Wednesday, March 18, 2020

what do people use for unauthorized device surveys?

What do folks use for 'rogue' or 'unapproved' or 'unauthorized' device surveys? For our purposes this means someone, authorized or not, that plugs a device into the wired network that's not listed in the system inventory.

We've got boxes running librenms at each site (mostly for system health monitoring). It regularly does an autodiscover survey but only detects and lists devices that respond to snmp. This is not exactly useful for a comprehensive unauthorized device detection.

Suggestions? If it matters, we are *nix-savvy and it's our preferred environment but if we need to use another one for best results we can.



No comments:

Post a Comment