Remote Audit with FTP Delivery

Introduced in 8.6

The Remote Audit is a method of WAN audit, based on the deployment of standalone audit agents to a remote network. With this method, you can regularly audit offsite computers and remote networks that have no direct connection to the local network. Depending on the way how audit snapshots are delivered to Network Inventory, the Remote Audit method comes in two modes: FTP delivery and e-mail delivery.

The Remote Audit method offers two deployment scenarios for audit agents:

  • Install the audit agent to every remote computer.
  • Deploy the Inventory Analyzer package to a centralized location in the remote network and automate the audit agent using domain logon scripts or scheduled tasks.

When using this audit method, there is no direct link between the Automation Server and deployed audit agents; this is why any configuration changes or updated versions of the audit agents have to be manually re-deployed.

Before configuring the audit, make sure you have configured a proper audit profile.

To set up the audit, take the following steps:

  1. Make sure the Internet connectivity is available for transferring data via FTP/SFTP.

  2. Create an FTP Audit Source as described in Configuring FTP Audit Sources.

    NOTE: Before creating the FTP Audit Source, make sure that you know the settings of the FTP server on the remote network and have a valid user name and password if the server requires users to authenticate.

  3. On the remote site, create a folder on the dedicated file server. This network folder will serve as an intermediary repository, and it must have both the Modify permission and the Change Permissions special permission assigned for your account. Share this folder and grant the Full Control share permission to the Everyone group for this network share.

  4. Set the minimally necessary permissions for that folder. These minimally necessary permissions are used for the audit method to create the most secure environment for the network share and audit snapshot files stored there.

  5. Choose how to deliver the audit agent to the computers you want audited. You can use any or both of these options:

  6. Optional: You can check the source for new snapshots on demand, as described in Checking FTP Audit Sources for New Snapshots.