Machines List
The Machine List displays all PCs detected by the automatic scanning procedure.

-
Red: last scan completed with errors (look at "Internal Events" for details).
-
Yellow: machine currently under scanning.
-
Green: last scan completed successfully.
The following data is shown:
-
Last Scan: date and time of the last log scan.
-
Last Login: date and time of the last interactive login.
-
Available Space: free space on drive C (in GB).
-
Scan Time: duration of the remote scan in minutes.
-
RT: shows whether the machine is monitored by BLogRT.
-
Client Version: expected RT client version, shown in red if different from the installed version.
-
IP: IP address used to resolve the machine name through DNS reverse lookup.
-
User: last user who logged into the machine.
-
Type: machine type (WIN, SYS, or RT).
The following machine scanning controls are available:
-
[Force Inventory]: starts the machine scan within one minute.
-
[Schedule Scan]: schedules the machine for the next available scan.
NOTE: Machines not included in an active licence are displayed in grey rows, even if selected..
Machines counted for licensing purposes are:
-
WIN: selected Windows machines.
-
RT: machines registered with the RT agent.
-
SYS: machines or devices registered via Syslog.
New
The [New] button allows manual entry of a machine name or IP address..

Details
Clicking the [Details] icon while a machine is selected opens its corresponding "Technical details" window including the following tabs :
-
Technical sheet
-
Software inventory
-
Hardware inventory
-
System updates
-
Local users list
-
Session list
-
Scheduled tasks
-
Power consumpion
-
CVE
-
Shares

-
Technical Sheet
Within this section, selected machine settings can be modified.
The list on the right displays all users who have logged into the machine.
Dedicated fields show available space on drive C. A threshold alert can be configured by entering a value in the "Space Alert" field.
General settings
These settings allow simultaneous updating of specified parameters across all machines. This approach is useful for applying a general configuration and then managing exceptions individually.

-
Keep Application: prevents the Application log category from being cleared, useful when machines generate informational or error messages from business applications
-
Clear Logs: clears the Application and Security log categories at each scan cycle, helping maintain clean logs and reduce the risk of corruption
-
PowerShell Collection: when PowerShell command logging is enabled, includes all PowerShell executions performed on the machines
Info button
-
Network FlowChart
Selecting Info > Network FlowChart generates a graphical representation of the network as detected by the system.
For machines that are not correctly identified, the corresponding “Details” section can be edited by manually specifying the value in the [Role] field.


The resulting diagram can be exported in PDF or PNG format.
