When deploying a monitoring system, it is important to remember that 70% of the configuration is done on your network equipment. This includes the preparations such as collecting the required credentials. Here is a list of initial preparations to help with an optimal deployment.
Be sure that the SNMP protocol is enabled and configured on all of your network devices.
Enabling the CDP or LLDP protocol on switches will provide, among other things, a view of the interconnections between these switches. You will therefore need to activate one of the CDP or LLDP protocol (depending of your model) on switches.
The NSM Scanner is a full-featured scan engine that executes vulnerability tests (VTs) against target systems. blësk NSM module acts as blësk Vulnerability Assessment Manager, and to allow blësk scanning the devices in a network, targets need to be specified if you haven't already done so.
NCM only needs to have access to your devices through SSH or Telnet, therefore ensure that the credentials for SSH or Telnet are defined in the Credentials section of blësk. We assume default port 22 for SSH and port 23 for Telnet connection is used, if this is not your case, you’ll have to enter the devices manually in NCM.
ALM requires an agent to be installed on the computer from which you want to collect information on assets. For mass deployment of the Windows agent to the remote computers, follow the instruction on this page.