Rating of programs for inventorying computers on the network. Automated network audit. Accounting entries for accounting for surpluses and shortages


As the computer fleet grows in organizations, the danger of forgetting which peripheral device is inside a particular device increases. workstation, or even lose one of them. The loss may occur due to the negligence of an employee of the technical support department or due to the malicious intent of an employee who decided to improve the performance of his home computer at the expense of the company. From the head of technical service or system administrator There are several ways to prevent this type of incident. For example, you can seal the housings of system units and conduct regular inspections of the integrity of the seals. You can inventory the components every morning (or evening). Installing visual surveillance equipment can also be effective. All these methods have their pros and cons. The main disadvantage of these means is their increased labor intensity, as well as a very serious cost component (visual surveillance equipment, seals, increased working time for control). Another accounting option - software - does not have such disadvantages.

The Total Network Inventory system from Softinventive allows you to keep a complete record of the software installed on your computer, as well as monitor the hardware of computers in offices, small and large corporate local networks. Without leaving his seat, the administrator can scan the network and obtain comprehensive information about each computer. No advance installed modules not required - they are installed automatically. The program allows you to scan the network both in real time (immediately) and, using a script, at the moment the client connects to the domain.

Total Network Inventory has both a mandatory wizard in our time, which allows the user to get a very impressive result with a minimum of brain strain, and a manual scanning mode, which allows the user to configure all the parameters independently. The scanner's capabilities are impressive. Scanning is carried out using three types of information: hardware, installed software, and real-time system information (processes running in the system, services, shared resources, environment variables).

The appearance of the program resembles "Explorer", visually displaying a tree in the left panel local network divided into groups. The group name corresponds to the position of the workstation in the network hierarchy or is selected manually by the user. When you select a computer, information about it is displayed in the central part of the main program window. Details about a particular subsystem are selected based on the marked category in the corresponding panel displayed on the right. The program's interface is scalable and can be easily customized to your taste. A large number of visual themes, customizable panels, tools, and richness keyboard shortcuts will even allow you to for the fastidious user adapt the program interface to suit you.

When you first launch the program, the user will be offered options for further work: launching the Network Scan Wizard, scanning the current computer, or opening the main window and further work. The main mode of operation for a system administrator will probably be working in the main window. However, to avoid adding computers manually, you can use the Network Scan Wizard at the first stage.

The wizard offers two options: online scanning and logon script. Each option is accompanied detailed description, indicating which permissions and security policies should be enabled. Which path to choose depends on the specific situation.

When scanning computers using a logon script, the administrator has the opportunity to add a call line for the scanner program to the domain logon script, allowing him to collect information about each computer that connects to the domain using this script (with the WMI service installed and running). The wizard allows you to choose shared folder, where the scanner program files are placed, and a folder for saving scan results. Next, having modified the logon script, the administrator can only wait for users to start connecting to the domain, and from time to time monitor the information received using the program.

Online scanning has more steps to achieve the result. This type of scan involves two options for searching for computers: “Network Neighborhood” and “IP Address Range”. In the first case, the program scans the tree of computers visible through the network environment. This option allows the administrator to see the structure of his Microsoft Windows network (workgroups, domains) and visually select hosts to scan. If the network environment is displayed slowly, or the administrator has several subnets to scan, or there is no NetBIOS connection to them, you should select the second path - “IP address range”. This path will allow you to specify one or more ranges of addresses to be scanned. In each option, you must specify a user name with the appropriate privileges (having the rights to work with administrative resources).

Two options for searching for computers - "IP address range" and "Network Neighborhood"

The result of the wizard will be a list of groups, domains, nodes, as well as detailed information about them. Additionally, an account card is created for each computer, which contains information about the owner and the computer:

  • computer name;
  • inventory number;
  • registered user;
  • computer cost;
  • name of the organization;
  • date of payment and installation;
  • workgroup or computer domain;
  • IP address;
  • personal data;
  • additional information fields.

The program can automatically generate inventory numbers for any newly found computer, and also allows you to create additional information fields containing information about the peripherals connected to the computer (for example, source uninterruptible power supply, scanner, camera).

The completeness of information collected by Total Network Inventory allows you to monitor any hardware or software component of the system, tracking any changes and responding to them in a timely manner. For efficient work With data, the program provides a category panel, duplicated by buttons on the toolbar. When choosing a category, the user receives comprehensive information about it. For example, when you select the “processor” subcategory from the “hardware” category, the program will display everything about the processor, from its name to the core voltage and the frequency of the second level cache.

To organize this entire ocean of information, the system provides a report builder. Using the Reports menu or clicking the corresponding button on the toolbar, the user has access to tools related to reports. The builder is able to summarize data in a convenient form based on user-selected criteria. The selection criteria in the program are conditionally divided into four main groups: general information, equipment, programs, other. When switching to the reporting mode, the administrator has access to tools for working with reports, as well as multiple selection of criteria in the corresponding panel. Thanks to this, the operator Total programs Network Inventory there are many possibilities for monitoring the current situation with the hardware and software base of an office or corporate network. Depending on the realities of a particular company, the program provides the opportunity to use either preset report schemes or create your own, which most fully displays the required picture of the equipment. The "Reports" menu contains report display schemes. They (reports) are divided into two groups: full and short. For example, a report for the criterion “Computer and motherboard” takes up a page in its entirety and contains detailed information. This is information about system unit, motherboard(manufacturer, name, serial number, version), BIOS information (name, manufacturer, release date, SMBIOS version). In brief form, this report takes up a third of the page and contains the same information, but without specification by dates, serial numbers and so on.

