by ManageEngine and distributed free of charge. The kit consists of 14 utilities launched from one shell. For convenience, they are divided into 6 groups: AD USer Report, SharePoint Report, User Management, Domain and DC Info, Diagnostic Tools and Session Management. For example, running the Empty Password User Report will allow you to get a list of accounts with empty passwords, GetDuplicates - get accounts with the same attributes, CSVGenerator - save to csv file Active Directory account information. And also: last login time report, request-based AD data retrieval, reports on SharePoint installations, local account management, viewing and editing domain password policies, getting a list of domain controllers and their roles, managing their replication, monitoring their work (loading CPU, RAM, hard drives, performance, etc.), DMS port status, terminal session management, and much more. Installing and using FADT is very simple, some utilities require PowerShell to run. It should also be noted that ManageEngine offers several other useful packages for the administrator, a list of which can be found on the company's website.

Comodo Time Machine

The ability to restore the system using System Restore has been built into Win since XP, but its functionality is limited, to put it mildly, so backups are often used third party applications. Free utility Comodo Time Machine (comodo.com) allows you to roll back the OS to any previous state. And it will work even if the OS has completely stopped loading. During the CTM process, restore points are created (manually or scheduled) to which all modified system files, registry, and user files. The latter has a big advantage over System Restore, which saves and restores only system files and the registry. The largest space is occupied by the first copy, the rest save only changed files. To save space, you should periodically create a new checkpoint by deleting old archives. To be able to restore the OS, information about the CTM is written to the boot sector, to call the corresponding menu, just press the Home key. You can also restore the OS state according to a schedule, for example, configure the behavior of the utility so that at each reboot an automatic rollback to a “clean” version of the system is performed. This will be useful, for example, in Internet cafes, where users leave a lot of garbage in the system. Except full recovery OS can get an earlier version of any file from the archive. Search is implemented, so you can find the necessary data without problems.

Amanda

The task of centralized backup of workstations and servers running Windows and *nix can be solved using AMANDA (Advanced Maryland Automatic Network Disk Archiver, amanda.org). Initially, Amanda was created to work with tape drives, but over time, improvements have appeared “virtual tapes” (vtapes) that allow you to save the collected data on hard drives and CD/DVD. AMANDA is a handy add-on to the standard Unix dump/restore programs, GNU tar, and a few others. Therefore, its main characteristics should be considered based on the capabilities of these basic utilities. Works on a client-server scheme. All available authentication methods are used to access computers: Kerberos 4/5, OpenSSH, rsh, bsdtcp, bsdudp, or a Samba password. To collect data from Windows systems also used as a special agent or as a variant of Samba. To collect data, its own protocol is used running over UDP or TCP. Compression and encryption (GPG or amcrypt) of information can be done both directly on the client and on the server. All redundancy settings are made exclusively on the server, the delivery includes ready-made templates so it's very easy to understand.

Core Configurator 2.0 for Server Core

The initial configuration of a server running Win2k8R2 in Server Core mode is done in the console using commands, so beginners are not very fond of this mode. To simplify the task, the OS developers have added an interactive SCONFIG.cmd script that allows you to configure the basic system settings. But as they say, the best is the enemy of the good. Codeplex has a wonderful Core Configurator (coreconfig.codeplex.com). For its operation, you will need the NetFx2-ServerCore, NetFx2-ServerCore and PowerShell components. After starting Start_CoreConfig.wsf, we get a menu in which we find several items that provide access to the main settings that would have to be controlled from the command line: product activation, setting the screen resolution, clock and time zones, network interface, setting permissions for remote RDP connections, local account management, settings Windows Firewall, enable / disable WinRM, specify the computer name, workgroup or domain, configure roles and features, Hyper-V and run DCPROMO. All in a very understandable way. If you select the Load at Windows startup checkbox, then the program will be loaded along with the system.

Exchange 2010 RBAC Manager

Exchange 2010 introduces a new role-based access model that allows very precise control of the privilege level for users and administrators depending on the tasks performed and uses three different ways issuance of permits. The only negative is that the built-in management tools using PowerShell cmdlets may not seem convenient and understandable to everyone. More advanced is the free Exchange 2010 RBAC Manager (RBAC Editor GUI, rbac.codeplex.com) tool, which offers a clear graphical interface for configuring the properties of all roles. Probably even a beginner can understand its features. The program is written in C# and uses Powershell. To work, you will also need the installed Exchange 2010 Management Tools.

PowerGUI

It's no secret that when PowerShell appeared, it immediately won the sympathy of Win-admins, who have long demanded a similar tool to automate many tasks. But as usual, in the first version, we were not offered a clear editor, so several projects solved this gap. The best of them today is PowerGUI (powergui.org), provided completely free of charge, providing a convenient graphical interface for efficiently creating and debugging PowerShell scripts. A number of functions allow you to automate many tasks. At the same time, developers offer ready-made sets of scripts for solving many problems that can be used in their developments.

