cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

How will IT Visibility De-duplicate Devices coming from Various Sources?

How will IT Visibility De-duplicate Devices coming from Various Sources?

Scenario:  IT Visibility will be receiving from various sources: CMM, ITAM, and some direct connections.

What data fields will IT Visibility use as a "key" to de-duplicate devices?

Thanks, 

(1) Solution

Hi @BoPuck22611 ,

The following data fields are used for deduplication of devices in IT Visibility:

• Serial number
• Computer name
• Domain name
• BIOS UUID
Additional data field(s) can also be used to decide which matching rules to use:
• Operating system

Hope this helps,

Monal

View solution in original post

(3) Replies

Hi @BoPuck22611 ,

The following data fields are used for deduplication of devices in IT Visibility:

• Serial number
• Computer name
• Domain name
• BIOS UUID
Additional data field(s) can also be used to decide which matching rules to use:
• Operating system

Hope this helps,

Monal

The key value for de-duping devices in IT Visibility is the MAC Address.

Need to also include MAC Address