Verify Passwords

In order to scan devices properly, JDisc Discovery users need to configure access credentials. For security reasons, we do not display the passwords in clear text (neither in the UI nor in the logs). But how do you verify that you made no mistake when you entered the password? Misconfigured passwords lead to an access…

Pending Updates

Dear JDisc friends, upon a customer request, we have implemented a new feature to collect the list of pending updates on Windows and Linux computers. Three weeks ago, we added this feature for Linux and with build 5086 we finalized the data collection for Windows computers. We hope that this data helps to keep your…

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the…

CyberArk certifies JDisc

Dear JDisc friends, We are proud to announce that we have been certified by CyberArk! CyberArk is the global leader in Identity Security. Organizations use CyberArk to manage and secure the human and machine identities in their environment, many of which will have some form of privileged access. Part of securing these identities involves automatically…

Misconfigured Subnet Masks

Dear JDisc friends, since its beginnings, JDisc Discovery collects network interface configuration information such as IP addresses and subnet masks. When everything is properly configured, and the subnet masks are correctly set on the interfaces, then everything is fine. But what happens when that is not the case? So let’s assume your company has two…

JDisc Discovery: 3rd Party Software Components & Licenses

Dear JDisc friends, we continuously extend JDisc Discovery with new features. However, one important obligation and a common request that arises from our customers is to reference all 3rd party software components along with their respective license. By sharing this information with you, we enhance our software transparency. Additionally, this enables your corporate legal department…