Understand your IT Landscape better

Hello JDisc Friends, With our JDisc Discovery built-in reports and your custom reports, you have achieved a very good understanding of your IT landscape. But is it enough? In order to help you in this direction, we have just implemented in our new Web UI the overview dashboard. In this dashboard, it is possible to[...]
Read More

Using non-administrative accounts to discover Windows computers

Dear JDisc user, have you already been asked by your IT security department not to use local or domain users with administrator rights on Windows computers for network discovery? Unfortunately, Windows doesn’t offer Linux-like privilege elevation methods like SU or SUDO. Of course, security folks want you to embrace the principle of least privilege (PoLP)[...]
Read More

Why Supportability is so important to us

Dear JDisc users, do you feel like the guy in the image when talking to support hotlines? Are you playing ticket ping pong with the support engineer who is permanently asking for new log files or further information? This troubleshooting process can be very time-consuming and frustrating on both sides. At JDisc, we have always[...]
Read More

Security Add-On: SSH Cipher, MAC, and Key-Exchange Algorithms

Dear JDisc users, As usual, we are constantly enhancing our data collection capabilities. This time, we have enhanced our security add-on to collect information about the SSH cipher, MAC, and key-exchange algorithms. When the security add-on is installed and licensed, the discovery configuration dialog offers a new setting for security-related data collections. When JDisc Discovery[...]
Read More

oVirt Support Added

Dear JDisc friends, We are continuously improving our scanning capabilities. Starting with build 5130, we will support Red Hat’s oVirt virtualization management software (starting with version 4). oVirt is similar to VMware’s VCenter. oVirt lets you define virtual datacenters, clusters and assign physical servers to the clusters. The support also includes Oracle’s Virtualization Management software[...]
Read More

JDisc Discovery integrates PAM Solution Passwordstate

Companies use more and more PAM (Privileged Access Management) tools to store, manage and rotate passwords for essential accounts (like domain admin accounts or root accounts for important servers). Especially rotating passwords make a manual configuration within JDisc Discovery impossible. Therefore, JDisc has integrated three password managers (Cyberark, Thychotic, Microsoft LAPS) into JDisc Discovery. Within[...]
Read More

LOG4J – Linux & Windows Script to identify log4j Vulnerability

Dear JDisc friends, find the German translation from our long-term partner i-doit: https://www.i-doit.com/en/blog/jdisc-and-i-doit-it-service-management-with-discovery-and-cmdb/ I think everyone is busy figuring out if any applications are affected by the log4j security issue. While this may be easy for commercial applications, the vulnerability can be difficult to find for custom applications that are hosted in your data centers.[...]
Read More

JDisc Discovery and Log4j – CVE-2021-44228

Dear JDisc users, I am pretty sure that you are aware of the log4j security issue CVE-2021-44228. JDisc Discovery is mainly written in Java and we have investigated whether we are affected. One external library (yavijava – a library to access VMware ESX and VSphere servers) uses log4j in version 1.2.17. We have investigated the[...]
Read More

Verify Passwords

In order to scan devices properly, JDisc Discovery users need to configure access credentials. For security reasons, we do not display the passwords in clear text (neither in the UI nor in the logs). But how do you verify that you made no mistake when you entered the password? Misconfigured passwords lead to an access[...]
Read More