Managing Computers
Service Credentials Manager allows you to easily add, edit, and organize computers for service credential management. This guide covers all aspects of computer management within the application.
Adding Computers
There are three methods for adding computers to the application:
Manual Entry
For adding individual computers or a small list:
- Click "Add Computers" on the home screen
- Select the "Enter Computer Names Manually" option
- Enter computer names in the text box, separated by commas or line breaks
- Click "Add Computers" to add them to your list
Example formats for manual entry:
- Individual names:
Server01, Server02, Workstation05
- One per line:
Server01
Server02
Workstation05
CSV Import
For importing a large list of computers from a CSV file:
- Click "Add Computers" on the home screen
- Select the "Import from CSV File" option
- Click "Browse" to select your CSV file
- Click "Add Computers" to import the computers
CSV file format should be simple with computer names in columns. Headers are optional.
Active Directory Import
For importing computers directly from Active Directory:
- Click "Add Computers" on the home screen
- Select the "Import from Active Directory" option
- Click "Browse" to select an AD container path
- Choose whether to include subcontainers
- Choose whether to exclude disabled computers
- Click "Add Computers" to import from Active Directory
Active Directory import requires appropriate permissions to read computer objects from the selected container.
Managing Computer Credentials
Setting and managing credentials for connecting to computers:
Setting Credentials
- Select a computer from the computer list
- Click "Edit Credentials" on the toolbar
- Choose between:
- Use my current logon credentials - Uses your Windows login
- Use the following credentials - Specify custom credentials
- If using custom credentials, enter:
- Username (in format domain\username or username@domain.com)
- Password
- Domain (optional, can be included in the username)
- Choose whether to store credentials in the database (encrypted)
- Click "OK" to save

Computers with custom credentials will display a key icon in the computer list.
Credential Storage
By default, credentials are stored in the application's database in encrypted form. You can change this behavior:
- Uncheck "Store credentials in database" in the Edit Credentials dialog to use credentials only for the current session
- Credentials are encrypted using machine-specific encryption, so they can only be decrypted on the same computer
Removing Computers
To remove computers from your managed list:
Remove Individual Computers
- Select the computer you want to remove
- Click "Remove" on the toolbar
- Confirm the removal when prompted
Remove All Computers
- Click "Remove All" on the toolbar
- Confirm the removal of all computers when prompted
Removing computers only removes them from the application's database; it does not affect the actual computers or their configurations.
Computer List Management
The computer list provides several management features:
Selecting Computers
Use the checkbox column to select one or more computers for batch operations.
Computer Status
The Status column shows the current state of each computer:
- Ready - Computer is ready to be scanned
- Processing - Scan is in progress
- Finished Successfully - Scan completed with no errors
- Finished with Warnings - Scan completed with some warnings
- Finished with Error - Scan failed with errors
Sorting and Filtering
The computer list supports:
- Sorting by clicking on column headers
- Filtering by using the filter row at the top of the grid
Best Practices
- Organize computers logically by environment or purpose
- Use least-privilege accounts for credentials - only administrative access is required for service management
- For large environments, import from Active Directory to ensure all computers are included
- Regularly update your computer list to account for new or decommissioned systems
- Consider the security implications of storing credentials - use the option to not store them if high security is required
After adding computers, proceed to Scanning Services and Tasks to discover services and scheduled tasks on your computers.