Online Help

Segment audit credentials

This article describes how to set up credentials for accessing computers and devices within the segment. Credentials can be configured for the following platforms: Windows, Linux and macOS, Hypervisor, SNMP, AWS, Azure.

IMPORTANT: All credentials you enter here are encrypted and never leave your local network. AlloyScan never stores passwords or secrets in the cloud.

Windows credentials

These credentials are used for auditing Windows computers. The audit account you define must be a member of the local Administrators group on each Windows client computer, either directly or through membership in a Windows domain group.

Consider using a domain administrator's account. Note that Windows computers must belong to the same domain as the computer running the audit service.

TIP: Avoid using real user accounts. Instead, we recommend that you create a special domain user solely for the purpose of auditing your domain (the "audit account").

Linux and macOS credentials

These credentials are used to audit Linux and macOS computers . Credentials must allow logging on to these computers.

Consider using an account with root rights, i.e., the root account or the account that can run the dmidecode command with administrative rights. Otherwise, AlloyScan will not be able to collect SMBIOS hardware information on Linux computers. Collecting the list of services (daemons) on macOS computers also requires root rights. If you need this information, you should also use the root account or configure the launchctl command to run with elevated (root) privileges under a non-root account.

For connecting to Linux and macOS computers via SSH, AlloyScan uses Plink-a command-line network connection tool which is a part of the PuTTY product, distributed under the free MIT license. Plink is included in the AlloyScan installation package; the executable file name is plink.exe. For more information on PuTTY and Plink, see the following website: https://www.chiark.greenend.org.uk/~sgtatham/putty/.

Hypervisor credentials

These credentials are used to audit ESXi/vSphere and Citrix hypervisors. Credentials must allow logging on to these hypervisors. Consider using an account with administrative privilege and SSH access to the host system.

SNMP credentials

These credentials are used to collect inventory data about networked printers, scanners, hubs, routers, and other devices. AlloyScan detects and identifies those network devices via SNMP.

AWS credentials

AWS credentials allow the specified audit service to access and audit the specified AWS resources using a dedicated IAM user or role. For the minimal permissions required for the IAM user or role, see AWS minimal permissions.

Azure credentials

Azure credentials allow the specified audit service to access and audit the specified Microsoft Azure resources using a dedicated service principal. For the minimal permissions required, see Azure minimal permissions.