Table of Contents
Introduction
Purpose
Agent Configuration
Company
Introduction
Purpose
Agent Configuration:
1. Installation Procedure
Company System Registration
Go to <URL>. Go to <tab>
Click on the ‘+’ button in the Company dashboard. Enter the Company Name, Agent Name, and the Company Description (optional).
You have successfully created the company.
Agent Installation
Download and Install the NetalyticsAgent.exe file.
Enter Server and Site ID for a successful installation
Note: Click on Continue without Agent installation button, If not willing to wait for registration
2. Scan all agent subnets
Will have an option to scan all agent subnets without providing subnet details in portal prior to agent installation,
You will receive an mail on a successful installation.
Have an option to download Server and Secret code for hassle-free entry
3.Agent Configuration
Download and Install
Click on “Settings”-> “Downloads”
Download Agent and run the exe. Agent will get installed.
Windows Protect your PC
Open the installed agent and select More info in Windows Protect your PC page. Select Run anyway to install the agent
License Agreement
You will find a popup screen asking permission to install Netalytics Agent. Click on YES and Select the radio button To accept the agreement option in the License Agreement popup and Click next for the further steps
Provide the destination location in which you would prefer to save the agent in Select destination popup screen. Once the path is defined, click on Next for the Agent configuration.
Note: By default system suggests “C:\Program Files (x86)\NetalyticsAgent “ this path to save the agent.
Key-in the Server and Secret code details optioned from Configuration information during Agent installation.
Finish the Installation by agreeing the terms and conditions
4.Asset Configuration
Here comes an interesting feature of the product, You can opt to enter a range of IP address/ Static IP address or simply click on the Scan all assets.
If opted to provide IP address range, Netalytics Vulnerability Manager will scan all connected IP’s in the specified range.
On providing Static IP, the system scans the Vulnerabilities in that specific system.
If clicked on, Scan All Assets, Our Product scans all agent subnets in the registered company
To initiate the configuration
Step. 1: Select the CIDR | IP Range | Static IP
Save the IP address
Step 2: Save the IP Address
Step 3: Add Master Credentials
At this stage, you can specify the master credentials or just skip and finish the installation.
Note: Credentials can be added before you initiate the Vulnerability scan.
5.Summary
Once the configuration is successfully completed, the System generates an overall summary report on overall system specification
Click on the finish button and now the system is ready to scan Vulnerabilities
Company
Once Agent is installed successfully, click on the Company Icon on the Global tab and select the Created company for further process.
Click on the Company Name, The page will get redirected to the company Dashboard.
Once entered the page, will be able to view Company Dashdashboard, Assets, Vulnerabilities, Compliance, Audit Log and Report Tables
In the settings tab: Select Jobs to view the number of devices discovered in the specified range during Agent Installation, any failed jobs, and the status of Agent Configuration.
Select Discovery Tab: Have 4 credential options
1.SNMP Credentials: If SNMP credentials specified and saved during agent installation, The agent will automatically scan the network devices, as specified below.
2. IP Ranges: We have 3 types of IP ranges, CIDR, IP Range, and Static IP. Click on IP Range Type and select CIDR in the drop-down to specify start IP and IP range type and save to view
IP Ranges: CIDR
Step 1:
Click on + button to select the type of CIDR in the drop-down
Step 2:
Enter the IP range for which intended to discover and save
Step 3:
Select the IP ranges and Click on Start scan to discover the select IP ranges.
IP Ranges: IP Range
Step 1:
Click on + button to select the type of IP range in the drop-down
Step 2:
Select the type of IP range and enter the IP range for which intended to discover.
Step3:
Select the single or multiple IP ranges and click on Start Scan to discover the IP range.
IP Ranges: Static IP
Step 1:
Click on the + button, and select Static IP to Scan Single device.
Step 2:
Enter static IP and save
Step 3:
Select the static IP and click on Start Scan to discover the static IP.
Active Directory Credentials:
Step 1:
Click on + button to enter the AD credentials
Step 2:
Fill in the required details and click on Save Credentials to save.
Step 3:
The screen will reflect the AD credentials ready to scan.
Note: If AD credentials specified during network discovery, System will verify and Scan the AD devices automatically.
Master Credentials:
Step 1:
Click on + button to start entering the Master Credentials
Step 2:
Fill In the required fields and enter save
Step 3:
Master credentials successfully added.
Note: If Master credentials available during network discovery, System will verify and Scan the AD devices automatically.
Assets: Will be able to view details pertaining to the devices discovered during agent installation,
Will be able to perform many other actions when clicked on the action drop-down.
Edit:
When selected, We will be able to change the OS Type and Host IP and will be able to specify the criticality of the device scan.
Can enter the Tag Name as per the specifications described in the Popup. this is can be considered during the Patch update.
We can add the credentials of the device details such as User Name, Password, Domain name, and Port details of the device.
Details: Can view 3 categories of details such as Device Details, Vulnerabilities, and CIS Compliance
Device Details: will be able to view complete device details such as
Vulnerabilities: Under Vulnerabilities, we can view Authenticated and Unauthenticated Vulnerabilities.
Authenticated Vulnerabilities: This will be reflected once the specified device completes the Vulnerability scan.
Unauthenticated Vulnerabilities: This will be refected once the device discovery is completed.
CIS Compliance: This will be reflected once the specified device completes the compliance scan.
Vulnerability Report: Will be able to view the report pertaining to the complete Vulnerabilities of the device.
Compliance Matrix:
<<Need clarification >>
Compliance Report: Will be able to view the report pertaining to the complete Compliance of the device.
Delete
Under Assets, When global action is selected for specific assets. below mentioned can be viewed in the global action dropdown
Assets Scan: Discovery of the selected device can be initiated when clicked on this button.
Add Tag
Vulnerability Scan
Windows Packages Scan
Compliance Scan
Delete
Dashboard: In Dashboard, we will be able to see the stats of the Company/Range that was specified during Agent Installation.
Add Comment