Monitos Inventory for i-doit
i-doit / Paid
Discover agentless or with agent, trigger via ClearPass, Endpoint Manager and much more, or use our connection to the VMware or Proxmox API. Automated, interval-configurable inventory of FREICON.
-
The software works agentless.
-
UNIX / Linux based solution.
-
Systems Windows, SNMP (routers, switches, printers), Linux, Mac, HP-UX, IGEL.
-
Network services DNS, DHCP, Microsoft Active Directory, DFS.
-
Virtualisation VMware.
-
Node Discovery incl. software versions.
Paid.
Information on support options can be found on the developer website (German only).
For installation instructions, please contact the developer (German only).
Description
Characteristic for the solution is the low entry barrier: quickly downloaded and installed, no dedicated hardware is required and it is intuitively operable. With the monitos inventory for i-doit, in addition to the smart discovery of the IT infrastructure, an additional engine for reading out WMI and SSH devices is now available, so you also receive detailed information from non-SNMP-capable devices.
Since increased privileges are required on the target systems, the access data is stored encrypted in the monitos inventory for i-doit and the login/query for Unix/Linux systems can be carried out by exchanging SSH keys. This provides you with the highest level of security during discovery.
The manual import and manual assignment of configuration items (CIs) in i-doit is no longer necessary and is automated by the powerful monitos inventory module. Time savings and the avoidance of errors due to manual input (inconsistent databases) are just a few plus points for a quick ROI.
With monitos inventory for i-doit, use the automation approach that has been established on the market in large companies and SMEs for years!
Use cases
i-doit use cases for your documentation needs

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.
Use-Cases
.webp?width=300&name=multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc%20(1).webp)
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Related Add-ons
Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.
Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.
Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.
Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).
Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.
Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.
Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.
Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.
More Add-ons
From the hardware handover certificate to the disaster recovery plan. Create appealing documents - also as PDF - with daily updated data from your CMDB - automatically!
i-doit
Paid
Create powerful automations without any programming knowledge!
i-doit
Paid
Start monitoring CIs, monitor IT services, IT processes or end-2-end monitoring results automatically in the monitos ITSM control center and also display the results directly in i-doit on the CI.
i-doit
Paid
Change management according to ITIL is realized with this add-on. The fully integrated process is applied directly to affected CIs.
i-doit
Paid
Get your personalized quote today!
Discover how the i-doit Add-on monitos Inventory can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

Telefon: +49 (0) 211 - 699 31 0


