Axonius - Run Linux SSH Scan
- 16 Mar 2023
- 2 Minutes to read
-
Print
-
DarkLight
-
PDF
Axonius - Run Linux SSH Scan
- Updated on 16 Mar 2023
- 2 Minutes to read
-
Print
-
DarkLight
-
PDF
Axonius - Run Linux SSH Scan runs an SSH scan on each of the query results, which are endpoint Linux machines.
The scan retrieves important information about the device, including:
- Hostname
- Network Interfaces - including MAC addresses, IP addresses and subnets
- Operating system, kernel version and distribution
- A list of installed software
- Users and admin users
- Hard drives and file systems
- CPUs and RAM
- Hardware details, including serials
- and more...
Most of the Linux SSH scan information is also displayed under the various asset aggregated data tables.
For more details, see Device Profile page.
NOTE
The Linux SSH adapter is a 'read only' adapter. The adapter only gathers information about the endpoint Linux machine and does not change it.
It is safe to use the adapter to fetch information from production environments.
For details on the list of used commands and read files, see Connecting Linux SSH Adapter.
It is safe to use the adapter to fetch information from production environments.
For details on the list of used commands and read files, see Connecting Linux SSH Adapter.
See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.
General Settings
- Enforcement Set name (required) - The name of the Enforcement Set. A default value is added by Axonious. You can change the name according to your needs.
- Add description (optional) - Click to add a description of the Enforcement Set. It is recommended to describe what the Enforcement Set does.
- Run action on assets matching following query (required) - Select an asset category and a query. The Enforcement Action will be run on the assets that match the query parameters.
- A query only returns results for the asset type it was created for.
- Not all asset categories are supported for all Enforcement Actions.
- See Actions supported for Activity Logs and Adapter Fetch History Modules
- Action name - The name of the Main action. A default value is added by Axonious. You can change the name according to your needs.
- Configure Action Conditions - Toggle on to enter a condition statement. See Configuring Enforcement Action Conditions to learn more about condition statement syntax.
To configure the Run Linux SSH Scan action, do as follows:
- From the Action Library, click Deploy Files and Run Commands, and then click Run Linux SSH Scan.
- Define a unique action name.
- Specify the information required to run the Linux SSH Scan. The action configuration and logic are the same as the ones used when Connecting Linux SSH Adapter.
- If you are using multi-nodes, choose the Axonius node to use to interact with the adapter when executing the enforcement action.
- Tunnel Name - For Axonius-hosted (SaaS) deployments. Select the tunnel through which to connect to perform the action.
- Save the action.
For more details about other Enforcement Actions available, see Action Library.