Online Help

Segment audit credentials

This article describes how to set up credentials for accessing computers and devices within the segment. Credentials can be configured for the following platforms:

All credentials you enter here are encrypted and never leave your local network. AlloyScan never stores passwords or secrets in the cloud.

TIP: On the Usage tab, you can see the list of audit services that use a particular set of credentials.

Windows credentials

These credentials are used for auditing Windows computers. The audit account you define must be a member of the local Administrators group on each Windows client computer, either directly or through membership in a Windows domain group.

Consider using a domain administrator's account. Note that Windows computers must belong to the same domain as the computer running the audit service.

TIP: Avoid using real user accounts. Instead, we recommend that you create a special domain user solely for the purpose of auditing your domain (the "audit account").

Linux and macOS credentials

These credentials are used to audit Linux and macOS computers in your segment. Credentials must allow logging on to these computers and executing the commands necessary for data collection.

AlloyScan uses certain commands that require the use of sudo (for example, to collect hardware or system information). For complete data collection, provide credentials for a user authorized to execute sudo and enable the Use sudo option for these credentials in AlloyScan.

Hypervisor credentials

These credentials are used to audit ESXi/vSphere and Citrix hypervisors. Credentials must allow logging on to these hypervisors. Consider using an account with administrative privilege and, for Citrix hypervisors, SSH access to the host system.

SNMP credentials

These credentials are used to collect inventory data about networked printers, scanners, hubs, routers, and other devices. AlloyScan detects and identifies those network devices via SNMP.

AWS credentials

AWS credentials allow the specified audit service to access and audit the specified AWS resources using a dedicated IAM user or role. For the minimal permissions required for the IAM user or role, see AWS minimal permissions.

Azure credentials

Azure credentials allow the specified audit service to access and audit the specified Microsoft Azure resources using a dedicated service principal. For the minimal permissions required, see Azure minimal permissions.

Google credentials

Google credentials allow the selected Audit Service to access and audit the specified Google Cloud resources using a dedicated service account. For the minimal permissions required, see Google Cloud minimal permissions.