Scanning your Kubernetes Cluster

Dear JDisc friends, with release build 5198 for our network scanner JDisc Discovery, we have completely changed the way we scan Kubernetes clusters. Up until now, users were able to define default access tokens for Kubernetes clusters, which were tried against the cluster whenever we found one. This approach does not really make a lot[...]
Read More

Web UI – Custom Attributes

Dear JDisc friends, Custom attributes allow users to extend device discovery with custom properties and attach them to devices. This feature is supported in our client for quite some time. In release 5176, we have redesigned and implemented this feature in the new Web UI. We  have published a video to explain the basic concepts[...]
Read More

Supported Devices

Dear JDisc friends, As an IP scanner product that detects all devices on your network, we pretty often get the question about what devices we support. What device types, vendors, and operating systems, and do we have special scan procedures for dedicated software items? Answering that question was always pretty challenging for us, and we[...]
Read More

Verify Passwords

In order to scan devices properly, JDisc Discovery users need to configure access credentials. For security reasons, we do not display the passwords in clear text (neither in the UI nor in the logs). But how do you verify that you made no mistake when you entered the password? Misconfigured passwords lead to an access[...]
Read More

Misconfigured Subnet Masks

Dear JDisc friends, since its beginnings, JDisc Discovery collects network interface configuration information such as IP addresses and subnet masks. When everything is properly configured, and the subnet masks are correctly set on the interfaces, then everything is fine. But what happens when that is not the case? So let’s assume your company has two[...]
Read More

New Feature: Antivirus Software Discovery

Dear JDisc friends, based on several customer enhancement requests, we have extended our Security Add-On to scan the list of installed Antivirus software together with its enabled state and its updated state. The updated state defines whether the Antivirus definition files are up-to-date. This new feature offers a good overview over the Antivirus software used[...]
Read More

How much Traffic is caused by the Discovery?

Network traffic generated by the discovery
Dear JDisc friends,a frequently asked question that arises from customers and prospects is: how much traffic does the discovery put on the network? Of course, it is not easy to answer this question. There are many factors that influence the generated traffic for a device. For instance, the device type is a major criteria. Scanning[...]
Read More

Network Creation Policy

Dear JDisc users, We frequently get feedback from our users that JDisc Discovery creates IP4 networks that don’t exist. So what’s the reason for that? The reason is that JDisc Discovery tries to determine all IP addresses and subnet masks for a device. The IP address, together with the subnet mask, defines the IP4 network[...]
Read More

SNMP Custom Data Collection

Dear JDisc friends, first of all I wish everybody a happy new year 2021! JDisc Discovery supports since its beginnings the collection of custom attributes via scripts and reading registry keys. The custom attribute data collection is often used by customers to collect information that JDisc Discovery does not collect out-of-the-box. However, some customers requested[...]
Read More