In the inventory part you can list and consult the hardware and software inventory park.
You are able to perform parameterized and sorted researches on one of the types of the inventory (computers, networks, printers, monitors, peripherals and softwares).
Here, you can post the form containing precise information of each indexed item, or add an item.
You have then the possibility to modify or delete each item.
The direct connections make it possible to model the relation between the central processing unit of a computer and external components.
A direct connection is done between a computer and a printer, a monitor or peripheric external.
The connections or disconnections are done since the page of a computer or that of the dependent material.
A port network makes it possible to model a network interface on a given material.
Each port has of an IP address, a mac address and a nework point to which it is connected.
The network connections are done by connecting two ports. To connect two materials together they must have a free port.
In the majority of the configurations the connections will be done between a networking port on a computer, a screen or a printer and a networking port on a network material (hub, switch)
At the time of the connection between two materials, informations such as the IP address and the network point are updated in order to be equals on the two ports
For each material, it is possible to add one or several ports
A software can have several licences having each one an associated serial and an end date
The installation of a software is done since the page of a computer.
Each time that a software is installed, the number of licence available for this software decreases.
It is impossible to install a software, when no licence is available.
Nevertheless, tt is possible to indicate the keyword "free" as serial when you add a new licence to a software. This license is installable without worrying about the number of the licenses.
It is possible to add several licences in one time. The serial and the end date will be the same one for each license added.
The tracking module makes it possible to post the list of the interventions according to several criteria.
You can show:
All the interventions which were not closed.
The interventions which were assigned to you.
The interventions which must be assigned to a technician.
The closed interventions.
You can also perform a research on the interventions based on a description
If interventions are found, GLPI shows a table including the interventions. It shows for each intervention: its statute (new or old), the opening and close date, the priority level, the author of the request, the person to which was assigned the intervention, the affected computer, the description of the request and the informations available on the followup of the intervention.
A click on one of these elements will enable you to reach additional information.
To add elements of followup to an intervention, to close it or to reassign it, click on "infos". Then, You will obtain the complete history of the intervention. You will be able to add an element of followup or close the intervention (optional: indicate the real time of intervention).
The restoration of a finished intervention is possible. Click on "information" then "Restore".
It is possible to remove closed interventions if you do not wish to preserve them in the database. For that, check the checkbox in the status column and click on "Delete" at the bottom of the list of the interventions.
GLPI authorizes the generation of a certain number of reports:
This report lists the number of item and software present in the inventory.
This report indicates the number of item under maintenance contract. It is possible to obtain a detailed report by type of item and date of purchase. The multiple selection is authorized.
This report indicates the number of item by purchase date or end of guarantee for one or several years. The multiple selection is authorized.
This report makes it possible to obtain the list of the interventions and their history according to many criteria's. Research can be perform over a given period, for a precise type of item or for a part of this item and according to its author and/or of his assign technician.
GLPI can generate exploitable reports by type of into unsing a spreadsheet. For that GLPI generates SYLK files. This format is exploitable by many spreadsheves.
If you used a software which does not know well with the standards (Excel for example), use the limited version in order not to have a problem with the size of the fields. The long fields will be truncated.
These statistics gather the principal data on the interventions over the month, the year and on the whole time you use GLPI:
These statistics provide a state of the activity of the technicians for a given period :
Statistiques des interventions par Lieu, Type d'ordinateur, OS, CPU, HD-Type, Carte graphique, Carte mère sur une période donnée :
Statistics of the interventions by users over a given period:
This part works exactly in the same way that the items of the inventory. You can add, modify and remove users.
You can in this section completly modify the data included in the select lists for example for the locations and the processors.
Once selected the list that you want to modify you can add of the elements, modify them and remove them.
Caution !! If you remove elements used, then, you will have to make a choice between modifying the existing entries or to put them at NULL.
You can define models of computers allowing you to add several similar computers very easily.
The external authentifications enable you to use alternative sources of authentification. That avoids you having to add all the users manually.
The first solution is to use a mail server:
- In the first part, you must to define the mail server you want to use. Please, to fill it correctly follow this link php.net which provide several examples.
Some exwmples : {localhost:110/pop3}, {localhost:993/imap/ssl}, {localhost:995/pop3/ssl/novalidate-cert}...
- The second parameter defines the mail domain used which will be used automatically to fill the mail addresses of the new users. If the user is called toto, then, his mail address will be toto@mail_domain.
The second solution id to use an LDAP server or an Active Directory. For this configuration defer to corresponding documentation present on the Web site of GLPI.
This section enables you to activate the followup of the interventions by email.
If you activate this functionality, emails will be sent for the creation of a new intervention, the addition of each followup and the closing of the interventions.
- You should fill the email address of the administrator and the email signature which will be added to each email send
- The other options enable you to limit the emails sent. For each type of people you can activate or not the sending for the creation of an intervention, the addition of followups and the closing of an intervention.
- The defined groups of people are: the administrator, all 'admin' or 'normal' users, the person in charge of the task and the caller of the intervention.
- The caller will not receive an email if it do not activated the email followup when he request for the intervention.
The general configuration of the application makes it possible to define certain parameters:
- The installation path. Caution !!
This path is detected automatically at the time of the installation or of the update, you should not need to modify it.
- The log level.
- The number of events to be posted corresponds to the number of lines of log present on the banner page of the central.
- The time of conservation of the logs. Caution!! If you keep them a long time your table can contain lots of data.
- Show the interventions at the login: to or not to see the active interventions on the banner page of the central.
- Number of elements ti print by page (valid for all the lists of elements posted - Tracking, computers...)
- Maximum number of characters for each elements of the list: reduce the size of the character strings to show in order to obtain a readable posting.
- Allow anonymous tracking post (helpdesk.html): activate or not the anonymous requests for interventions via the helpdesk.html file.
This section allows you to change your password, to define the default order used in the posting of the interventions and to define the language used.
This zone allows you to create SQL safeguards of the database ("Dump SQL").
You can also remove the backup files, to restore them or to download SQL files.
You can also generate a XML safeguard of the database. ("Dump XML").