New Network Node Wizard - Individual Audit Credentials
Updated in 8.5
On this page, you specify an individual set of credentials for auditing a single Network Node. Individual credentials take a higher priority over Audit Source credentials. After the Node is created, you can later modify the Node's credentials in the Node Properties [Node Name] window.
There are these types of audit credentials:
Windows - used to audit Windows computers. These credentials must correspond to a user account that is a member of the local Administrators group on each Windows client machine (either directly or through the membership in a Windows domain group). We recommend that you use a domain administrator's account. You can also specify a local account as long as this account exists on every computer you want audited.
Linux and Mac - used to audit Linux and macOS computers. You must assign the credentials that allow logging on to these computers.
We recommend that you provide credentials for an account with root rights, i.e. the root account or the account that can run the
dmidecodecommand with administrative rights. Otherwise, Alloy Discovery will not be able to collect SMBIOS hardware informational on Linux computers. Collecting the list of services (daemons) on Mac computers also requires root rights. If you need this information, you should also use the root account or configure the
launchctlcommand to run with elevated (root) privileges under a non-root account.
NOTE:Alloy Discovery establishes connection to the audited Linux and Mac computers using the Secure Shell protocol (SSH) over a standard TCP port 22. Therefore, it is required that the SSH server is running on each client computer and listening on the dedicated TCP port. If the SSH server on your client computers listens on a non-standard TCP port, specify another port number when providing audit credentials for the Audit Source (for details, see Configuring Direct Network Scan Audit Sources) or for particular computers (for details, see Viewing and Changing Network Node Properties).
ESXi/vSphere/Citrix - used to audit ESXi/vSphere and Citrix hypervisors. This credentials must allow logging on to these computers. We recommend that you use an account with administrative privileges. For Citrix hypervisors, audit credentials must allow logging to the computers using the SSH protocol.
Google - used to detect and identify Google Chromebooks.
SNMP - used to detect and identify network devices by accessing the data via SNMP.
NOTE:Alloy Discovery supports SNMPv1, SNMPv2c, and SNMPv3 versions.
To define a set of individual credentials:
In the Windows/Linux/Google/Mac field, click the ellipsis button . Select Audit Credentials window opens.
Specify the credentials as needed and click OK.