This guide explains how to register a Container type discovery on the Segura platform. This configuration allows identifying active containers running on monitored hosts, performing associated searches, and automating import and execution processes.
Access path
- In the left sidebar menu, click Management.
- Select the Discovery option.
- On the main screen, click Add and, in the dropdown menu, choose the Container option.
Fill in the initial settings
- In the Settings tab, fill in the following fields:
- Name: Identifier for the discovery.
- Container host: Select the host where containers are running.
- Enabled: Select Yes to activate the discovery.
- Click Continue to proceed.
Configure access credentials
- In the Connection tab, define the authentication and connection parameters:
- Access credential: Select the credential stored in the vault that will be used for connection.
- Network Connector: Select the network connector that will remotely execute the discovery.
- Configuration password (e.g., enable): Optional password field used in specific devices.
- Force sudo use: Activate to allow use of sudo commands during execution.
- Pool of credentials: Optionally, select credential pools for fallback. Click Add to include pools.
- Click Continue to proceed.
Select search objects
- In the Searches tab, select the items the discovery should look for:
- Search for credentials
- Search for device groups
- Search for certificates
- Find DevOps artifacts
- Monitor unauthorized access (1-hour intervals)
- Identify accounts in application pools (IIS)
- Search FQDN in Windows devices
- Identify Windows accounts associated with a service
- Click Continue to proceed.
Configure container search
- In the Search containers tab, define the container scan scope:
- Search only running containers: Enable this to limit the scan to currently running containers.
- Click Continue to proceed.
Enter plugin information
-
In the Plugin Information tab, add the plugin data used for discovery:
- Click Add to include a specific plugin.
- Enter the Ports (separated by commas) used by the plugin.
Info- Windows plugin is required to identify accounts used for services.
- For SQL Server plugin, port 1434 is only used for servers with dynamic ports.
-
Click Continue to proceed.
Set execution rules
- In the Execution tab, configure automation settings for the discovery:
- Keep scan active after import?: Defines whether the scan will continue running after import.
- Days allowed for execution: Select which days the scan is allowed to run.
- Periods allowed for execution: Define time intervals during the day (e.g., 08:00–12:00).
- Minimum interval between executions (in hours): Set the minimum frequency (e.g., 24 hours).
- Click Continue to proceed.
Certificates tab
Configure the certificate discovery options:
- Certificates origin: Apache, Nginx, Tomcat, IIS, Workstation Windows, IBM Websphere, Microsoft CA, Palo Alto, Kubernetes, NetScaler.
- Search certificates in directories
- Search certificates without login
- Import all certificates automatically
- Extra settings for F5/BigIP: Configure the SOAP port.
DevOps tab
Configure DevOps tool integration:
-
Ansible
- Enable service
- Search playbooks
- Search roles
- Search hosts
-
Jenkins
- Enable service
- Access token
- Access port
- Search jobs
- Search nodes
- Search users
-
Kubernetes
- Enable service
- Select credential
- Access port
- Search secrets
- Bearer token
Review discovery configuration
- In the Review tab, confirm all information entered in the previous steps.
- After reviewing, click Save to register the discovery.