Online Help

Audit methods

AlloyScan offers two methods for conducting audits: agent-based and agentless. This article describes the advantages of each method and explains how to choose the most suitable method for the specific network configuration and auditing requirements.

Both methods are visually represented in the diagram below, with detailed explanations provided in their respective sections. You will also find below a comparative table summarizing the differences between the two methods for quick reference.

Agent-based method

In the agent-based method, users install an audit agent on each device they wish to track within their network. This could include devices such as laptops belonging to remote employees, as well as desktops and servers within the organization's network infrastructure. The only requirement for this method is access to the internet.

Agentless method

The agentless method operates within logical units of your infrastructure referred to in AlloyScan as segments. By designating a single computer within the segment and installing the Audit Service on it, you can remotely discover every IT asset, software, and hardware component present in that segment. The Audit Service acts as a proxy, crawling the network to identify connected devices like routers and printers, and collecting and reporting their inventory data to AlloyScan.

This method does not require the installation of any agents on individual devices. To implement the agentless method, you need to open specific ports and enable certain protocols in the designated segment (see Required ports for agentless audit).

Flexibility and compatibility

You can choose either the agent-based method, the agentless method, or a combination of both, depending on their specific auditing requirements and network configuration. Regardless of the chosen method, the data collected and reported from the audit remains consistent.

  Agent-based Agentless
What IT assets do you want to track?
Computers: Servers, workstations, desktops, laptops

Yes

Yes
Mobile devices: Smartphones and tablets Planned  
Network devices: Routers, switches, printers, network cameras, etc.   Yes
Hypervisors   Yes
Cloud resources: Containters, cloud instances, cloud servers   Planned
Where are the IT assets that you want to track?
Within the local network: Your office, school, store, etc. Yes Yes
Within a remote network: An office branch, warehouse, factory, etc. Yes Yes
Offsite: Remote employees' homes or flexible work locations Yes  
In Cloud: Azure, AWS, or another cloud service   Planned
What platforms do you want to audit?
Windows Yes Yes
Linux Yes Yes
macOS Yes Yes
vSphere/ESXi, Citrix, Xen, Hyper-V   Yes
iOS Planned  
Android Planned  

 

Watch this quick guided tour to discover the available audit methods and see how to get started with each one.