Network Detective Client Connector



Similar documents
PaperStream Connect. Setup Guide. Version Copyright Fujitsu

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector RapidFire Tools, Inc. All rights reserved.

Backing Up TestTrack Native Project Databases

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0

Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.

WSDOT ProjectWise V8i Training 101

Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Create, Link, or Edit a GPO with Active Directory Users and Computers

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Item Audit Log 2.0 User Guide

Operating System Installation Guide

SharePoint Password Change & Expiration 3.0 User Guide

Before installing the Zebra printer with USB connector, download the drivers from

Sage Peachtree Installation Instructions

Scribe Online Integration Services (IS) Tutorial

Preparing a Windows 7 Gold Image for Unidesk

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide

Abila Grant Management. Document Management

Practice Fusion API Client Installation Guide for Windows

NetVanta Unified Communications Server Backup and Restore Procedures

Cascaded Lookup 5.0 User Guide

Excel Templates. & Quote/Invoice Maker for ACT! Another efficient and affordable ACT! Add-On by V

Appendix E. Captioning Manager system requirements. Installing the Captioning Manager

1.1 Installing Protégé You can follow the steps below to download and install Protégé from the source.

Lab 5 Managing Access to Shared Folders

Interact for Microsoft Office

STIDistrict Server Replacement

ElectricCommander. Technical Notes MS Visual Studio Add-in Integration version version 3.5 or higher. October 2010

Bulk Downloader. Call Recording: Bulk Downloader

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

pure::variants Transformer for Software Configuration Management Manual

Archiving in Microsoft Outlook. This document looks at archiving and saving space in the Microsoft Outlook program. INFORMATION SYSTEMS SERVICES

Remote Storage Area (RSA) Basics

Installing SQL Express. For CribMaster 9.2 and Later

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

Quick Deployment Step-by-step instructions to deploy Oracle Big Data Lite Virtual Machine

Autograph 3.3 Network Installation

Using SQL Reporting Services with Amicus

Capture Pro Software FTP Server System Output

HP Operations Manager Software for Windows Integration Guide

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0

StreamServe Persuasion SP5 Document Broker Plus

Installation Guide. Wyse VX0LE Conversion to ThinOS. Wyse Simple Imager TM Release Wyse Device Manager TM Release 4.8.5

Network Scanner Tool R3.1. User s Guide Version

DEPLOYING A VISUAL BASIC.NET APPLICATION

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact

Reading and Writing Files Using the File Utilities service

WinSCP for Windows: Using SFTP to upload files to a server

4 Backing Up and Restoring System Software

Installation Guide. Installing MYOB AccountRight in a Remote Desktop Services Environment

ESET SECURE AUTHENTICATION. API SSL Certificate Replacement

Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint InfoPath 2013 Web Enabled (Browser) forms

ContentWatch Auto Deployment Tool

Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication

TERAcloud w w w. t e r a c l o u d. u k

Support Document: Microsoft SQL Server - LiveVault 7.6X

Scheduling in SAS 9.4 Second Edition

Secure Agent Quick Start for Windows

Installation & Configuration Guide User Provisioning Service 2.0

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

pure::variants Connector for Version Control Systems Manual

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

Xythos on Demand Quick Start Guide For Xythos Drive

Feith Rules Engine Version 8.1 Install Guide

Snow Inventory. Installing and Evaluating

Batch Scanning. 70 Royal Little Drive. Providence, RI Copyright Ingenix. All rights reserved.

SAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide

DigitalPersona Pro. Password Manager. Version 5.x. Application Guide

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Installation and Operation Manual Portable Device Manager, Windows version

Office of History. Using Code ZH Document Management System

SOFTWARE INSTALLATION INSTRUCTIONS CLIENT/SERVER EDITION AND WEB COMPONENT VERSION 10

The FTP Monitor application performs the following main functions:

Figure 1: Restore Tab

Using Internet or Windows Explorer to Upload Your Site

Technical Support Set-up Procedure

ProSystem fx Document (On-Premise)

User Manual. BarcodeOCR Version: September Page 1 of 25 - BarcodeOCR

Moxa Device Manager 2.3 User s Manual

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Studio 5.0 User s Guide

Publishing Geoprocessing Services Tutorial

Online Backup and Recovery Manager Setup for Microsoft Windows.

