ePO App: Collect Serial Number from Machines

Version 4

    Have you ever wanted to to know the hardware type or serial number of all your agents?  Attached is a simple deployment package for ePO that runs a tiny VB script on the agent that collects this info from the registry if it exists.  It then takes that data and puts it in Custom Props 1 registry area so the next time the agent calls into ePO it will show up under its properties.  From there you can have instant access to this information in ePO.  You can easily create tags in ePO based on this data.  One of the coolest features is that easily identifies VMware machines so you can apply unique policies or group VM machines as you like.  Heres a pic.


    Simply check in the zip file into ePO repository, then replicate if needed.  Then create a client task that installs the new package.  It will show up in the drop down for client tasks after you check it in.  Set the task to "run immediately" under schedule which means it will only run once which is all that is needed.  Of course run this on a test group first and test it thoroughly against multiple machines for mass deployment.  Then wait for machines to call in and see the new value.  I believe that in the agent log it will show that the package did NOT run successfully which can be safely ignored.  This obviously only works on Windows platforms only and I have only tested it with the 4.5 and 4.6 McAfee agent.  Disclaimer: Not officially supported.  Please leave your feedback below.

    ________________________________________________________________________________ ____________________________________________

    Update 4-30-2013

    This serial number tool is a great app for ePO but if you haven't tried the new Deep Command Discovery and Reporting Tool, you should check it out.  It collects significant information about your clients through the ePO agent including serial number.  It is no additional charge and was designed to see if your machines are capable of supporting Deep Command.  It is available at no charge and can be used even if you do NOT own Deep Command.  You can download it using the Software Manager in ePO 4.6 as shown below or with your grant number.  The manual for it can be found here. https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/ 24000/PD24046/en_US/edc_150_pg_0-00_en-us.pdf



    Here is just some of the data the Deep Command Discovery Tool can pull into ePO......and yes it works on Windows 8.