Lansweeper can pull data from any device that has one or more of the following protocols enabled: Bonjour, DNS-SD, FTP, HTTP, HTTPS, JetDirect, mDNS, SIP, SMTP, SNMP (SNMPv1, SNMPv2 or SNMPv3), SSDP, SSH, Telnet, UPnP or WMI.
Network device (Aruba WAP)
SNMP generally provides Lansweeper with the most detailed network device information. Many network devices have SNMP enabled by default and use public and private as their default SNMP community strings (i.e. passwords). A community string with read-only access is sufficient for Lansweeper scanning.
The exact data returned depends on the protocols enabled on the device, as well as the device type. If your device supports SNMP or SSH, keep in mind that SSH scanning is only supported for *nix based systems like Linux, Unix and Mac. Ideally, other network devices are scanned through SNMP.
These KB articles will help you to scan your network devices successfully:
MacOS
Lansweeper supports scanning of macOS. Scanned macOS data includes disks, network interfaces, memory, model, OS, processor, serial number, software, uptime, and more. Ideally, an Apple Mac computer is scanned through SSH. Enabling SSH on the computer allows Lansweeper to run the system_profiler
command on the machine. To retrieve installed software, you also need to ensure that Spotlight is enabled on the computer.
These KB articles will help you to scan your macOS successfully: