Quote:
Originally Posted by Prime95
Good. I was not looking forward to digging through Windows logfiles.
|
This might be an opportunity for value-adding...
Perhaps under the
CPU report, include the IP the machine last used to communicate (visible only to the account owner). The DB almost certainly captures this information. Or, if it doesn't, it would be trivial to add.
I once helped a client recover a stolen computer because it kept checking into the proxy (the thief didn't wipe the OS, so the Prime95 client kept communicating every 24 hours or so).