Audit Credentials

Updated in 8.4

Audit credentials specify an account used by Alloy Discovery to run the audit. It is recommended that this account has administrative privileges to access audited computers and collect the audit data. Generally, audit credentials are a combination of a user name and password. However, for auditing Linux and macOS computers, you can use your SSH private key instead of a password.

The Direct Network Scan method requires an account for running the audit. If you plan to use the Direct Network Scan, you must specify audit credentials for each network or network segment that you want audited. You can also specify individual audit credentials for individual network nodes.

The Google Directory Audit method requires configured G Suite account and Google Admin SDK with the API access enabled. If you plan to audit Chromebooks, you must specify audit credentials for each Google Directory Audit Source that you want to audit.

INFO: For details on configuring G Suite account and Google Admin SDK, see Help: Google Directory Audit .

Alloy Discovery operates these types of audit credentials: Windows, Linux and Mac, ESXi/vSphere/Citrix, Google and SNMP.

Audit Credentials Description
Windows Windows audit credentials are required to run the audit on Windows computers.
Linux and Mac Linux and Mac audit credentials are required to run the audit on Linux or Mac OS computers.
ESXi/vSphere/Citrix ESXi/vSphere/Citrix audit credentials are required to run the audit on ESXi/vSphere and Citrix hypervisors.
Google Google audit credentials are required to run the audit on Chromebooks.
SNMP

SNMP audit credentials are the authentication information that you must provide to allow Alloy Discovery access SNMP data on various network devices such as networked printers, hubs, routers, etc. using the SNMP protocol.

Alloy Discovery supports SNMPv1, SNMPv2, and SNMPv3 versions.