Setting up WMI and WinRM on Target Machines without using an administrator

vScope can use the WMI protocol to inventory Windows OS machines. This also includes Hyper-V machines and the VMM. 1. Create user in Active Directory Create a user called eg. “svc_vscope” in your Active Directory. 2. Add the user to the local default group Distributed COM Users 2.1 Open lusrmgr.msc. 2.2 Go to Groups. 2.3 […]

Connect to Windows OS (PowerShell) Using Just Enough Administration (JEA)

Incorporating Windows PowerShell into your Discovery enhances vScope’s ability to collect information from the operating systems of Windows servers or clients. Using PowerShell, instead of WMI/WinRM, allows for a more flexible inventory, including the capability to customize the collection of Windows Registry Keys. Furthermore, PowerShell enables the use of Microsoft’s Just Enough Admi...

Connecting to Active Directory (LDAP)

By connecting vScope to Microsoft Active Directory, you can collect Users, Groups, Group Policies, Organizational Units, and Devices, to enrich your inventory even further. vScope uses the LDAP protocol to establish a connection, this means that you can also use the connector to connect to other directory services. Notice: If you want to collect assets […]

Connecting to Veeam Backup & Replication

You can connect to Veeam Backup & Replication either using SQL or API. The API was released Notice: vScope does not currently support Veeam Backup & Replication using PostgreSQL database Connecting to Veeam using SQL (recommended) The Veeam integration is used by vScope to discover your Veeam installation. vScope utilizes the SQL server required by […]

Extended SNMP inventory of tags with OIDs

By using Tags from Discovery for SNMP devices, you can collect custom values from OIDs on network devices and add them as tags in vScope. Before we start… It’s essential to have your devices’ OID (Object Identifier) documentation ready. These are known as MIB and contain descriptions and textual representations for the OID:s. If you’re […]

Exhausted Available Authentication Methods Error with RSA Key (SSH)

If you’re encountering the “Exhausted available authentication methods” error when using an RSA key on an Ubuntu 22.04 or newer server, it’s a sign that your RSA key is outdated and potentially insecure. This guide will help you resolve the issue by upgrading to a modern and secure ed25519 keypair. Error: Exhausted available authentication methods […]

Connecting to Microsoft SQL

Adding Microsoft SQL to vScope unlocks information from Microsoft SQL servers in your IT environment. The data source includes asset types such as Database Systems, Databases, User Accounts, and Jobs. vScope can inventory a Microsoft SQL database server in two ways: Regardless of what method you use, adding Microsoft SQL Server as a data source […]

Asset types and module assignments in vScope

***As per September 2023*** In vScope, assets are grouped into different Asset Types. Asset Types are unlocked by different modules licensed in vScope. Below is a table that lists Asset Types and the relation to the licensed modules as well as possible discovery platforms from which assets can be retrieved. Asset Types and module mapping […]

Create recovery user account

recovery.username= USERNAME recovery.password= PASSWORD recovery.licenseid= Contact Support for License Instance ID The license instance id requirement is a safety measure to make sure that you know enough about the installation to be allowed to create a recovery user. The license instance id can be obtained by us if not visible elsewhere. The recovery user will […]