answersLogoWhite

0

Use hardware inventory in Configuration Manager to collect information about the hardware configuration of client devices in your organization. To collect hardware inventory, you must select the Enable hardware inventory on clients setting in client settings.

After hardware inventory is enabled and the client runs a hardware inventory cycle, the client sends the information to a management point in the client's site. The management point then forwards the inventory information to the Configuration Manager site server, which stores the inventory information in the site database. Hardware inventory runs on clients according to the schedule that you specify in client settings.

User Avatar

bhornes48

Lvl 3
3y ago

What else can I help you with?

Related Questions

What is managed by the system board bios?

The BIOS (Basic Input Output System) is software that controls the motherboard and computer hardware functions. Search Google with: BIOS for more information.


What is hardware stack and software stack?

hardware stack - a stack implemented in and entirely managed by hardware, this stack will have dedicated memory and registers in the physical hardware of the system.software stack - a stack implemented with and entirely managed by software, this stack will use a small piece of main RAM and variables declared in the program software (making it much easier to modify if necessary than a hardware stack).


What does cml stands for in computer terms?

Computer Managed Learning.


What does CMI stands for?

Computer Managed Instruction


What is computer managed instruction?

Computer-managed instruction is an instructional strategy whereby the computer is used to provide learning objectives, learning resources, and assessment of learner performance. Computer-managed instruction (CMI) aids the instructor in instructional management without actually doing the teaching.


The basic operations of a computer are managed by the?

operating system


You had a person tell you who you have been looking up on your computer and they have never been on your computer how did he do that He showed you the dates and times on his computer answer that?

Your possible answers are: He hacked your computer - He would have to be very good with computers. Has managed to install a program on your computer that monitors you, your internet etc... Or has some how managed to get you to install a program with a hidden purpose. If you are on a network and his computer is the administrator he might be able to access your computer. The settings on your computer might allow him to remotely access your computer, giving him full control. Or he is some how playing an elaborate trick and has managed to gain physical access to your computer, or even have a friend help.


What is the difference between computer based teaching computer assisted and computer managed instruction?

In computer based teaching the teacher physically present in fron of you and explain theoritical topics on board and practical topics on computers. In computer assist teaching the teacher not physically present around you he will teach you through the net on video confrensing, the all the theory and practical material provided in the soft copy. In computer managed instruction the computer provides the instruction there no any person behing the instruction the instruction managed by computer as preprogramed by programmer.


Which is a network where resources are managed by a centralized computer?

client/server network. :)


Is database software or hardware?

A database is an integrated collection of logically related records or files which consolidates records into a common pool of data records that provides data for many applications. A database is a collection of information that is organized so that it can easily be accessed, managed, and updated


What managed settings cannot be defined or changed through group policies?

Windows Installation Policy


What are three operations managed by operating system?

It manages the Hardware resources maintanes the system of files controls input and output operations