Online Help

Audit methods

AlloyScan offers two methods for conducting audits: agent-based and agentless. This article describes the advantages of each method and explains how to choose the most suitable method for the specific network configuration and auditing requirements.

Both methods are visually represented in the diagram below, with detailed explanations provided in their respective sections. You will also find below a comparative table summarizing the differences between the two methods for quick reference.

Agent-based method

In the agent-based method, you need to install an audit agent on each computer you want to track. This could include devices such as laptops belonging to remote employees, as well as desktops and servers within the organization's network infrastructure. The agent runs automatically, collecting inventory data and securely transmitting it to AlloyScan.

The agent-based method requires only internet access and outbound HTTPS on port 443 to securely transmit audit data to the cloud service.

Agentless method

The agentless method operates within logical units of your infrastructure, referred to as segments. By designating a single computer within a segment and installing the Audit Service on it, you can initiate network discovery to identify computers, servers, and other network-connected devices such as switches, routers, printers, network cameras, and similar equipment. You can also use this method to discover and audit supported cloud resources. The Audit Service queries supported systems and platforms to collect inventory data and reports the results to AlloyScan.

The agentless method does not require installing agents on individual devices. However, to enable network discovery and data collection, specific ports must be open and certain protocols enabled within the segment where the Audit Service is deployed. For details, see Required ports for agentless audit.

Flexibility and compatibility

You can choose either the agent-based method, the agentless method, or a combination of both, depending on their specific auditing requirements and network configuration. Regardless of the chosen method, the data collected and reported from the audit remains consistent.

  Agent-based Agentless
What IT assets do you want to track?
Computers: Servers, workstations, desktops, laptops ✅ Yes ✅ Yes
Mobile devices: Smartphones and tablets Planned  
Network devices: Routers, switches, printers, network cameras, etc. ❌ No ✅ Yes
Hypervisors ❌ No ✅ Yes
Cloud resources: Containters, cloud instances, cloud servers ❌ No ✅ Yes
Where are the IT assets that you want to track?
Within the local network: Your office, school, store, etc. ✅ Yes ✅ Yes
Within a remote network: An office branch, warehouse, factory, etc. ✅ Yes ✅ Yes
Offsite: Remote employees' homes or flexible work locations ✅ Yes ❌ No
In Cloud: Azure, AWS, Google Cloud, etc. ❌ No ✅ Yes
What platforms do you want to audit?
Windows ✅ Yes ✅ Yes
Linux ✅ Yes ✅ Yes
macOS ✅ Yes ✅ Yes
vSphere/ESXi, Citrix, Xen, Hyper-V ❌ No ✅ Yes
iOS Planned  
Android Planned  

 

Watch this quick guided tour to discover the available audit methods and see how to get started with each one.