The builder allows you to generate reports both for the entire network and for computers or groups selected in the Network Overview panel. You can include any number of computers and categories in the report in any combination, that is, select several computers from different networks or groups, combining this with any combination of information categories. The administrator can save the received report in internal format, as well as in text file ASCII, HTML, CSV and RTF files. If necessary, the report can be printed.

And finally, program settings. Depending on the network security settings, as well as the network configuration, the program allows you to configure connection options with remote stations. This can be either using named administrative pipes in the connection via the SMB protocol, or connecting to the WMI service via the RPC protocol, or a combination of both. The settings also allow the administrator to take into account the presence or absence of a DNS server on the network and determine whether to allow IP addresses during scanning or not. Many other settings allow you to very flexibly manage certain program parameters depending on the current needs of the administrator or the configuration of the local network.

So, in the matter of remote monitoring, organizing and storing information about the hardware and software component of an organization’s computer park, this product has been very successful. It has a reasonable price, good performance, an excellent processor of collected information, as well as all the necessary tools for working in networks of varying complexity. We are confident that Total Network Inventory will save a lot of effort and nerves for the system administrator.

The IT park of any organization often includes dozens of systems of various configurations. And there will always be a couple of freethinkers who want to trick their bosses into an extraordinary upgrade or install software for personal purposes. Without an accounting and control system, the admin risks at least his bonus. Let's look at solutions to simplify this task.

WMI and Powershell

In WinNT 4.0SP4, administrators received new tool for centralized control and monitoring of the work of various parts operating system- WMI (Windows Management Instrumentation, Toolkit for Windows Controls). True, in the first versions there were few components included (only 15). But in subsequent Win2k+ their number increased along with the capabilities. Today WMI is available for all versions of Windows OS, including Se7en. By querying various WMI classes of local and remote systems, we can obtain all necessary information according to the software and equipment available in the company.

In the examples, I suggest not using VBScript, JScript or other scripting languages, they are too cumbersome and inconvenient, especially since we already have the luxurious PowerShell that can do the lion’s share of the work for us (read more about PS in ][ 09.2009 and 05.2010).
First, let's get a list of BIOS on slave computers:

PS> Get-WMIObject Win32_BIOS
-computerName synack.ru

As you understand, after "-computerName" the host name is indicated. Although when polling the local system, this parameter can be omitted, which we will do in the future for the sake of brevity. By writing a simple script, you can easily pass Get-WMIObject a list of systems from which information will be collected. If necessary, save the result to a text file for further analysis.

We conduct a survey of the remaining parameters in the same way. For example, we request information about the CPU:

PS> Get-WMIObject Win32_Processor

As a rule, a complete list of data is not needed, so we select only the necessary parameters:

PS> Get-WmiObject Win32_ComputerSystem | Select Manufacturer, Model

Let's see what kind of motherboard we have:

PS> Win32_Baseboard | Select Manufacturer, Name, Product | ft -a

The Win32_ComputerSystem, Win32_ComputerSystemProduct and Win32_ OperatingSystem classes will allow you to collect general data on your computer and system:

PS> "127.0.0.1", "synack.ru", "pc01" | Check-Online |
Foreach-Object (Get-WMIObject
Win32_ComputerSystem -computerName
$_ }

We request the OS version:

PS> Get-WmiObject Win32_OperatingSystem | Select CSName,Buil
dNumber,ServicePackMajorVersion

PS> Import-CliXML C:\check.xml |
Out-GridView

A complete list of Win32_* classes and properties is available in the MSDN documentation “Win32_Classes” (http://msdn.microsoft.com/en-us/library/aa394084%28v=VS.85%29.aspx). An alternative option is to use the search function.

For example, let's look at the list of objects whose names contain the word disk:

PS> Get-WmiObject -List | where ($_.
name -match "disk")

Ready-made utilities and applications

If you search the Internet well, you can find dozens of ready-made WMI scripts on the most different languages programming that can be easily adapted to your needs.

My attention was drawn to the HTA application Hardware Inventory (www.robvanderwoude.com/hardware.php) with a web shell. Just enter the computer name and get information about the installed equipment. If necessary, you can edit the raw material in text editor, supplementing it with the necessary parameters (poll of WMI objects is implemented in VBScript).

