Verify Passwords

In order to scan devices properly, JDisc Discovery users need to configure access credentials. For security reasons, we do not display the passwords in clear text (neither in the UI nor in the logs). But how do you verify that you made no mistake when you entered the password? Misconfigured passwords lead to an access[...]
Read More

Pending Updates

Dear JDisc friends, upon a customer request, we have implemented a new feature to collect the list of pending updates on Windows and Linux computers. Three weeks ago, we added this feature for Linux and with build 5086 we finalized the data collection for Windows computers. We hope that this data helps to keep your[...]
Read More

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the[...]
Read More

Local User Password Information

Dear JDisc Users, we have extended our Security Add-On to collect information about local users and their password information. The issue with local users is that they are difficult to control. For users who are part of a Windows domain, it is pretty simple to configure policies to change the password on a regular basis.[...]
Read More

WebUI: New Scanner Component

Dear JDisc friends, we continuously extend our WebUI with new features, and at the same time we migrate existing features from the standard JDisc Discovery client. However, sometimes a redesign is necessary in order to improve the usability of our user interface. The new scanner component provides now a better overview of the discovery process.[...]
Read More

CyberArk certifies JDisc

Dear JDisc friends, We are proud to announce that we have been certified by CyberArk! CyberArk is the global leader in Identity Security. Organizations use CyberArk to manage and secure the human and machine identities in their environment, many of which will have some form of privileged access. Part of securing these identities involves automatically[...]
Read More

Use-Cases for Upload API

JDisc Discovery has a new upload API using the importManager mutation in GraphQL. While the most common operation is to query data that has been discovered in a previous discovery run via a GraphQL query, the upload API mutation currently allows to add devices to the inventory from the outside of the JDisc server. Other[...]
Read More

Misconfigured Subnet Masks

Dear JDisc friends, since its beginnings, JDisc Discovery collects network interface configuration information such as IP addresses and subnet masks. When everything is properly configured, and the subnet masks are correctly set on the interfaces, then everything is fine. But what happens when that is not the case? So let’s assume your company has two[...]
Read More

JDisc Discovery: 3rd Party Software Components & Licenses

Dear JDisc friends, we continuously extend JDisc Discovery with new features. However, one important obligation and a common request that arises from our customers is to reference all 3rd party software components along with their respective license. By sharing this information with you, we enhance our software transparency. Additionally, this enables your corporate legal department[...]
Read More