Windows Agent Enhancements
  • 23 Oct 2025
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Windows Agent Enhancements

  • Dark
    Light
  • PDF

Article summary

We have enhanced the Windows Agent, to collect more detailed and comprehensive system information for Managed Assets.

This update improves visibility into each asset’s security, performance, and configuration. All newly collected data is now visible under Managed Asset System Details and can be exported as well.

Here are the details:

System & Hardware

Information

Data collected

Operating System Info

name, version, major, minor, path, build, date, platform

System Info

uuid, cpu type/subtype/brand/sockets/microcode, memory, hardware model/vendor/version/serial

CPU Info

model, socket designation, processor type, status, clock speed, efficiency/performance cores

Disk Info

name, model, partitions, serial, size, manufacturer, pnp device id

Video Cards

version, model, series, manufacturer, driver mode, date, color depth

Memory Devices

device locator, memory type, manufacturer, max speed, voltages

Chassis Info

type, lock status, manufacturer, tag, status

System Uptime

days, hours, minutes

TPM Info

activated/owned/enabled status, manufacturer version, product name, spec version

Battery Info

charging status, amperage, health, condition, model, manufacturer

Physical Disk Performance

average disk bytes per read/write, average disk queue length (read/write), average disk seconds per read/write

Windows Update History

title, support URL, server selection, result code, hresult

System Services

name, type, status, pid, start type, exit codes, path, user account

Logical Drives

id, type, free space, description, size, file system, boot partition

Platform Info

vendor, version, date, revision, size, firmware type, address

Device Accounts

user name, type, host, terminal, time

Patches Info

csname, hotfix id, caption, installed by, installed on, install date

Security

Information

Data collected

Security Profile Info

guest/administrator name, password age/length/complexity, guest/admin account

Windows Security Products

name, type, state, remediation path, signature up-to-date

BitLocker Info

lock status, protection status, conversion status, percentage encrypted, version

Windows Security Center

firewall health, antivirus health, anti-spyware health, security center service health

Software & Applications

Information

Data collected

Programs/Apps

name, version, location, source, date, upgrade code

Chrome Extensions Info

name, profile, version, identifier, path, permissions, install time

Firefox Add-ons

name, identifier, creator, version, location, source url

Drivers

name, service, version, provider, image, inf, date, manufacturer

Operating System

Information

Data collected

Kernel Info

version, device, path, arguments

Network

Information

Data collected

Interface Details

mac, type, mtu, name, metric, flags, i/o packets/bytes/errors

Interface Addresses

name, mask, address, broadcast, type, point to point

Connectivity

network connections, IPv4/IPv6 traffic, subnet access, internet access

NT Domains

name, client site name, dns forest name, status, controller address

User & Sessions

Information

Data collected

Groups Info

group name, group SID, signed GID, PID with namespace, visibility

Logon Sessions

user, domain, session ID, time, server

User Groups

user ID, group ID

Users Info

name, gid, directory, shell, type, include remote, pid with namespace

Cloud Instance

Information

Data collected

EC2 Instance Tags

instance key and value

EC2 Instance Metadata

instance name, region, architecture, availability zone, mac

Azure Instance Metadata

virtual machine name, location, scale set name, platform update domain, location, zone

Azure Instance Tags

virtual machine Id, key, value

Benefits

  • Gain deeper visibility into system health and performance.

  • Get a complete picture of each asset’s hardware, software, and security posture.

  • Quickly identify systems with outdated patches, weak security configurations, or disabled protection features.

  • Access detailed system information from hardware specs to running services to resolve issues faster.

  • Review password policies, encryption status, and security settings to ensure assets meet compliance requirements.

  • Simplify troubleshooting with detailed OS, hardware, and network data.




Was this article helpful?

What's Next