Third-party developers have created a number of special cmdlets that simplify writing scripts. The Computer Inventory Script (CompInv), which is available on the website powershellpro.com, allows you to obtain information about hardware, OS and save all collected data in an Excel file for further analysis. After launching the script will ask several questions, answering which, the administrator selects data collection mode. The list of computers to scan is determined using a special text file, and the script can also automatically scan all systems or servers included in the domain. Alternatively, the computer name is specified manually. By default, the current one is used. account, but by answering “Yes” to the question “Would you like to use an alternative credential?”, you can specify the required account.

In order not to run the created script yourself, we will entrust this to SchTasks. For example:

> SchTasks /CREATE /TN CheckScript /TR "powershell.exe `
-noprofile -executionpolicy Unrestricted `
-file check.ps1" /IT /RL HIGHEST /SC DAILY

As a result, a task called CheckScript is created, which will execute the PS script check.ps1 daily, and with the highest priority. Together with the equipment inventory system and installed applications NetPoint (www.neutex.net) offers a set of PS scripts (GetNet*) designed specifically for collecting a certain type of data about slave systems. For example, let's look at the availability of free space on the hard drive:

PS> Get-NetLogicalDisk -DriveType "Local Disk"
| where ( $_.FreeSpace / $_.Size -lt .10 ) | % (
$_.ComputerSystemName)

Now let's try to collect information about installed programs Oh:

PS> Get-NetProgram -System synack.ru -Uninstalled $False
| % ( $_.DisplayName ) | sort -unique

In total, the delivery includes 20 cmdlets. A free version of NetPoint Express Edition is available and runs on 32/64-bit WinXP/2k3/2k8/Vista/Se7en and can be used in networks of any size. To install NetPoint you will need PS 2.0, IIS and SQL server (Express Edition is sufficient).

By the way, you can get a list of installed programs by simply reading the desired registry branch:

PS> Get-ItemProperty HKLM:\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\* | Format-Table
DisplayName,Publisher | Out-GridView

The Out-GridView cmdlet displays data in a separate window with the ability to search and sort.

Disadvantages of using scripts

If data collection using WMI/PowerShell is quite simple, then all reports and configuration changes have to be controlled manually. Of course, you can complicate your scripts, trying to automate the process, but not everyone wants to spend time on this. It is worth recalling here that Microsoft offers the necessary functionality in SCCM (System Center Configuration Manager), which we already wrote about in issues 08.2009, 09.2009 and 01-02.2010. But in cases where the administrator also has *nix systems, all kinds of routers and other equipment that needs to be taken into account, WMI is no longer an assistant. In addition, the problem of visual presentation of data and reports remains. Here you will have to resort to third party programs(including those distributed under free licenses), fortunately, there is plenty to choose from.

Myzci Inventory System

Many who have tried the zCI inventory system (zci.sf.net) have found it to be a pretty good solution, but it lacks the ability to manually enter data and a localized interface.

Of course, these are not critical moments, but there are other little things. For example, you cannot delete a device through the web interface - you must manually create an SQL query to clear data from tables. The MyZCI inventory system (sf.net/projects/myzci) is a fork of zCI. The development is carried out by Yuri Vinnik, he brought zCI to the required standards: the interface has been translated into Russian and Ukrainian languages, new fields have been added to the tables (for example, computer location) and management has been simplified.

To run MyZCI you will need any web server with PHP support(with PECL, PHP Extension Community Library) and MySQL.

Unpack the myzci-1.2.1.zip archive into the root directory of the web server and specify the MySQL access parameters in the zciconfig.php file:

$ sudo nano zciconfig.php
return dbx_connect(DBX_MYSQL,"local
host","zci","zci","passwd");

To create tables in the database, we use the mysqlscript.sql script, located in the engine directory. The entries inside need to be brought into line with the data:

$ sudo nano mysqlscript.sql
create database zci;
...
grant all on zci.* to
"zci"@"localhost" identified by
"passwd";
# If you do not plan to access the database from
other systems, comment on the last line
# grant select,delete,insert,update
on zci.* to "zci"@"%" identified by
"zci";

The interface is localized by setting the “$Lang” variable to the value “ru” in the langconfig.php file.

To collect information on a Windows system, Windows Script Host is used, on Linux - lshwclient in Java. All components are located in the add-ons and engine subdirectory. MS Windows Scripting Host 5.6 and MS WMI Core 1.5 are also located here, which are necessary for the client part to work in Win95/98/NT4. Before deployment, you should change the value of the MyZCIpath and MyZCIserver variable in the takedata.js and lshwclient.java files to point to the server URL.

The process of setting up the client side on end systems has been simplified. Thus, the install.sh script, used when installing on Linux, checks for the presence of the lshw, jdk and read-edid packages (information about the monitor) and, if they are missing, displays an explanatory message. Next, the Java client is built and a cron job is installed. After MyZCI is deployed, you need to connect to the server from a remote system and register your computer by clicking the appropriate link on the main page. Information about new system should appear in the MyZCI database. Download the archive with the client part from the main page and run the installer.

After which the scripts will begin sending data to the server. The interface is extremely simple and allows you to display detailed information about hardware, enter and edit data about computers, group, search for systems by certain criteria (for example, type of video card and monitor), and track changes.

The administrator menu allows you to determine the status (assigned, leased) and location of the system.

