FAQs

What information is collected during Asset Discovery?

Asset Discovery gathers detailed information about devices on your network, including:

  • Device type and hardware specifications (e.g., CPU, memory, disk space).
  • Network details like IP and MAC addresses.
  • Installed software and operating system details.

You can configure what data to collect based on the scope of your scans. Learn more about configuring scans.


How does Asset Discovery collect data?

ADE uses an agentless approach, leveraging protocols like ICMP, ARP, NetBIOS, DNS, LDAP, TCP, SNMP, SSH/Telnet, and WMI to discover and collect data from resources.

  • Domain-based discovery uses ARP, DNS, LDAP, and TCP for domain-level scanning.
  • IP range discovery employs ICMP, SNMP, SSH, and Telnet to scan devices within specific IP ranges.
  • Detailed scans retrieve in-depth information using SNMP, WMI, SSH/Telnet, and other methods.


Which protocols are utilized for domain-based discovery?

Domain-based discovery relies on ARP, DNS, LDAP, WinNT, and TCP to locate resources within specified domains.


What credentials are needed for scanning?

ADE supports three types of credentials:

  • Domain credentials - For accessing domain resources (username and password).
  • IP Range credentials - Used for SSH/Telnet-based scans (username, password, and optional admin password).
  • SNMP Community Strings - Required for SNMP-enabled devices.


Are Domain Administrator credentials required?

No, regular domain user credentials are sufficient for basic discovery. However, more detailed information, like hardware specifications, requires a user with local admin privileges.


How are the credentials stored?

Credentials are securely stored using 128-bit AES encryption in the ChangeGear registry. During use, they are encrypted in memory with the .NET System, Security, Secure String data structure and purged immediately after use.


How does ADE access stored credentials?

During a scan, ADE retrieves credentials from the registry and decrypts them. Depending on the protocol, credentials are applied securely:

  • SSH credentials are transmitted over encrypted channels.
  • SNMP community strings are transmitted in plain text.


Will ADE affect my network?

ADE is designed to minimize network impact. Factors such as network size, latency, and capacity affect performance. Scheduling scans during off-hours or at remote offices can reduce overhead.


Will ADE trigger my Intrusion Detection System (IDS)?

ADE does not use live exploits or "crafted" packets, making it unlikely to trigger an IDS.


Must I configure SNMP on all my devices?

No, SNMP configuration is optional. However, enabling it allows for better classification of devices (e.g., printers) and collects more detailed information.


Are there network requirements for ADE?

  • Windows machines require WMI and DCOM to be running.
  • Linux machines need SSH (preferred) or Telnet enabled, with password-based authentication.
  • The scanning machine must also have WMI and DCOM running and be joined to a domain.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Subscribe to Our Newsletter

* indicates required

Serviceaide has Offices

Around

Globe

the Globe

United States


2445 Augustine Drive Suite 150

Santa Clara, CA 95054

+1 650 206 8988
10210 Highland Manor Drive Suite
275 Tampa, FL 33610

+1 813 632-3600

Asia Pacific


#03, 2nd floor, AWFIS COWORKING Tower
Vamsiram Jyothi Granules
Kondapur main road,
Hyderabad-500084,
Telangana, India

Latin America


Rua Henri Dunant, 792, Cj 609 São
Paulo, SP Brasil

04709-110
+55 11 5181-4528

Ukraine


Sportyvna sq

1a/ Gulliver Creative Quarter

r. 26/27 Kiev, Ukraine 01023