User Inventory & Management
Inventory, Track & Manage all Users in Your Network.
Scan Local, Admin, Active Directory, and Office 365 Users.
Keeping Track of Users & Permissions
In most companies today, there are more users in an IT network than anybody cares to count. Still, the system administrator needs to keep track of all these users and their respective access to and permissions for various IT resources like devices, applications, systems, networks, and services. This task is especially crucial because it also plays an important role in network security.
Discover all Local, AD users and Admins
Unify Office 365 & AD User Data
Lansweeper automatically unifies data retrieved from Office 365 with your existing Active directory information. As a result, whenever you view a user within Lansweeper, you cannot only the Active Directory Information, but also any related Office 365 information. With Lansweeper’s powerful reporting capabilities, you can identify users who are missing licenses or plans in minutes and much more.
Detect Unauthorized Local Administrators
Granting local admin rights risks the installation of unapproved software, breaking business-critical applications and causing disruption and downtime. With Lansweeper, you have a super easy method of finding local administrators across your network close at hand. The Reports tab of the Lansweeper web console includes a built-in report called Computer: Unauthorized Administrators that lists unauthorized members of your computers' local administrator group.
“One of my favorite reports is ‘Unauthorized Local Administrators‘. I am a stickler when it comes to this and want to know immediately when a tier has created a local admin on a PC that they should not have.”
IT DIRECTOR AT A FORTUNE 500 AUTOMOTIVE COMPANY
Asset-User Relations: Link Assets to Users
Once you have collected your data, you can analyze it using the built-in reports, or create your own custom reports. By linking users to the assets they use you can easily track who is using which asset. View user permissions, AD information and all the other information scanned from the assets. As a result of all this information, you can identify which users might still have local administrative permissions, which users have unauthorized software installed and more.
Perform User Actions Based on Data
Revoke permissions, remove software or perform other changes by utilizing Lansweeper’s actions and deployment packages. Lansweeper provides some built-in user actions, however, you can create your own custom user actions to perform any action you require on users. By combining the data retrieved with the unlimited possibilities of custom actions and deployments, Lansweeper provides the most reliable platform to inventory and manage your users.