OCS Inventory NG system

The OCS Inventory NG solution (OCSNG, Open Computers and Software Inventory New Generation, ocsinventory-ng.org) allows you to inventory components and software installed on computers on a local network and track their changes, periodically receiving data on the system configuration. One more useful function is the ability to remotely install programs and execute commands. To collect information, an agent program is installed on client computers.
The agent is available to almost everyone Windows versions 95 to 2k8R2, Linux, Mac OS X, *BSD, Solaris, IBM AIX and HP-UX. Agents send all collected data to the management server in the form of an XML stream compressed using the Zlib library. The standard HTTP/HTTPS protocol is used for transmission, so problems with the firewall usually do not arise. Using agents, the “IP discovery” function is implemented, which helps to find all network and peripherals operating locally, including those on which an agent cannot be installed (switches, printers, web cameras, etc.) Agents scan the network looking for similar devices and send information about them to the server for analysis.

The Windows version is written in C++, the *nix version is written in Perl and C.

The OCSNG server side includes four components that do not necessarily need to be installed on the same server. This is a DBMS (MySQL) for data collection, as well as a web server that can play one of three roles:

  • Communication service - provides communication via the HTTP protocol between the database server and agent programs (Apache 1.3.X/2.X with integrated Perl, in Debian/Ubuntu the libapache-dbi-perl package);
  • Deployment service - storage of installation files for agent programs (any web server with SSL support);
  • Management console - viewing collected data in a browser (web server with PHP support with ZIP and GD).

The OCSNG server part can be installed on a computer running Win2k/XP/2k3, Linux, *BSD, Solaris, IBM AIX and MacOS X.

Installing Ocsng

The required package is available in the repositories of most distributions, although this is usually not the most current version. Self-assembly from source texts should not cause difficulties if you are careful. The setup.sh installation script, located inside the archive, will check for the presence of the required components and provide recommendations for troubleshooting, if necessary.
In Debian/Ubuntu, for manual assembly you need to download the following packages:

$ sudo apt-get install libapache2-mod-perl2
libdbi-perl libapache-dbi-perl libdbd-mysqlperl
libsoap-lite-perl libxml-simple-perl
libnet-ip-perl libcompress-zlib-perl php5-gd

And XML::Entities from the CPAN repository:

$ sudo cpan -i XML::Entities

During the installation process, all necessary configuration files and aliases for the web server will be created. Since files that can be distributed using OCSNG are often large in size, you should set the desired values ​​for the post_max_size and upload_max_filesize variables in the /etc/php5/apache2/php.ini files (8 and 2 MB by default) and ocsinventory-reports. conf. After all the settings, call the browser and run the installation script http://localhost/ocsreports/install.php, where we specify the parameters for accessing the database. During the installation process, an “ocs” account with a “ocs” password will be created to access the ocsweb database. If access to the database is not limited local system, for security reasons, the default password should be changed. To install the agent on Linux, you will need to have some Perl modules (XML and Zlib) and dmidecode.

$ sudo apt-get install libcompress-zlib-perl libnet-ipperl
libnet-ssleay-perl libwww-perl libxml-simple-perl
po-debconf ucf dmidecode pciutils

After which the agent is installed in the standard way for Perl applications:

$ tar xzvf Ocsinventory-Agent-1.1.2.tar.gz
$ cd Ocsinventory-Agent-1.1.2
$ perl Makefile.PL
$make
$ sudo make install

Next, the script will begin asking a series of questions about the placement of configuration files. We enter the server data, create a tag (to group systems), activate the cron task. Once the setup is complete, the collected computer configuration data is sent to the server. If the connection is established and we receive a “Success!” response, the agent installation can be considered complete. Its data will appear in the web console, in the “ All computers” section. An XML file containing the current computer configuration will be created in the /var/lib/ocsinventory-agent directory. If the connection does not occur, run the agent in debug mode:

$ ocsinventory-agent -l /tmp –debug --server http://ocsng-server/ocsinventory

Usually the information obtained is enough to diagnose errors. Agent for Windows can be installed in several ways. The simplest is manually or using the included logon script.

After installing the server, the agent installation file can be imported into the OCSNG database. Simply select the “Agent” tab and indicate the location of the file, after which it will be accessible from any computer on the network. The installation is standard: at the last stage we report the name or IP address of the OCSNG server, and in order to immediately generate and send a report, check the “Immediately launch inventory” checkbox. Next, the agent is registered in startup and starts as a service.

Working with the OCSNG interface

The interface is localized, so it won’t take much time to figure out how to use it. By default, the All Computers tab shows seven main characteristics of client machines.

The "Add column" list allows you to easily add up to 23 more fields. It is very convenient that the data can be edited manually. Also worth noting is the easy search and removal of duplicate systems.

As mentioned earlier, OCSNG has the ability to install applications and run scripts (bat, vbs, etc.). This functionality is a big help. We create a package in Deployment - Build and fill in the New package building fields: name, Priority (installation order) and action in Action. There are three options:

  • Store - copy to the target system;
  • Execute - copy and execute with a command;
  • Launch - copy and launch.

