Jedna od elegantnih opcija je svakako SNMP. Na svi racunarima doinstaliraj SNMP agente. U Windowsu ga podizes kao servis. Zatim, podesi u servisu read-only community string (recimo public) i sa svoje masine nekim snmp tool-om propituj svih sedam masina na odgovarajucim OID-ma i sa stringom public. U pocetku ces uraditi jedan veliki snmpwalk dok ne utvrdis gde tacno Windows cuva info o running procesima, a potom ces propitivati samo tebi interesantne OID-e.
Na primer jedno propitivanje tekucih procesa na necijoj masini (doduse iz linux konzole) moze da izgleda ovako:
Code:
HOST-RESOURCES-MIB::hrSWRunName.1 "System Idle Process"
HOST-RESOURCES-MIB::hrSWRunName.4 "System"
HOST-RESOURCES-MIB::hrSWRunName.140 "soffice.BIN"
HOST-RESOURCES-MIB::hrSWRunName.156 "navapsvc.exe"
HOST-RESOURCES-MIB::hrSWRunName.488 "Explorer.EXE"
HOST-RESOURCES-MIB::hrSWRunName.580 "SAVScan.exe"
HOST-RESOURCES-MIB::hrSWRunName.592 "SMSS.EXE"
HOST-RESOURCES-MIB::hrSWRunName.628 "SynTPLpr.exe"
HOST-RESOURCES-MIB::hrSWRunName.640 "SynTPEnh.exe"
HOST-RESOURCES-MIB::hrSWRunName.652 "PDVDServ.exe"
HOST-RESOURCES-MIB::hrSWRunName.664 "CSRSS.EXE"
HOST-RESOURCES-MIB::hrSWRunName.688 "WINLOGON.EXE"
HOST-RESOURCES-MIB::hrSWRunName.732 "SERVICES.EXE"
HOST-RESOURCES-MIB::hrSWRunName.744 "LSASS.EXE"
HOST-RESOURCES-MIB::hrSWRunName.816 "rundll32.exe"
HOST-RESOURCES-MIB::hrSWRunName.912 "SVCHOST.EXE"
HOST-RESOURCES-MIB::hrSWRunName.936 "sysocmgr.exe"
HOST-RESOURCES-MIB::hrSWRunName.1012 "QtZgAcer.EXE"
HOST-RESOURCES-MIB::hrSWRunName.1016 "SVCHOST.EXE"
HOST-RESOURCES-MIB::hrSWRunName.1056 "anbmServ.exe"
HOST-RESOURCES-MIB::hrSWRunName.1116 "SVCHOST.EXE"
HOST-RESOURCES-MIB::hrSWRunName.1168 "hkcmd.exe"
HOST-RESOURCES-MIB::hrSWRunName.1184 "epm-dm.exe"
HOST-RESOURCES-MIB::hrSWRunName.1188 "SVCHOST.EXE"
HOST-RESOURCES-MIB::hrSWRunName.1236 "SVCHOST.EXE"
HOST-RESOURCES-MIB::hrSWRunName.1256 "pSSClient.exe"
HOST-RESOURCES-MIB::hrSWRunName.1260 "jusched.exe"
HOST-RESOURCES-MIB::hrSWRunName.1296 "ccApp.exe"
HOST-RESOURCES-MIB::hrSWRunName.1308 "jucheck.exe"
HOST-RESOURCES-MIB::hrSWRunName.1456 "WinSCP3.exe"
HOST-RESOURCES-MIB::hrSWRunName.1472 "ctfmon.exe"
HOST-RESOURCES-MIB::hrSWRunName.1480 "ccSetMgr.exe"
HOST-RESOURCES-MIB::hrSWRunName.1532 "ccEvtMgr.exe"
HOST-RESOURCES-MIB::hrSWRunName.1684 "SPOOLSV.EXE"
...itd itd.