Multi-Tabbed PuTTY

The freely distributed PuTTY client is well known to admins who need to connect to remote machines using the SSH, Telnet or rlogin protocols. This is a very handy program that allows you to save session settings for quick connection to the selected system. PuTTY was originally developed for Windows, but later ported to Unix. The only thing is that with a large number of connections, the desktop is loaded with many open windows. This problem is solved by the Multi-Tabbed PuTTY add-on (ttyplus.com/multi-tabbed-putty) that implements the tabbed system.

Each system administrator sometimes has to service the computers of friends or make home visits. In this case, a proven set of utilities helps him. Our review will only talk about free ones that do not require installation and have become the de facto standard.

autoruns

This program became the hallmark of Mark Russinovich and Winternals Software (better known by the name of the site - Sysinternals.com), long ago absorbed by Microsoft. Now it is still developed by the author, but legally belongs to the technical department of Microsoft. The current version 13.3 was written in April 2015. With v.13.0, the program has not only become more convenient, it has received a number of new features, in particular advanced filtering tools, integration with other system utilities and online services.

Autoruns displays the most complete and most detailed list startup components, regardless of their type. The utility shows how to load all drivers, programs (including system ones) and their modules by registry keys. It even generates a list of all extensions Windows Explorer, toolbars, auto-started services, and many other objects that usually elude other similar programs.

Color coding helps you quickly identify standard components in a list of hundreds of entries that have a digital Microsoft signature, suspicious files, and erroneous lines that refer to non-existent files. To disable the ability to autorun any component, just uncheck the box next to it on the left.


Ghosts of autorun objects in Autoruns are highlighted in yellow

Some components are automatically loaded only when you log in with a specific account. In Autoruns, you can select the entries corresponding to each account and view them separately.

The command line mode also deserves attention. It is extremely convenient for exporting a list of startup items to a text file, creating advanced reports, and selective anti-virus scanning of all suspicious objects. Full help can be read on the site, but here I will give an example of a typical command:

Autorunsc -a blt -vrs -vt > C:\Autor.log
Here `autorunsc` is a program module that runs in command line mode. The `-a` option indicates that the objects to check are listed after it. There are three of them in the example: b - boot execute (that is, everything that is loaded after the system starts and before the user logs in); l - logon, specific user startup components and t - scheduled tasks. If you specify an asterisk (*) instead of the blt enumeration, then all startup objects will be checked.

The `-vrs` and `-vt` switches specify the mode of operation with the VirusTotal online service. The first set sends only those files that do not have digital signature Microsoft and which have not been previously verified. If at least one antivirus out of fifty considers the file to be malicious, a detailed report will open in a separate browser tab. The second set of keys is needed so that each time the tab with the user agreement on the use of the VirusTotal service does not open and you do not have to confirm agreement with it.

The Autorunsc report is usually obtained in tens and hundreds of kilobytes. It is inconvenient to read it on the screen, so in the example the output is redirected to a log file. This is the usual text format encoded in UCS-2 Little Endian. Here is an example of a record from it with one false positive:

HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Adobe ARM "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" Adobe Reader and Acrobat Manager Adobe Systems Incorporated 1.801.10.4720 c :\program files (x86)\common files\adobe\arm\1.0\adobearm.exe 11/20/2014 9:03 PM VT detection: 1/56 VT permalink: (link to VirusTotal report).


Two unsigned drivers turned out to be clean, and there is a VT reaction to one signed

Process Explorer

Version Autoruns programs With GUI can work together with another utility of the same author - Process Explorer (PE). If you start PE first, and then Autoruns, then the menu of the latter appears additional items about viewing the properties of each active process from the autorun menu.

In the PE settings, you can specify the desired way to display all active processes: a simple list sorted by name or CPU usage, or a tree-like list with dependencies. There is also an option that allows you to check unknown files(identified by hash) in VirusTotal. If you turn it on, then after a while the result of the check will appear on the right. All objects that at least one antivirus swears at will be highlighted in red.

When you press the window is divided horizontally, and the bottom part displays full information about the selected process and its actions in the system. pressing will bring up an additional window with indicators of CPU, GPU, RAM, I/O activity, storage usage, and network usage. For each component, the total load and the most resource intensive process are displayed. For the GPU, it even shows the percentage of used video memory and the load on each chip, if there are several of them. This is especially true now, as many (malicious) programs actively use video cards for non-graphical computing. This behavior is especially typical for Trojan cryptocurrency miners.


The test trojan does not look suspicious yet, and four antiviruses are already swearing at µTorrent

By right clicking on any process from the PE list appears context menu. It duplicates all the functions of the built-in task manager and adds a few new ones. In particular, with one click you can send the file corresponding to the suspicious process for analysis in VirusTotal, search for its description on the Internet, make a dump or suspend (suspend) execution. A paused process stops responding to any commands (including internal ones) and becomes easier to analyze. After you figured it out, you can send the “resume” command through Process Explorer. Of course, without urgent need, this should not be done with system processes and utilities that perform low-level operations. Flashing BIOS / UEFI, changing disk layout, partition alignment and other similar operations are best left uninterrupted.

Usually, the title of each window contains the name of the application that created it, but sometimes they remain unnamed. This is especially true for Trojans that imitate well-known programs or small dialog boxes with error codes. Process Explorer has a handy "find process by window" feature. Just press this button top panel and, holding down the left mouse button, move the cursor to the area of ​​the strange window. The corresponding process will automatically be highlighted in the PE table.


Test Trojan suspended via Process Explorer

To take advantage of all the features of Process Explorer, you will need to run it as an administrator and (in individual cases) install Debugging Tools for Windows. They can be downloaded separately or downloaded as part of the Windows Driver Kit. The latest version of Process Explorer can be downloaded from the Microsoft website.

Unlocker

Without a doubt, Mark Russinovich is a real guru among the authors of system utilities for Windows, but his programs were created as universal tools. Sometimes it is worth using more highly specialized tools. Such as the creation of the French programmer Cedric Collomb. His tiny Unlocker utility can do only one thing: unlock an object occupied by some process file system to take back control of it. Though latest version was released in 2013, the program still performs its functions better than all analogues. For example, it allows you to unload dynamic libraries from memory, delete the index.dat file, work with file names forbidden in Windows, and perform most actions without rebooting.


Some process is blocking the uninstallation of Safari

Unloker defines descriptors running processes, which in this moment blocks work with the necessary file or directory. This locking is required to avoid interference between applications in a multitasking environment. At normal functioning OS and programs, it excludes accidental deletion of used files, but sometimes there are errors. As a result of one of them, the application may hang or remain in memory after the window is closed. The file system object can then remain locked long after it is no longer necessary.

Today, the list of active processes for an ordinary user starts from fifty, so you can search for zombies among them for a long time. Unlocker helps you immediately determine which process is blocking the modification or deletion of the selected file or directory. Even if it cannot figure it out due to Win32 API restrictions, it will offer to force the desired action: rename, move, or delete the object.


Unlocker did not find the reason for blocking, but can delete the recalcitrant file

Sometimes several programs can access the same directory at once, so several descriptors are defined among the processes blocking it at once. Unlocker has the ability to unblock all with one button.

Since version 1.9.0 64-bit versions of Windows are supported. The utility can be integrated into Explorer's context menu or run in graphical mode as a portable application. You can also install Unlocker Assistant. It will hang in the tray and automatically invoke Unlocker whenever the user tries to manipulate a locked file. Running with the `-h` option will print help about command line mode. The utility is available in forty languages, although there is nothing special to translate in it - everything is already intuitive.

AVZ

Looking at the list of possibilities AVZ utilities, I want to call it analytical, not anti-virus. The tiny program of Oleg Zaitsev has many irreplaceable functions that make it easier everyday tasks admin and the life of an advanced user. It will help you perform a system scan, restore misconfigured OS built-in components to their defaults, detect any changes since the last audit, find potential security issues, remove Trojans from SPI Winsock and restore Internet connectivity, detect strange program behavior and detect rootkits of the level kernels.


AVZ contains many system analysis tools

Known malware is best removed using other antivirus scanners. AVZ will come in handy for fighting unknown evil, finding holes through which it can leak, and eliminating the consequences of infection. In most cases, AVZ allows you to do without reinstalling the OS even after a severe virus attack.

You can use AVZ as portable application, but the full set of utility functions will be revealed only if you install AVZPM - a native kernel-mode driver. It monitors all modules, drivers, and active applications, making it easy to detect masquerading processes and any spoofing technologies.

AVZGuard is another kernel mode driver that can be activated from the AVZ menu. It restricts the access of active processes by suppressing anti-virus activity on the infected computer. This approach allows you to run any application (including another antivirus) from the AVZ window in protected mode.

One of the tricky anti-malware technologies is the method of blocking its files and recreating elements removed by the antivirus at the next OS boot. Manually, it is partially managed with the help of Unlocker, but AVZ has its own technology - Boot Cleaner. This is another kernel-mode driver that extends the capabilities of the built-in Windows features delayed deletion on restart. It loads earlier, logs the results of its work, and can delete registry entries as well as files.

Myself virus scanner AVZ also has a lot of know-how. It is able to check alternative NTFS streams and speed up the check by excluding from it files identified as safe by the Microsoft catalog or its own database. All threats can be searched by certain types - for example, immediately exclude the HackTool category. There is individual modules to search for keyloggers, ports opened by Trojan horses and behavioral analysis. AVZ allows you to copy suspicious and deleted files to separate folders for their subsequent detailed study.