Options in User notifications allow you to display a warning to the user and allow him to cancel the task.

After creating a package, you must activate it in Deployment - Activate. Enter the server URL and click “Submit”. Select the computer on which we will install the package, go to the Customization menu and click the Add package link. We specify the package and start the process by clicking Affect. The task status is displayed in Customization, general statistics are available in the Activate table.

In OCSNG, the connection initiator is an agent that connects to the server once a day, sends status information and receives tasks. If the generated package needs to be installed earlier, you must force the ocsinventory-agent command to run on the client.

Conclusion

After setting up and filling out the database in the inventory system, you will always have up-to-date information about the current state of computers at hand and will be able to track changes. The reports it generates make it possible to quickly determine the configuration of a typical computer used in an organization, which will serve well during a planned upgrade or OS change.

Localization of OCSNG/GLPI

The OCSNG interface is localized, but there are still some minor problems resulting in the Russian names of programs installed on Windows being displayed incorrectly.

The fact is that OCSNG initially uses ISO-8859-1 encoding (to display CP1251), while GLPI uses UTF8. When importing OCSNG -> GLPI data, there are also problems with encodings.

There are two known solutions:

  1. On the fly when exporting, change the data and fonts used. To do this, you need to edit the export.function.php file and use the ttf2pt1 package to create new fonts that support UTF8.
  2. Initially teach OCSNG to work with UTF8. For this purpose, patches and rebuilt installation files for Windows. You can download them from ftp://linvinus.ru/ocs. Here you can also find ready-made deb packages for Ubuntu/Debian.

In addition, in the inc/ocsng.class.php file, you should change the line “$this->dbenc="latin1";" to "$this->dbenc="utf8";" and in /etc/php5/apache2/php.ini check the setting “default_charset = “utf-8””.

Links

  • A complete list of Win32_* classes can be found in the MSDN documentation "Win32_Classes" - msdn.microsoft.com
  • NetPoint project website - neutex.net
  • MyZCI project website - sf.net/projects/myzci
  • zCI project website - zci.sf.net
  • OCSNG project website - ocsinventory-ng.org

GLPI Project

GLPI (Gestion Libre de Parc Informatique, glpi-project.org) is another project that is deservedly popular among admins. In addition to tasks related to accounting for computers and components, it allows you to store data on the rest of the “economy”, including consumables. Unlike OCSNG, the administrator independently populates the device database using a localized web interface.
But this problem is solved by using a plugin that integrates GLPI with OCSNG. Therefore, they are often installed together. To enable support, you must go to “Settings - General” and switch “Activate OCSNG mode” to “Yes”. After this, the menu will appear new tab“OCSNG mode”, in which you can synchronize data.

It is easy to organize a service based on GLPI technical support users, which is very convenient, because instead of calling, the user leaves a request, which is registered by the system. Then the IT department processes it. This disciplines users - they stop calling for trifles, and administrators have a database of requests to report on the work done. But the capabilities of GLPI are not limited to this. It allows you to create a knowledge base consisting of articles and keep records of suppliers and contracts. The system is equipped with a large number of different reports with the ability to export the results to a file PDF format, CSV or SLK. Calendar synchronization via iCal and Webcal protocols is supported.

The functionality is easily expanded using plugins available on the project website (plugins.glpi-project.org). In addition to OCSNG, you can import data from the Cacti or Nagios server.

The GLPI package is available in the repositories of major *nix distributions. Installation using source code is standard for applications written in PHP and requiring a web server and MySQL.

Computer technology is used today in every enterprise. Like other fixed assets, it is subject to inventory. This procedure has distinctive features. The procedure for making an inventory of property is regulated by: Law on Accounting No. 402-FZ of December 6, 2011, Methodological Recommendations, approved. By Order of the Ministry of Finance No. 49 of June 13, 1995, Regulations on accounting, approved. By Order of the Ministry of Finance No. 34n dated July 29, 1998. Let us consider in detail in the article how computer inventory is carried out and what inspectors need to know about this type of accounting.

Basic Inventory Concepts

Checking the availability of computer equipment involves an inventory and related components. The main inventory objects are presented in the table.

The inventory of computer equipment has the following goals:

  • Control of property safety;
  • Determination of compliance of actual availability with accounting data;
  • Optimization of costs for the purchase of computers;
  • Identification of unused objects;
  • Formation of a list for write-off;
  • Control of changes in property value;
  • Maintaining discipline of those responsible for equipment.

Inventory of computers over the network

Currently exists large number special programs that allow you to quickly perform inventory computer technology. To carry out an automated inventory, it is necessary that all the company’s equipment be connected to a single network. Order further actions is given in the table.

The use of an automated program has a number of advantages:

  • Possibility of using templates or independently developed reporting forms;
  • Check in background;
  • Time saving;
  • No need to separate employees from performing their duties;
  • One hundred percent accuracy of the data obtained.

The entire volume of data on computer equipment and software products is subject to verification.

