Scanners
The All Scanners Index page displays scanners installed on your company’s network in all locations.
Once installation is complete, and you have run an initial scan, scanners will automatically populate in the Index page.
To View Your Scanners
Navigate to setup by hovering over the menu icon and select Setup.
On the setup screen scroll down to Discovery → Scanners.
Look at the example below to view All Scanners.
The table below describes the columns on the All Scanners index page and how you can acquire the maximum data based on information entered:
COLUMN |
DESCRIPTION |
NAME |
By default, the scanner name is set to the name of the server on which it was installed. Note: Name and description are for your ease and convenience. This information does not affect the scanning process. |
STATE |
There are 3 possible states:
|
CONNECTIONS |
The number of connections associated with each scanner. |
FREQUENCY |
Frequency of scan - this can be configured separately for each scanner. Recommended scan frequency: every 24 hours. |
LAST REPORT |
Provides date and time of the last update from the scanner. |
ACTIONS |
When hovering over the row, a trash icon appears. You may delete the device by clicking on the icon. |
: In all tabs of the Discovery Scanner, you are encouraged to select a name for your network/subnet and provide a meaningful description. As a best practice, we recommend purposeful input since this information does not affect the scan. This better defines your environment and supplies useful data to agents analyzing the feedback.
Scheduling your Scan
Now that you have become familiar with the scanners in your organization and understand the relevance of each column, select a scanner by clicking on the scanner name.
In the Scanner details page, you will find the:
- Name
- Description
- and Scanner Properties
The default scanning frequencies can be set for a fixed time interval, or you can choose to assign a shorter or longer scan interval.
You can select the frequency by:
- Days
- Hours
- or Minutes
Or you can select to run the scan on specific day and time.
In addition, you have the ability to Download Logs for the most recent log of any active scanner.
Credentials
To derive the maximum benefits, we recommend scanning with credentials.
- SSH (Secure Shell) is used to access information on machines with SSH server installed.
- SNMP (Simple Network Management Protocol) is used to access information on network equipment such as routers, switches, printers, etc.
- WMI (Windows Management Instrumentation) is used to connect to your windows machine. If the account is a domain admin account, the username should follow the format: domain\account name.
This tab is provided for your benefit. It does not self populate, therefore you must manually enter the information you would like used for discovery.
Credentials are used in two different ways:
-
When a credential is associated with a router it can enable scanning remote subnets that are connected to this router. This saves you time as it does not require deployment of multiple scanners in your network.
-
When a credential is associated with a subnet, it is used to fetch additional information from devices that support this credential type, as mentioned above. Therefore you will obtain a more significant amount of data regarding your networked devices.
Use the
icon to select the Credential type from the dropdown menu and create a new entry.
Defining the columns on the Credentials screen:
COLUMN |
DESCRIPTION |
NAME |
It is important to select a meaningful name that assists you in defining your environment. Click on the name to modify and add a description. You can also update the credentials here. The required details are dependent on the Credential Type.
|
USED BY |
Describes the # of Subnets and the # of Network Devices associated to each subnet. |
TYPE |
The selected type of the created credential. |
LAST UPDATE |
Provides the date and time of the last change. |
ACTIONS |
When hovering over the row, a trash bin appears. You may delete the credential as long as it is not currently in use. |
Scanning without Credentials
The amount of information gathered without the use of credentials is limited.
The information gathered without credentials includes:
-
IP Address
-
MAC Address
-
Operating System
-
Host Name
-
Open ports (services)
Scanning with Credentials
To obtain additional information, you must include credentials to allow the scanner access to the connected devices.
Below is a detailed description of what is supported along with the network information you need to provide for maximum asset information:
-
SNMP Credentials V3
-
When you select V2, you must include the Name and Community string.
SNMPv3 requires further details. With this selection you will provide a Name*, Description, Username*, Authentication Protocol, Authentication Key*, Privacy Protocol and Privacy Key*.
-
-
SSH Credentials Key
-
When you select this credential you must provide Name*, Description, Username* and SSH Private Key* to receive greater visibility into the subnet.
-
-
SSH Credentials (username and password)
-
When you select this credential you must provide Name*, Description, Username* and Password*
-
* Reflect required fields
-
Although it is not mandatory, we highly recommend providing a description for a better understanding of your network.
To add credentials click the
icon on the upper right corner of the pane.
If you elect to delete a Credential, note that Credentials can only be deleted when not in use.
-
Credentials are not used unless they are associated with a connection.
-
Once a discovery scanner is installed, it detects the subnet on which it is deployed, and automatically creates a new connection with subnet type. In addition, it detects the default router and automatically creates a new connection with router type. All additional SCCM, Router, vCenters and Subnets on the network can be manually entered to the Connections screen.