Enterprise Reporter can collect the NTP Server information of a server by configuring and running a "Registry Discovery". After this discovery completes successfully, a Registry report should be able to show the NTP Server data stored in the target computer since this information is stored at the registry level.
Registry Discovery setup considerations:
- Make sure that the Credentials used to run this discovery have the rights to collect Windows Registry data on all of the target machines within the Collection Scope.
- If the purpose of this discovery is mainly to collect the NTP Server data, in the Scopes page, it is recommended to set a limit value of "7" to the "Branch depth" setting under the "Recursion Options", also make sure that the "Collect values" setting is checked and the "Permissions" options are all unchecked. This is to prevent the discovery to take a lot of time to finish.
Registry report considerations:
- Once the Registry discovery completes collecting the data, the name of the predefined report located under "Report Library" that should be used is "Registry Keys and Values". You can put a copy of this report under "My Reports" to then set the desired parameters.
- To include only the NTP Server information in the report output, Add the following path as a value under the "Include the following keys:" section:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters