Features
Discover IT
IT Inventory
Capture all components of your network
IT Asset Management
Manage all assets in your IT
Discovery
Uncovering unknown hardware and software
CMDB
ITIL-compliant Configuration Management Database
Inventory Modules
Overview of all inventory modules
Understand IT
IT Documentation
Current overview of the network
IT Analysis
Licenses and relationships at a glance
Permissions Analysis
Overview of permissions
Optimize Docusnap
Personalization
Customize Docusnap to individual requirements
Interfaces
Connect Docusnap with other applications
Customizing
Create individual structures in Docusnap
Overview
How Docusnap works
All important functions and features of the software
Ready to get started?
Customer Case Studies
Be inspired by the success stories of our customers
Book a Live Demo
most popular
Discover the possibilities of Docusnap
Video Tutorials
Detaillierte Einblicke und Anleitungen, wie Sie die Software optimal nutzen können
Solutions
Docusnap Areas of Application
Healthcare
Comply with legal requirements
Financial Sector
Fulfill compliance requirements
Industry
Save costs
Public Institutions
Increase IT security
Education
Scalable solutions
Docusnap Users
IT Manager
Informed decisions based on current data
IT Administrator
Overview of the entire IT landscape
IT Service Provider
Create customer documentation easily
CISO
Overview of safety-relevant information
Docusnap Use Cases
Disaster Recovery
Create a Network Map
Check User Permissions
Collect Network Information
Create an IT Contingency Plan
Manage Licenses
Inventory IT Assets
Network Documentation
Add-ons
Recommendations
Notfallplanung mit Docusnap
Machen Sie Docusnap zu Ihrem ISMS
Data Quality Report
Overview of data quality for IT managers
Microsoft Support End
Report on which products will expire in 2024
More Add-ons
Organizations, Processes and Services
Logical assignment of systems and software
Microsoft 365 Reports
Extension with various reports on Microsoft 365 usage
GPO Overview
Simple overview of linked group policies
Message Definition Sublicensing
E-mail notification of sublicensing
Set Virtualization Host Automatically
Fills the field of inventoried virtual systems
Icon Pack Customizing
Package of original Docusnap icons for own customizations
More
Overview of all Add-ons
All available add-ons at a glance
Docusnap Benefits
most popular
Add-ons from our community
Customize Docusnap
Customize Docusnap to your needs yourself
Support
Docusnap
HowTos
Docusnap HowTos and tutorials
Ideas
Feature requests and ideas for Docusnap
Community
Connect with experts and other users
Manuals
Information about all Docusnap functions
System Requirements
System requirements for Docusnap
Release Notes
Overview of enhancements and changes
Docusnap365
HowTos
Docusnap365 HowTos and tutorials
Ideas
Feature requests and ideas for Docusnap365
Community
Connect with experts and other users
Manuals
Information about all Docusnap365 functions
Quick Start
Simply get started with Docusnap365
Release Notes
Overview of enhancements and changes
Support
Video-Tutorials
Blog
Software Download
Remote Help
Licence Calculator
myDocusnap
+49 8033 6978 – 4545
support@docusnap.com
Training
Pricing
Partners
Try now
Information Security
Article search
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The new data protection law in Switzerland (RevDSG)
The German IT Security Act 3.0 in detail
IT documentation is now more important than ever
Automatically detect orphaned user accounts
No more tedious searching for the admin password for the server
Detect direct permissions
Windows PrintNightmare vulnerability – free Docusnap report
Zerologon - Restoring security with patch and Docusnap
IT failure in the company - Are you prepared for it?
Cloud: Danger to personal data?
Never again security gaps by obsolete user authorizations
How to Prepare for IT Emergencies
The Five Crucial Questions of Contingency Planning
IT Contingency Planning from a Legal Point of View
IT Emergency: What to Do if Your Admin Suddenly Becomes Incapacitated?
Missing IT Documentation: Is Your SysOp a Security Risk?
IT Documentation Requirements According to IT-Grundschutz – Part 1
Has any of your data changed?
IT Documentation Requirements According to IT-Grundschutz – Part 2
IT Documentation Requirements According to IT-Grundschutz – Part 3
Privacy and data security - What's the difference?