A special feature of a specialized inventory program is that scanning can be scheduled according to a specific schedule. According to the specified scheme, the program will view network data and present final reports. This allows you to find out at the right time what condition the company’s computer equipment is in.

Computer equipment inventory accounting

The shortage of computers is written off at the residual value to the 94th shortage account. If the culprit is identified, then he must compensate for the damage. Its value is determined by the value of the property on the balance sheet. If the guilty person is not found or the court refuses to collect funds from him, then the shortage is written off as a financial result. Losses from force majeure circumstances are taken into account in the same way.

Surpluses are taken into account at market valuation. It is determined by the price of a similar object, confirmed in writing, for example, by the manufacturer or according to the conclusion of expert appraisers. The cost must be documented. The corresponding amount is included in the financial result.

In the income statement, surpluses are shown under the item “Non-operating income”.

Example. A computer worth 48,000 rubles on balance went missing from Vympel LLC. The amount of depreciation is 14,000 rubles. The investigative authorities did not identify the culprit and issued a corresponding decision. The object is subject to write-off to the financial result.

Dt 01.2 Kt 01 48,000 rub. - reflects the original cost of the missing computer;

Dt 02 Kt 01.2 14,000 rub. - wear is taken into account;

Dt 94 Kt 01.2; Dt 91.2 Kt 94 34,000 rub. - the shortage is written off.

Timing of the inspection

Computers are the company's fixed assets. In accordance with the law, their planned inventory is carried out once every 3 years before filling out the final financial statements. Management can independently determine the timing and frequency of inspections and reflect this in the accounting policies.

Carrying out an inventory is mandatory for the following reasons:

  • Change of responsible employees;
  • Identification of cases of theft and damage to property;
  • Liquidation of a company or its reorganization;
  • Emergencies and natural disasters;
  • In other cases established by law ( clauses 1.5, 1.6 of the Recommendations, approved. Order No. 49).

The procedure for conducting computer accounting

Before starting inventory activities, preparatory activities need to be carried out. To simplify the procedure, a label should be attached to each object. It displays the following information:

  • Name of the enterprise;
  • Name of the object according to accounting data;
  • Inventory number;
  • Responsible employee.

The order of the inventory is reflected in the table:

No. Stage Actions
1 PreparatoryAppointment of a commission, drawing up an inspection plan, issuing an order, printing inventory records
2 ExaminationInspection of facilities by division of the organization in the context of financially responsible persons, filling out inventories
3 Recording discrepanciesDocumentation of surpluses or shortages (memos, inventories) indicating the reasons for the discrepancies
4 Registration of resultsDrawing up an act
5 Data MappingReconciliation of received data with registration data

The order can be drawn up in the INV-22 form or in a free form. The document indicates the reason for the inspection, the composition of the commission, the start and end dates, and what property is being inventoried. Data during the inspection are recorded in inventory records (for intangible assets).

The information in them is grouped by responsible employees and structural divisions. They contain accounting information about the nomenclature, quantity and inventory numbers of inspection objects. During the inspection of the equipment, the commission enters similar actual data into the inventory.

If faulty equipment or its absence is identified, a report is drawn up addressed to the director. The names and numbers of equipment lost or unsuitable for further use are recorded in it. The reasons for the identified defects are also indicated here, and the signature of the employee responsible for the safety of valuables and members of the commission are signed. Identified surpluses are processed in the same way.

Based on these inventories, the commission draws up a report on the results of the control. The final stage is the reconciliation of the information received with accounting data. The necessary adjustments are made, the culprits are punished, etc.

Example. In October 2016, during an inventory at Udacha LLC, it turned out that a computer purchased in July last year was in use. He was not taken into account. The cost of the object is 50,150 rubles, including VAT - 7,650 rubles.

The computer must be registered and depreciation must be calculated for the entire period of its operation. The service life is determined to be 30 months. Depreciation is calculated using the straight-line method.

1/30 * 100 = 3.33% - depreciation rate;

(50,150 – 7,650) * 3.33% = 1,415.25 rub. - amount of depreciation per month.

In October 2016, the accountant made the following entries:

Dt 08 Kt 60 50 150 rub. - the computer has been registered;

Dt 19.1 Kt 60 7,650 rub. - VAT on the purchased object is taken into account;

Dt 01 Kt 08 50 150 RUR - the computer is included in fixed assets;

Dt 91.2 Kt 02 7,076.25 rub. - depreciation for 2015 is reflected (1,415.25 * 5);

Dt 26 Kt 02 14 152.50 rub. - the amount of depreciation for the current year at the time the error was discovered was taken into account (1,415.25 * 10).

Automated inventory program

With an automated inventory method, labels with a bar code are printed from a computer accounting database for each object. Subsequently, they are glued to the appropriate equipment. When coding in this way, the 1C “Equipment Accounting” program is used for inventory. You can download its demo version on the Internet and watch the presentation.

Computers are checked using barcode scanning by the well-known Hardware Inspector program.

All specialized programs on the market have a similar operating procedure. For example, it is easy to download and use the product “Inventory of computers on the network.” It allows you to detect outdated models, schedule equipment updates, select computers whose resources do not correspond to the tasks performed on them, etc.

