Already a NinjaOne customer? Log in to view more guides and the latest updates.

Device Details

Topic

This article explains how to use the Details tab on the NinjaOne device dashboard. 

Environment

NinjaOne Endpoint Management

Description

The Details tab on the device dashboard allows you to view various device identification information and hardware specifications from a single page in NinjaOne. This article describes its different sections and the data you can expect to see in them.

Accessing device details

Access the device dashboard from the organization dashboard or the Devices search page, then click Details on the top navigation menu. 

LTDR_NavToPage.png
Figure 1: The Device Details tab (click to enlarge)

Selecting device information categories

Your device type (monitor, laptop, VM, or others) determines the information type in the Details tab. Select a category from the Device Information Categories list below to review a description of the information and its availability per device type:

Long-Term Device Performance Graphs

Multiple device detail sections, including CPUMemory, Disk UsageDisk Transfer RateDisk Active Time, and Network Usage Data Points, now let you view data over a time range from the last hour to the last 90 days, for more comprehensive monitoring and troubleshooting. 

Use trend data to determine hardware replacement planning and report on long-term performance. 

LTDR_TimeRange.png
Figure 2: Specifying a data retention time range (click to enlarge)

Device Information Categories

Processor

Available for: desktops, laptops, servers, Hyper-V hosts, and VMware.

This section provides a graph of CPU utilization and a table that includes the PID, process, threads, and CPU percentage for each process currently using the CPU on the device.

The details below the graph include the latest submission data. This data does not reflect the retention period of the graph.

device details_processor.png
Figure 3: Processor details (click to enlarge)

Memory

Available for: desktops, laptops, servers, Hyper-V hosts, VMware, and mobile devices

This section provides a graph of memory usage over your specified time period and a table that includes the PID, process, commit, working set, shared, and memory for each process using memory on the device.

The details below the graph include the latest submission data. This data does not reflect the retention period of the graph.

  • Apple mobile and MDM-enrolled macOS details will only include the amount of storage currently used, out of the total storage in GB.
  • Android mobile details include RAM, internal storage, and external storage used, out of the total amount in GB. 
device details_memory.png
Figure 4: Memory details (click to enlarge)

Datastore

Available for: Hyper-V hosts

This section provides information about the device's virtual disk space and usage, read and write speed, available free space, and capacity. 

Disk Volume

Available for: desktops, laptops, and servers

This section provides graphs for each disk volume for the device, showing active time, disk transfer rate, and disk usage. You will also see the BitLocker status for each volume. For more information, refer to BitLocker and FileVault Encryption Key Management.

device details_disk volume.png
Figure 5: Disk volume (click to enlarge)

Network Adapters

Available for: Desktops, laptops, servers, and VMware

This section provides graphs that show the throughput for each network adapter on the device. 

device details_network adapters.png
Figure 6: Network adapters (click to enlarge)

Open Ports

Available for: Desktops, laptops, servers, and servers

This section provides a table showing the port, protocol, status, and service.

LTDR_EvenBetterOpenPorts.png
Figure 7: Open ports (click to enlarge)

Hardware and miscellaneous 

Available for: Desktops, laptops, and servers

This section lists information about the device's hard drive, disk partitions, sound card, video card, disk drive, page file, and motherboard.

LTDR_BetterHardwareMisc.png
Figure 8: Hardware details (click to enlarge)

RAID Monitoring (Windows servers only)

Available for: Windows Servers

NinjaOne can pull RAID monitoring data for Dell or HP RAID controllers.

This section includes: 

  • a table with controller details, a table listing virtual drives and their respective details/status.
  • a table listing physical drives and their respective details/status.

For HP RAID controllers, the relevant HP utilities need to be installed on the machine for NinjaOne to monitor the controller's details.

Windows Service (Windows) or Daemons (Mac & Linux)

Available for: Windows and Linux devices, respectively. 

Windows devices:  This section includes a table with the display name, service name, status, start type, and log-on-as information for each Windows service on the device.

LTDR_WindowsServiceTAb.png
Figure 9: Windows Service details (click to enlarge)

Linux Daemons:

This section includes a table with the display name, daemon name, and status information for each background process on Mac and Linux devices.

LTDR_LinuxDaemons.png
Figure 10: Linux Daemon details (click to enlarge)

User Log

Available for: Desktops and laptops

This section includes the username and login date and time for the most recent incident of a user logging in to a device.

LTDR_UserLogTab.png
Figure 11 User log details (click to enlarge)

Event Log

Available for: Desktops and laptops

This section includes tables with Critical and Non-Critical events that have occurred on the device. This data gets purged every night at approximately 22:00 ET, and only events that have occurred within the last 3 hours will be kept. So, the log will always reflect events that have occurred on the device from approximately 19:00 ET onwards. The event ID, source, type, message, and occurrences are included in the tables.

The Critical section will list any event classified as Critical or Error. The Non-Critical section will list any event classified as anything but Critical or Error (which leaves the remaining event types: Information, Success Audit, Failure Audit, Warning, and Verbose).

All events classified as Critical, Error, Warning, or Failure Audit will be displayed automatically. Events classified with a type of Information, Success Audit, or Verbose will be displayed only if you have a condition set up to monitor for the occurrence of the specific Event ID. Refer to Policies: Windows Event Conditions for more information. set up to monitor for the occurrence of the specific Event ID in question.

LTDR_EventLogTab.png
Figure 12: Event log details (click to enlarge)

Antivirus

This section includes an antivirus (AV) overview, followed by a scan summary and details on the antivirus software installed. The antivirus summary includes a description, the number scanned, the number cleaned, and the scan duration. The last field includes a table with the name, definition status, and product state for AV software installed on the device.

NinjaOne aggregates antivirus data from Windows Security Center. For more information, refer to Reporting: Why does my Antivirus report show no information?

For information about how to feed antivirus information for servers into a custom file, refer to NinjaOne Agent Troubleshooting: Add an Override for Antivirus.

LTDR_AntivirusTab.png
Figure 13: Antivirus details (click to enlarge)

Port Status

Available for: Network monitoring agents

This section includes the port location for the device and its current state (connected, not responding, or other statuses). 

device details_port status.png
Figure 14: Port status details

Mobile devices

Compliance

This section is available for Android mobile devices and details the device's compliance state. If the device is not compliant, expand the section to see the reason for the violation. 

Security

This section is available for Apple and Android mobile devices.

  • Apple
    • Encryption status (encrypted, not encrypted): This option includes block-level and file-level encryption.
    • Is passcode compliant (yes, no): This information is pulled from the policy configuration page.
    • Has passcode (yes, no): This information is pulled from the policy configuration page.
  • Android
    • Device posture (secure, not secure)
    • Is PIN or password set (yes, no)
    • Encryption status (encrypted, not encrypted): Both block-level and file-level encryption.
    • Install apps from unknown sources enabled (yes, no)
  • MacOS
    • Encryption status (encrypted, not encrypted): Both block-level and file-level encryption.

Network

Apple mobile devices provide the International Mobile Equipment Identity (IMEI) number and Wi-Fi MAC address. 

Cloud

  • Backup enabled (yes, no)
  • Last backup date

Additional Resources

Refer to the following resources to learn more about device management in NinjaOne: 

FAQ

Next Steps