18.2 Computer Management

The Computer Management feature allows administrators to manage client-module-equipped computers across entire network segments and enables users to check license usage details—such as the number of licenses currently in use and whether usage exceeds the licensed scope.

Additionally, in environments with large numbers of computers, hardware maintenance (e.g., replacing hard drives or network cards) may require reassigning client IDs to ensure devices are still recognized as the original clients after hardware changes. This reassignment can also be performed within the Computer Management interface.

18.2.1 Overview of the Computer Management Window

To access the Computer Management window, navigate to Tools > Client Management > Computer Management. The interface consists of a query bar, a computer authorization information list, and a computer identification information list.

The Computer Authorization Information List includes the following details:

Field Name Description
Authorized icon This icon indicates the computer is within the licensed scope and is authorized. Computers without this icon exceed the license limit. Check the "Authorization Information" to view purchased licenses and current usage counts.
Name The display name of the client computer in the console.
ID The unique ID assigned to the client by the server.
Network Address The IP address used by the client.
MAC Address The MAC address and IP address of the client.
Group The computer group to which the client belongs.
Status The current operational status of the client (e.g., Online, Offline).
Conflict Indicates whether the client has a conflict. Blank means no conflict; "Yes" indicates a conflict exists.
Last Seen The last time the client was active.
Installation Time The installation time of the client.
Version The version information of the client.
Offline Days The number of days the client has been offline.

Click any record in the Computer Authorization Information List to view its associated identification details in the Computer Identification Information List at the bottom of the Computer Management window.

The Computer Identification Information List includes the following fields:

Field Name Description
Current icon A red checkmark on this icon indicates that the client is currently using this identification record.
Operating System The operating system information of the client.
Hard Disk ID The hard disk ID information of the client.
MAC Address The MAC address of the client.
Computer Name The hostname of the client computer.
First Seen Time The time when the client first connected to the server.

Administrators can quickly locate specific computer information using the following search criteria:

Search Criteria Description
All Default query for all computers with the client module installed.
By IP Address Search for clients within a specified IP address range.
By Last Seen Date Search for clients whose last active date falls within a specified range. Useful for locating inactive clients.
By Client ID Search for a specific client using its unique Client ID.
By Name Search by the client's display name in the console. Supports fuzzy matching.
By Offline Days Search for clients that have been offline for a specified number of days.
By Status Search based on the client's operational status (e.g., Online/Offline) as shown in the console.
By MAC Address Search by the MAC address of the client as displayed in the console.
By Hard Disk ID Search using the Hard Disk ID shown in the Computer Management > Identification Information section.

In the Computer Authorization Information panel, several auxiliary function buttons are provided with the following descriptions:

Operation Description
Export icon Export the computer authorization list to an HTML, XLS, or CSV file.
Print icon Print the computer authorization information list.
Preview icon Preview the computer authorization information list before printing.
Delete icon Delete: Administrators can remove unwanted clients to free up licenses. Deletion uninstalls the client and reduces license count.
Uninstall icon Uninstall: Uninstalls the client without reducing license count.
Encryption icon Encryption Management: Enable or revoke encryption authorization for selected clients.
Sensitive icon Sensitive Information Identification Management: Enable or revoke sensitive data identification authorization for selected clients.
Secure desktop icon Secure Desktop Management: Enable or revoke secure desktop authorization for selected clients.

After performing delete or uninstall actions, administrators must click the 【Confirm】 button to apply the changes. Otherwise, the operations will not take effect. This measure is designed to prevent accidental modifications.

18.2.2 Reassigning a Client ID

Reassigning a client ID is typically required in two scenarios:

  • Resolving conflicts: If two enterprise computers swap hard drives and later connect simultaneously, they may be recognized as the same client. The console will display a conflict warning, and the client entry in the Computer Authorization Information list will appear in red. Clicking the entry will reveal two or more identification records.
  • Hardware replacement: If a computer's hard drive or network card is replaced due to damage, the device may be detected as a new client. The newly identified client must be reassigned to the original client ID.
Steps:
  • In the Computer Authorization Information list, select the client requiring reassignment and click its identification record.
  • Click the Reassign icon button in the upper-right corner of the list to open the Computer Identification Settings. Two options are available:
    • Assign a new client to the identification record: Reassign a new ID to the identification record, with an optional custom name. The reassigned client will appear in the "Ungrouped" section of the console's computer tree.
    • Move the identification record to an existing client: Manually enter an existing client ID or use the Select button Select icon to choose an existing client. For example, if assigning record B to existing client A, client A's name in the console will automatically update to match record B's name.

18.2.3 Viewing Client Identification Tracking Logs

Due to factors such as operating system updates, hard drive replacements, or network card changes, a client's identification information may be altered. The Client Identification Tracking Log allows administrators to review historical changes to client identification records.

Steps:
  • In the Computer Authorization Information list, select the client for which you want to view the identification tracking log, and click its identification record.
  • Click the Tracking icon button in the upper-right corner of the list to query the Client Identification Tracking Log. The log includes the following information:
Field Name Description
Time The timestamp when the client logged in or came online.
Identification Method The method used to identify the client.
Match Result The result of the client identification matching process.
ID The unique ID of the client.
Name The name of the client.
Operating System The current operating system of the client.
OS Directory The operating system directory of the client.
Network Address The network address (IP address) of the client.
MAC Address The MAC address of the client.
Hard Disk ID The hard disk ID information of the client.

If identification information changes, corresponding log entries will be generated, and differences between previous and updated values will be highlighted in red.