The IT Invent program has proven itself well. It supports network scanning and collects information on all network devices. With its help you can carry out inventory accounting network computers in all branches of the company.

The free version contains a limited set of functions; their full list is available in the commercial version of the product. Another program, “10-Strike: Computer Inventory,” is offered in several modifications. An organization can choose one that is more suitable for its goals.

Accounting entries for accounting for surpluses and shortages

To reflect inventory results in accounting, the following standard operations are provided:

Accounting for surplus:

Dt 08.3 Kt 91.1 - income in the form of fixed assets is taken into account;

Dt 01 Kt 08 - the object is accepted for accounting at the market price.

Dt 91.1 Kt 99 - profit from accepting an unaccounted object for accounting is reflected.

Accounting for shortages:

If the culprit is not found, the damage is reflected as follows:

Dt 94 Kt 01 - shortage detected;

Dt 02 Kt 01 - depreciation of the missing object is written off;

Dt 91.2 Kt 94 - loss attributed to other expenses.

If the culprit is found, then the operations look like:

Dt 73 Kt 94 - the shortage is written off to the culprit;

Dt 50 Kt 73 - the employee repaid the debt;

Dt 70 Kt 73 - the debt is withheld from the employee’s earnings.

Frequently asked questions and their answers

Question No. 1. What is the maximum amount that can be withheld from the salary of the guilty employee to cover the shortage based on the results of the inventory?

You can withhold no more than 20% of your earnings each month.

Question No. 2. What consequences might an organization face if tax authorities discover unaccounted for computers?

Such accounting errors lead to distortion of financial statements. If it is equal to or more than 10%, then the minimum fine will be 5 thousand rubles.

Question No. 3. Is it possible to recover the identified shortage from a financially responsible employee who quit before the start of the inventory?

No. According to Art. 232 of the Labor Code of the Russian Federation, termination of an employment agreement with an employee does not relieve him of liability for shortages. To prove that the damage was caused by the employee, an inventory must be taken upon his dismissal. After a while, it is impossible to prove his guilt and to recover the deficiency either.

Question No. 4. How to take into account the shortage of equipment caused by a fire?

Damage at book value is included in the loss of the current year:

Dt 91.2 Kt 94 - damage due to force majeure is written off.

Question No. 5. Is it necessary to prepare an INV-1 form for computer equipment, leased to other companies?

No need. The tenant must check such property. He sends one copy of the inventory with the inventory results to the lessor.

An inventory of computer equipment is necessary to take into account the number of objects and determine the productivity of their use. Using this procedure, the organization optimizes the costs of purchasing computers, components and software. Special programs allow you to carry it out without wasting time and labor and obtain accurate data.

Today it is difficult to imagine a company without IT infrastructure. Every organization has computers. And like any property, they need to be periodically inventoried. What are the features of computer hardware inventory?

Dear readers! The article talks about typical ways to resolve legal issues, but each case is individual. If you want to know how solve exactly your problem- contact a consultant:

APPLICATIONS AND CALLS ARE ACCEPTED 24/7 and 7 days a week.

It's fast and FOR FREE!

Absolutely all property of the organization is subject to inventory. But computers differ quite significantly from other property assets.

Often they are composite objects accounting. Computers are often upgraded. How to take inventory of computer equipment? What are the features of such verification?

What do you need to know?

Computers, office equipment, mobile devices and such objects are something that almost no company can do without today.

Computer equipment often makes up a fairly significant part of an enterprise's assets. This means that it is necessary to carry out not only constant monitoring, but also periodic inspections.

The availability of computers, as well as other property, is checked through an inventory. But how often should you check?

The legislation provides for mandatory inventory taking at least once a year, before drawing up the annual accounting report.

All other cases of inventory checks remain entirely at the discretion of management, except for the occurrence of circumstances requiring an indispensable inventory.

In practice, organizations carry out the procedure at the end of December - beginning of January. In addition, the Accounting Regulations provide for the possibility of inventorying fixed assets once every three years.

It is worth considering that a computer is a complex mechanism and consists of many parts. Repairs, modernizations, and replacement of individual parts are often carried out.

The accountant is aware of all these operations only in general terms, since the prerogative of servicing computers still belongs to representatives of the IT sphere.

Thus, in a year, a computer can change beyond recognition and it will be very difficult to restore accounting support for all transactions performed.

It is better to take inventory of computers and similar equipment as often as possible. The procedure and timing of inventory are determined by the manager.

But it is advisable to check at least once a quarter. Moreover, there are many special computer programs, allowing you to take inventory of computer equipment in a matter of hours.

Basic terms

Property inventory involves conducting an audit, during which the actual number of objects is compared with data on their availability in accounting records.

Taking inventory of computers is no different from checking any other property. But we must understand that the concept of “computers” refers to all computer equipment available to the enterprise.

Computer technology is a complex concept. It covers the whole spectrum computer technology, from a regular smartphone to a super-powerful computer.

Refers to computer technology and software, which is installed on a computer to perform certain functions.

