This document provides information on how to add a device discovery in the Segura® Platform. This configuration enables the automatic identification of assets based on an IP range and supports additional integrations, filtering, scheduling, and import features.
Add a device discovery
To add a device discovery, see the following steps:
- On Segura® Platform, in the navigation bar, hover over the Products menu and select Discovery.
- In the side menu, select Management > Discovery.
- In the Discovery report, click Add.
- Select Device as the discovery type.
- In the Settings tab, enter the following information:
- In the Name * field, enter a name for the discovery.
- Optional: In the Enable origin-based segregation (IP range) field, toggle to enable origin-based segregation. By enabling this option, the glossary’s field Version ID string * will be ignored. Make sure to have an IP segregation configured; otherwise, this field won’t work. More information in How to create a discovery segregation through IPs.
- In the Initial IP * field, enter the starting IP of the range.
- Optional: In the Final IP field, enter the final IP of the range.
- Optional: In the Site field, enter the site where your device is located.
- In the Enabled * field, select Yes or No to enable or disable the discovery.
- Click Continue.
- In the Connection tab, enter the following information:
- In the Access credential field, select a credential.
- Optional: In the Network Connector field, select the network connector responsible for performing the scan.
- Optional: In the Configuration password (ex: enable) field, enter the configuration password for devices such as switches.
- Optional: In the Force sudo use field, enable to force the commands to run with sudo on Linux or Unix.
- Optional: In the Access using pool of credentials section, click + Add to select the pool of credentials.
- Select the pool and click Add.
- Click Continue.
- In the Searches tab, select the following information:
- In the Search for credentials field, select to discover credentials.
- In the Search for devices groups field, select to discover devices groups.
- In the Search for certificates field, select to discover certificates.
- In the Find DevOps artifacts field, select to discover DevOps artifacts.
- In the Monitor unauthorized access (1 hour intervals) field, select to monitor unauthorized credential access every hour.
- In the Identify accounts in application pools (IIS) field, select to discover credentials in IIS application pools.
- In the Search FQDN in Windows devices field, select to obtain Windows devices’ FQDN.
- In the Identify Windows accounts associated with a service field, select to discover Windows credentials associated with services.
- Click Continue.
- In the Plugin Information tab, select the following information:
- In the Plugins for discovery section, click + Add to select the plugins used for discovery and enter the port.
Info
- The Windows plugin is required to identify Windows accounts used for services.
- The SQL Server plugin uses port 1434 only for servers with dynamic ports.
- In the Plugins for discovery section, click + Add to select the plugins used for discovery and enter the port.
- Click Continue.
- Optional: In the Execution tab, enter the following information:
- In the Keep scan active after import? * field, select to keep the discovery looking for new credentials after the first import.
- In the Days allowed for execution section, select when the discovery will run.
- In the Periods allowed for execution section, select at what times the discovery will run.
- In the Minimum interval between runs section, select the interval between each scan of the discovery.
- Click Continue.
- Optional: In the Import tab, enter the following information:
- In the Enable automatic importation of devices and credentials? * field, toggle it to enable automatic importation of devices and credentials directly into [PAM Core]().
- In the Credential import section, click + Add to enter the credentials’ username to be imported automatically.
- Click Continue.
- Optional: If you selected to discover certificates through the discovery, enter the following information in the Certificates tab:
- In the Certificate’s origin field, select the origin of the certificate.
- In the Import all certificates automatically field, toggle it to import all certificates found directly to Certificate Manager.
- In the Port for access via SOAP (F5/BigIP) field, enter the port for access if you select F5 or BigIP as the origin of the certificate.
- Click Continue.
- Optional: If you selected to discover DevOps artifacts through the discovery, enter the following information in the DevOps tab:
- For Ansible settings:
- In the Enable Ansible service field, toggle to enable Ansible service.
- In the Search playbooks field, toggle to search for playbooks.
- In the Search roles field, toggle to search for roles.
- In the Search hosts field, toggle to search for hosts.
- For Jenkins’ settings:
- In the Enable Jenkins service field, toggle to enable Jenkins service.
- In the Search jobs field, toggle to search for jobs.
- In the Search nodes field, toggle to search for nodes.
- In the Search users field, toggle to search for users.
- In the Jenkins’ access token field, select what access token to use.
- In the Access port field, enter the access port.
- For Kubernetes’ settings:
- In the Enable Kubernetes service field, toggle to enable Kubernetes service.
- In the Search secrets field, toggle to search for secrets.
- In the Bearer token field, toggle to use bearer tokens.
- In the Credential access Kubernetes field, select the credential to access Kubernetes.
- In the Access port field, enter the access port.
- For Ansible settings:
- Click Continue.
- In the Review tab, review all information entered previously and click Save.
The newly created discovery will appear on the Discovery report screen.