

There is also a dedicated section with specific actions and support for MS-ISAC members and SLTT governments. We have provided available IOCs as well as detailed a tiered set of guidance that organizations can take based on their specific capabilities and cybersecurity maturity. Affected organizations should prepare for a complex and difficult remediation from this attack. The attackers randomized parts of their actions making traditional identification steps such as scanning for known indicators of compromise (IOC) of limited value. This cyber-attack is exceptionally complex and continues to evolve. As customers downloaded the Trojan Horse installation packages from SolarWinds, attackers were able to access the systems running the SolarWinds product(s). It was determined that the advanced persistent threat (APT) actors infiltrated the supply chain of SolarWinds, inserting a backdoor into the product.
Solarwinds network scanner software#
Without a network device discovery tool to help inform your ability to troubleshoot network performance, more accurately identify bottlenecks, and proactively detect points of potential failures, resolving issues can take longer and lead to costly downtime.On December 13, 2020, FireEye announced the discovery of a highly sophisticated cyber intrusion that leveraged a commercial software application made by SolarWinds. Relationships between these different assetsĪ network device discovery tool is able to collect this information by running IP scans, using ping sweep, and polling devices using SNMP monitoring to get an end-to-end view of your network environment.Ī device discovery tool is built to more quickly and accurately map and monitor your network compared to manually performing device discovery tasks.Software assets like applications, services, and operating systems.Physical network devices like routers, switches, servers, hosts, and firewalls.These tools are designed to simplify the device location process by leveraging different discovery protocols to identify and collect information about: What does a network device discovery tool do?Ī network discovery tool uses several processes to investigate and understand a given network topology.Network discovery can also help you map the ports on your network to ensure there aren’t unnecessary ports open for intruders to potentially exploit. Since device discovery can include locating and mapping allocated IP addresses, users can better manage devices to see which IP addresses are valid and which aren’t, since invalid IP addresses may be a sign of malicious or rogue devices. In addition, network device discovery can help inform your digital security. The more hybrid your network topology becomes, the more important it is to have comprehensive network device discovery in place to more easily identify root causes of network bottlenecks or slowdowns. Network device discovery is also important for monitoring environments including virtual networks, cloud servers, and both wired and wireless networks. Running device discovery is a critical step for accurately mapping a network. Without a deep understanding of what devices are accessing your network, their relationships, and how they’re communicating with one another, you may lack the visibility you need to conduct comprehensive analysis of all the factors potentially contributing to network performance problems. Network device discovery can help provide network transparency. Why is network device discovery important?.What makes ping helpful is it can report errors, packet loss, and statistical summaries in addition to helping admins with device discovery. It sends Internet Control Message Protocol (ICMP) queries to discover network devices. Ping – Ping is a network software utility admins use to test the reachability of a host on an Internet Protocol (IP) network.Once it’s stored there, it can be queried by admins using SNMP. These neighbors then store this data on management information databases (MIBs). Every LLDP-enabled network device transmits device information to its directly connected neighbor.


It’s the most frequently used network management protocol-almost all network devices are SNMP-enabled. Simple Network Management Protocol – Also known as SNMP, Simple Network Management Protocol is an Internet Standard protocol to help admins collect and sort data about managed devices on networks.There are three primary discovery protocols: Network device discovery works by using common discovery protocols to locate and monitor the devices on a network. How does network device discovery work?.
