Reading Time: 2 minutes When all the credentials have been entered, we are redirected to the auto detection engine where we can start to scan our network to detect devices to be imported into BLËSK. BLËSK requires credentials to get the most information out of the devices on the network. Be sure your devices are configured correctly and you […]
The auto detection wizard
Reading Time: < 1 minutes This page let you enter credentials needed to authenticate on different network devices like Switches, Firewall, and any other devices that allow Telnet login. Click « Add » to add a new entry and repeat the step for any additional access that you may have. If the device is a switch and required an “Enable Password“, […]
Reading Time: < 1 minutes This page let you enter credentials needed to authenticate on different network devices like Switches, Firewall, Unix servers and any other devices that allow SSH login. Click the « Add » button to add a new entry and repeat the step for any additional access that you may have. If the device is a switch and […]
Reading Time: < 1 minutes This page let you enter any credential needed to authenticate on VMware ESXi servers. Usually, it is the super-user called root with its password and use SSH protocol to connect. Click the « Add » button to add a new entry and repeat the step for any additional username and password that you may have. When […]
Reading Time: 2 minutes Before being able to scan and detect devices, we need to provide credentials which will be used to correctly authenticate on different hosts to collect data and other needed parameters. This page let you define credentials used to monitor Windows machines. We use WMI protocol for this purpose in order to be agentless. Click the « […]