Discovery using a Jumphost

Dear JDisc friends, in many cases, firewalls are protecting specific areas of your network. Administrators often use so called jumphosts in order to access devices behind the firewall. They connect first to the jumphost and then use the jumphost to connect to the servers behind the firewall. JDisc Discovery lets you configure a jumphost to scan…

Details
The actual scope for a network inventory scan

Network Ping Improvements

Dear JDisc friends, we got some complaints about the speed of the ping sweep in the past. Especially when pinging large networks which are only sparsely populated. But first some background on the current implementation. We are using Windows API calls for the ping. The API call accepts up to 64 IP addresses to ping…

Details

ISCSI Discovery

Dear JDisc friends, we are constantly improving the discovery. Right now, one of our focus areas is to improve the discovery in the storage area. As a first new feature in this focus area, we scan the ISCSI initiators, targets and sessions. That provides detailed information about which servers uses what ISCSI target on what…

Details

WLAN SSID Filtering

Dear JDisc friends, JDisc Discovery detects wireless LANs and access points since quite a while. Whenever you scan a Windows or MAC computer with a wireless LAN card, then we are getting the list of available WLANs (SSIDs) together with their access points. However you might get unwanted wireless lans into your list depending on…

Details
SSH Remote Identifier Information

SSH Remote Identification

Dear JDisc friends, when JDisc Discovery connects via secure shell (SSH) to a device then the device’s SSH agent returns its remote identification string – even if the access credentials do not match. The remote identification string usually contains the vendor or the SSH service on the device and its version. In the past, JDisc…

Details