In general, computer equipment and the programs running on them constitute a single hardware and software complex.

If we talk specifically about the types of computer equipment, then these are:

For what purpose is it carried out?

An inventory of computer equipment is necessary, first of all, to check the compliance of its quantity. But not only... During the verification process, you can find out how effectively this or that equipment is used.

This helps optimize costs for computers and software. Perhaps the organization does not have the necessary computer equipment or necessary programs, which leads to a decrease in labor productivity.

Or, on the contrary, there are too many unnecessary computers, and some programs are not used at all. Also, an inventory of computer equipment allows you to determine how much the value of individual objects has changed.

It may happen that some computers have become unusable due to their disrepair and need to be completely written off. The cost of other computers may increase due to upgrades.

The result of the inventory may be getting rid of unnecessary computer equipment and purchasing the necessary computers or programs.

Legislative framework

Computer inventory is regulated by the legal framework regarding general order inventory.

The legislative procedure for inventory does not differ from the usual inventory of fixed assets. The inspection is also carried out in mandatory cases and according to the schedule approved by the organization.

The results of the inspection are documented in standard - unified forms established by.

Emerging nuances

The nuances of computer inventory are that computer equipment is often moved from one office to another, responsible persons change, and individual computers are portable portable devices.

Therefore, it is quite difficult to link location and accounting to computers. Another nuance in identifying objects. In accounting, computers are registered according to their model, brand and inventory number.

Video: taking inventory

Only an IT specialist can distinguish a certain model by eye, and comparison with the inventory number will take a lot of time, especially if several identical models are used.

Therefore, to simplify inventory, each individual item of computer equipment must have a special label. It must indicate all the necessary data, including the name and inventory number.

Procedure

Carrying out a computer inventory can be done manually or using automated programs accounting.

In both cases, it is necessary to carry out preparatory procedures. In particular, this concerns simplification of identification. This is achieved by providing each object with a label.

At manual way The label states:

  • name of the owner (organization);
  • the name of the object according to accounting (often in accounting the name is very different from the real name);
  • object inventory number;

In an automated process, based on a computer database, labels for each object are printed with barcodes. These are then pasted onto the appropriate equipment.

A typical computer inventory scheme generally looks like this:

Published about the need to take inventory of computers The document specifies the inspection period, its procedure and the composition of the inventory commission.
The commission receives statement forms with accounting data from the accounting department The verification is carried out directly. During manual inventory, data on actual availability is entered into the act. At the same time, it is inappropriate to carry out the check in the sequence of the accounting inventory, since this can lead to losing sight of individual objects. It is better to move around the room(s) and mark all available computer equipment along the way. With automated accounting, it is enough to walk through the verification area with a scanner and read information from barcode labels. Then the information is transferred to the computer used for inventory, where verification reports are filled out automatically
Reconciliation of actual availability and accounting data is carried out The reasons for the identified discrepancies and the guilt of those responsible are determined.
If there are any discrepancies Amendments are made to accounting

As a program that supports inventory through barcoding, you can use the 1C “Equipment Accounting” program.

To familiarize yourself, you can download the demo database of the program or watch the presentation “Equipment Accounting 1.0”.

An equally popular solution is the Hardware Inspector program, which allows you to inventory computers using a barcode scanner.

Inventory of computers over the network

Computers in general are designed to make human work easier. This quality also applies to inventory.

On given time To carry out an inventory of computers, it is not at all necessary to move around the enterprise with a piece of paper and a pencil or scanner.

Moreover, you don’t even need to leave your workplace to carry out the inspection. To do this, it is enough to use computer inventory programs over the network.

To implement such a program, all computers in the organization must be connected to a single network. The further process is more than simple:

An important advantage of the program is the ability to use both ready-made report templates and those developed independently.

It is noteworthy that in this way you can carry out inventory completely unnoticed. The scan is carried out in the background and no action is required from users of the scanned devices.

The speed of inventory by the program and the accuracy of the collected data are especially significant. Even in a very large organization, the inventory of computers on the network is carried out in the shortest possible time.

In this case, the maximum amount of data is collected regarding the device’s hardware and software. That is, using the program you can inventory not only the computers themselves, but also the software installed on them.

Another feature of the network computer inventory program is that in most cases scanning can be scheduled according to a schedule.

At the specified moments, the program will scan and provide ready-made reports. This will allow you to always be aware of the state of computer technology in the organization.

What program exists for this?

There are many programs for inventorying computers on the network. Each of them has its own characteristics, but the general algorithm of their operation is approximately the same.

As an option for a free version of such a program, you can download and use the “Inventory of Computers on the Network” program.

You can also keep an inventory of computer equipment using the IT Invent program. This product supports network scanning and automatically collects data from computers that are part of a common network.

Using the program, you can inventory any computer equipment in several branches if the objects are connected to a single database.

In addition, the program has many other functions that make it easier to account for computers. Wanting to take advantage full set functions, you can buy the program.

And if necessary, you can use free version IT Invent. Another program of this type is “10-Strike: Computer Inventory”.

Settings