Creation of a detailed study protocol in AVZ

The requirement to send reports to AVZ and its System Research module has become standard practice in many forums of virologists, where they turn to for help in solving non-trivial problems.

Of course, an experienced administrator's first aid kit can include more than a dozen programs, but these four utilities will be enough to solve most of the tasks. The rest you can easily find in the collections at the links indicated in the article.

WARNING!

Using system utilities requires understanding the logic of their work and the structure of the OS itself. Read the help before making changes to the registry and interfering with active processes.

Subscribe to Hacker

Our programs for system administrators help to keep abreast of everything that happens in the computer park and the enterprise network, respond in time to hardware failures and software problems, minimize costs and downtime. This page contains programs for monitoring the network, servers and hosts, for inventorying PCs, accounting for installed programs and licenses, creating reports on computer hardware, for accounting for network traffic, for studying network topology and creating graphical diagrams of local networks.

A network administrator may also find it useful to use programs to search for files on local networks and audit user access to server file resources over the network. All these programs will help the system administrator to improve the performance of network devices and servers and ensure the proper level of security in the enterprise network.

10-Strike programs are included in the unified register of Russian computer programs of the Ministry of Telecom and Mass Communications and can participate in public procurement.

Programs for the network administrator, network utilities

Program for inventory and accounting of installed software and hardware on computers in local networks. "Computer Inventory" allows system administrators to take inventory of computers in the enterprise network, view configurations remote computers and lists of installed programs over the network, monitor configuration and software changes. The program contains a powerful report generator. For example, you can create availability reports certain programs on computers and their number. At upgrade planning you can create report containing computers with insufficient disk or RAM. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- program for monitoring servers and computers on the network, which allows you to visually observe the current state of your network at any time. LANState monitors hosts on the network, keeps track of connections to network resources, monitors traffic, and signals various events. LANState contains many functions useful for network administrators: sending messages, shutting down remote computers, scanning hosts and ports, obtaining various information from remote computers (access to the registry, event log, etc.). Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- program for monitoring servers and other network devices, monitors the health of the network and notifies the administrator of problems. Find out in time about the failure (disconnection, running out of server disk space, service stop, etc.) and fix the problem with minimal loss of time. The program signals problems using sound, on-screen messages, e-mail, can launch external programs and services, and restart computers and services. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- program for searching files on local network computers(via NetBios and FTP protocols). Enter a phrase or file masks and search for necessary information. When viewing search results, the found files can be immediately opened, saved to disk, or generated a report. When searching, multi-threaded technology is used, which significantly speeds up the work. You can set filters by file size and modification date. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- monitoring program network connections users over the network shared folder and files, allows you to find out in time about the connections to the computer of network users. The program beeps, displays alerts on the screen, and keeps a detailed log of connections, which records information about who and when connected to network folders computer, what files were opened, etc. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


3.0 FREE!

- scanner of local networks, IP addresses and hosts. This free program allows you to scan local network and discover active hosts, computers and servers. It supports scanning of IP ranges and many protocols for discovering network devices (ICMP ping, searching for open TCP ports, NetBios, SNMP, UPnP, ...). If you have administrator rights with Windows computers can count as many useful information. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.

Sets of network programs for system administrators

Sets of programs for system administrators allow you to save money when buying several of our network programs or all at once. Get three programs for the price of two and so on. For example, when buying Full set of administrator programs in the option " per organization" (no seat limit), which consists of our seven programs for network administrators, you can save up to 85,000 rubles or 30%!

Other utilities

- CD cataloger (CD, DVD). With it, you will quickly find necessary files on CD and DVD discs your collection. SearchMyDiscs helps you organize your CD collections and DVD discs, allowing you to find desired disk in a few seconds. If you are tired of looking for the right disk every time for a long time - this program is for you! Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.


- Apache Raw log file analyzer. Creates various reports and histograms. The program has many settings and filters, which will allow you to get accurate information about your site, downloaded files, and who comes to you from where. Windows XP/2003/Vista/2008/7/8.1/2012/10/2016 are supported.

Payment and delivery

When ordering programs legal entities payment by bank transfer is accepted. Invoices are issued electronically, a contract is concluded. Electronic delivery: the distribution kit is downloaded from our website, registration keys are sent after payment by e-mail. After payment, the original contract and accounting documents are sent to the buyer by mail.

Issue an invoice (indicate the necessary programs and types of licenses, your details and the name of the director for the contract)

All our programs are also presented in the SoftKey and AllSoft online stores (follow the "buy" links from our website).


Our clients: small and medium businesses, state and budgetary institutions, hospitals, schools, colleges and institutes, banks, oil industry, telecoms.