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

EVENT VIEWER IN WINDOWS 7

Windows Clients and GoPrint Print Queues

Chapter 23 File Management (FM)

HIC.SOAP Network User Instructions last updated June 22, :39 AM

RaidenFTPD Log Analyser Web Edition

Transcription:

Network Detective Copyright 2014 RapidFire Tools, Inc. All Rights Reserved. v20140801

Overview The Network Detective data collectors can be run via command line so that you can run the scans on a scheduled basis via your RMM or a task scheduler. The completes the process, allowing you to automatically transmit the resulting scan to a secure cloud storage area where it can be easily retrieved from the Network Detective user interface at a later time for report generation. The data collector is run via script. The client connector sends data to secure storage. Download the data file directly into Network Detective to generate reports. Typical Use Case The typical use case for the Network Detective Connector involves just 4 steps: 1. Download and unzip the Network Detective Data Collector (NDDC) and the on the target computer. You can do this manually or via your monitoring/rmm Tool. 2. Create a script or.cmd file to execute the NDDC via command line, and upon successful execution, the script should then call the with the Connector ID to upload the file or directory (see example in Command Line Options section). 3. Either setup a task scheduler (such as Windows Task Scheduler) to run the script/.cmd on the schedule you wish (e.g.-quarterly), or program your RMM to perform the tasks. 4. Run the Network Detective application. Go to the s tab and select the Connector you referenced in your script. Double-click to download the files from the cloud. You will be prompted to use the files to generate a report. 1

Setting up a Connector Step 1: Add the Connector Each of your client sites will have its own Connector that will have a unique ID. Before deploying a connector, run the Network Detective application to Add a Connector to Network Detective in order to create the unique ID. 1. Go to the tab 2. Click on the Connectors folder 3. Click on Add Connector 4. Enter a Label for the Connector (e.g. MyCustomer HQ). Note that the Connector ID is randomly generated and will be used to configure the connector later. 5. Press OK to create the site for the new connector Step 2: Copy the Connector ID The Connector ID is necessary to configure the command line that is deployed on the client site. You will use this Connector ID after the -id flag in your script. Select the connector and right-click. Choose Copy Connector ID to copy the value to your clipboard. 2

Appendix Command Line Options for the Network Detective Connector The command line contains options to either transmit an individual file, or to scan a directory for appropriate file(s) to transmit. For parameters, see the following table: Argument -id <id> -d <dir> Value ID of connector Directory where to get files from. It will only look for *.zip files there. DO NOT INCLUDE THE TRAILING \ (backslash) -f <filename> Only upload the specific file given -r Remove the file once you have successfully uploaded it -a <dir> Archive/move the files to the given directory if successfully uploaded -comment <text> Comment to upload; free-form text for various purposes -h or help Show help options -sim Simulate a run; no files will be transferred -t <num> Number of tries to upload a file; default 3, min 1 -tbr <seconds> Time between retries in seconds; default 5, min 1 NOTES: -f will take precedence over -d -r will take precedence over -a -sim will just display to stdout what it would have done Output: On Success: SUCCESS On Failure: Final Result: FAILED: error message goes here On Partial: Final Result: FAILED: PARTIAL: last error message goes here IMPORTANT NOTES If using the -d option, make sure not to include the last \ (bashslash). If your directory contains spaces, you must use quote it around the parameter value. Example: -d "c:\my folder" Example: ndconnector.exe -id 45220e08-d171-47b6-b738-1995fe9f466d -d "C:\MyScans" -r C:\MyScans is the directory to be uploaded to the cloud, and 45220e08-d171-47b6-b738-1995fe9f466d is the Connector ID. 3

Downloading a Scan and Generating Reports To download an available scan from the cloud-based holding area, go to the Connector tab and either double-click on a site or go to the Downloads folder. Scans that have not been downloaded will appear in BOLD. Double-click on the new scan or any previous scan to download it and begin the import scan wizard. The import scan wizard works identically to importing a scan from the local computer. Once a scan has been imported, it will appear in the Scans tab, under Recent Scans. Double-click on the scan to begin the report generation process as you normally would. Tips and Tricks Files with the same name will be overwritten. If you are using to upload a scan file, keep in mind that the most recent version of the file will overwrite an older version with the same exact name in the cloud. If you would like to prevent overwriting, add logic to your script to append a timestamp to your filename so that each filename is unique. Files are not downloaded automatically. Files stay in the cloud until you download them from in the Network Detective application. A downloaded file is not deleted from the cloud. Each file is accessible from any computer via Network Detective. Downloading a file does not remove it from the cloud. To remove a file from the cloud, go t the Connectors tab, right-click a scan, and choose Remove. How to run NDDC via command line. The easiest way to setup the proper command line arguments for the NDDC is to run the Wizard and fill in all of the prompts. Then, prior to starting the scan, use the Save Settings to file option to create the ndc.ndp file that contains the correct arguments for the network. You can then use the command line: >nddc file ndc.ndp 4