Container discovery

Prev Next

This document provides information about the Container discovery screen, which allows the configuration of container discovery for specific environments.

Path to access

  1. On Segura, in the navigation bar, hover over the Products menu, and select Discovery.
  2. In the side menu, select Management > Discovery.
  3. On the Discovery screen, click the Add button.
  4. On the Choose the type of your discovery screen, click the Containers button.

Settings tab

This tab provides information about general configuration options.

Item Type Required Description
Name* Text field Yes Defines the name that will identify this configuration.
Container host* Dropdown menu Yes Select the container host.
Enable Toggle button No Enables or disables the execution.

Connection tab

This tab provides information about connection settings.

Access using credential from vault section

Item Type Required Description
Access credential Dropdown menu No Select the credential for the process.
Network Connector Dropdown menu No Select the network connector to be used.
Configuration password (ex: enable) Text field No Defines the password used before performing authentication.
Force sudo use Toggle button No Enables or disables the use of sudo for elevated permissions.

Access using pool of credentials section

Item Type Required Description
Pool of credentials Text field No Search for the credentials in the list of included credentials.
Add/Remove selected Button No Add or remove the selected credentials.
Pool of credentials table Table No Displays the credential pools. The fields are: ID, Name, and Priority.

Searches tab

This tab provides information about configuring which entities should be included in the process.

Item Type Required Description
Search for credentials Checkbox No Defines credentials in the process.
Search for devices groups Checkbox No Defines device groups in the process.
Search for certificates Checkbox No Defines certificates in the process.
Find DevOps artifacts Checkbox No Defines DevOps artifacts in the process.
Monitor unauthorized access (1 hour intervals) Checkbox No Defines whether unauthorized access to credentials is monitored at 1-hour intervals.
Identify accounts in application pools (IIS) Checkbox No Defines credentials in IIS application pools.
Search FQDN in Windows devices Checkbox No Defines the Fully Qualified Domain Name (FQDN) of Windows devices.
Identify Windows accounts associated with a service Checkbox No Defines accounts in Windows associated with services.

Search containers tab

This tab provides information about searching containers.

Item Type Required Description
Search only running containers Toggle button No Enables or disables the search for only running containers.

Plugin information tab

This tab provides information about the plugins used.

Item Type Required Description
Add/Remove selected Button No Adds rows to the table.
Plugins for discovery table Table No Allows manual entry of the plugins and ports to be used. The fields are Plugin and Port (separated by commas).

Execution tab

This tab provides information about scheduling the certificate execution.

Item Type Required Description
Credential scan execution* Toggle button Yes Defines whether the scan should remain active after importing the certificates.
Days allowed for executions Toggle button No Define specific days for automation to run. The options are All days, Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday.
Period allowed for execution Toggle button No Define specific periods for automation to run. The options are All periods, 08:00 AM - 12:00 PM, 12:00 PM - 4:00 PM, 4:00 PM - 8:00 PM, 8:00 PM - 12:00 AM, 12:00 AM - 04:00 AM, 04:00 AM - 08:00 AM.
Minimum interval between runs* Quantity input Yes Defines the minimum number of hours between each automation execution. It is recommended to set at least 8 hours between runs.

Review tab

Use the Review tab to check all the information entered in the previous tabs.