DocumentationRelease Notes
Log In
Documentation

DISCOVERY AGENT USER GUIDE

Install the BeyondTrust Discovery Agent on standalone Windows system

The BeyondTrust Discovery Agent is a service that is packaged with BeyondInsight. By default, it runs on the appliance where BeyondInsight is installed, or in the case of a cloud instance, it runs where your resource brokers are deployed.

For on-premises deployments, the discovery agent can also be installed separately on a standalone Windows system and configured to communicate with BeyondInsight on your U-Series Appliance. This increases scanning capacity and is helpful in environments that have a large number of hosts.

You can download the discovery agent from the BeyondTrust Customer Portal.

Prerequisites

Before installing the BeyondTrust Discovery Agent, ensure the following prerequisites are met on systems where the agent is being installed:

  • The .exe version of the agent installer is used so that it can install required prerequisites, such as the .NET 6 Hosting package.
  • If you are using certificates as your authentication method, the eEyeEmsClient.pfx certificate is located in c:\temp.

Steps to Download, Install, and Configure the BeyondTrust

Download, install, and configure the BeyondTrust Discovery Agent

There are three authentication methods available when setting up a Discovery Agent:

  • Certificate: Export a certificate from your U-Series Appliance.
  • OAuth: Use an installer activation key and create the command to install the Discovery Agent to your assets.
  • Password: Enter a password during configuration (Central Policy only).

Export a certificate

  1. Log in to your appliance.
  2. Export a certificate:
    • From the left sidebar, click Security and Compliance.
    • Click the Certificate Management card.
    • Under Export Certificate, enter and confirm the password for the certificate.
    • Click Export and Download Certificate.
    • Export a copy of the eEyeEmsClient.pfx certificate to a temporary folder on the root of C (c:\temp).

Download and run the Discovery Agent installer

  1. Log in to the BeyondTrust Customer Portal.
  2. Download the .exe installer file for the BeyondTrust Discovery Agent.
  3. Run the installer, selecting the default install location. Once the install is complete, the agent is located in C:\Program Files\BeyondTrust\Discovery.

Configure the agent

  1. Open an administrator command prompt.
  2. Navigate to C:\Program Files\BeyondTrust\Discovery.
  3. Type btdiscovery to get a list of commands.
  4. Set the central policy:
    • Type btdiscovery.cmd SetCentralPolicy.
    • Type Y to enable and select default options.
    • Enter your IP/Hostname.
    • Set authentication:
      • OAuth: Enter the Activation ID and Activation key generated from the Installer Activation Keys configuration. We recommend using OAuth.
      • Certificate: Enter the path to the certificate along with its password.
      • Password: Enter a password.
    • Confirm your settings.
  5. Set event settings:
    • Type btdiscovery.cmd SetEventSettings.
    • Type Y to enable.
    • Enter your IP/Hostname and select default options.
    • Set authentication:
      • OAuth: Enter the Activation ID and Activation key generated from the Installer Activation Keys configuration. We recommend using OAuth.
      • Certificate: Enter the path to the certificate along with its password.
    • Confirm your settings.
  6. Check communication:
    • Type btdiscovery.cmd TestCentralPolicy.
    • Type btdiscovery.cmd TestEventSettings.
  7. Log in to your BeyondInsight instance and confirm the newly created scanner is available:
    • Navigate to the Discovery Scanners page.
    • Confirm the newly created scanner is listed in the grid.

ℹ️

Note

It may take up to 5 minutes for the scanner to display in the grid.

Discovery scan on a Linux system

The below tables outline the data returned when running a discovery scan on a Linux system.

Linux target data collected

General Target Data
DateThis is the date the scan was run on.
Remote AddressThis is the remote address of the target being scanned.
Target Machine Information
OS Detected This is the Operating System running on the target system.
Target Connection This is the connection method used to communicate with the target system.
Domain Name This is the discovered domain name for the target system.
Open TCP Port Count This is the number of discovery ports which were open on the target system.
Closed TCP Port Count This is the number of discovery ports which were closed on the target system.
Remote Date This is the date which was set on the target system, at the time of the scan.
Remote Time This is the time which was set on the target system, at the time of the scan.
SSH Credential The following data is returned for each credential the scanner uses while trying to connect to the target system.
User Name This is the username specified in a credential.
Authentication Success/Failure This indicates whether or not the credential was able to connect.
Credential Type This specifies what type of credential this is.
Login Shell This reports back the login shell for the user specified in the credential.
Privilege This reports back the privilege level for the user specified in the credential.
Host Name This is the discovered host name for the target.
Asset - The asset record contains additional information about the scanned target.
Asset Description
Asset NameThis is the determined asset name.
FQDNThis is the Fully Qualified Domain Name returned by the DSN query. It may contain the IP address, if the domain query fails.
Asset TypeThis specifies if the target is a server, a domain controller, or a workstation.
Workgroup/Domain NameThis specifies either the workgroup or the domain the target belongs to.
OS HostnameThis specifies the target’s name, based on OS queries.
DNS NameThis specifies the target’s name, based on the DNS query.
Remote Target NameThis specifies the target’s name, using alternate OS dependent queries.
NetBIOS NameThis specifies the target’s name as specified in the NetBIOS.
BI Provided NameThis specifies the target’s name as specified in the original scan job.
Open Ports - The scanner reports back the below information for each open discovery or scan port. A scan port is a port number retrieved from a scan credential.
Port NumberThis is the port number.
Port BannerThis is the banner returned when a successful connection is made via TCP.
Port StateThis reflects the open state of the port.
ConnectedThis indicates that the scanner was able to establish a TCP connection on the port.
Detected ProtocolThis indicates what protocol was detected on the port.
Excluded From Protocol DetectionThis indicates whether or not the port is excluded from active protocol detection.
Users - The below data is potentially returned for each user on the target system.
User NameThis is the username being reported.
Base User NameThis is the username stripped of ornamentation.
Last Password Change DateThis is the data the password was last changed on.
Minimum Days for Password ChangeThis is the minimum days allowed between password changes.
Maximum Days for Password ChangeThis is the maximum days allowed between password changes.
Account Expiration DateThis is the date the account expires on.This indicates if the account is a local user or a remote (domain) user.
User Type CodeThis indicates if the account is a Windows or SSH user.
Home DirectoryThis reports back the home directory of the user.
PrivilegeThis reports back the privilege level of the users.
Account DisabledThis indicates whether the account has been disabled.
Member of Groups ListThis contains a list of groups the user is a member of.
OS TypeThis contains the OS type the user was found on.
User IDThis returns the numeric UID of the user.
Group IDThis reports the numeric GID of the user.
Login ShellThis reports the shell run when the user logs in.
Password Warning DaysThis reports the number of days a password change warning is issued before locking the account.
Inactive DaysThis reports the number of days the user account has been inactive.
SSH With KeyThis reports whether or not the user may use SSH with a key to authenticate.
Last LoginThis reports the last time the user logged in.
SIDThis reports the user’s SID.
SUDO PermissionsThis reports the SUDO permissions the user has been granted.
SSH Authorization Keys
(See below table)
 
SSH Keys
(See below table)
 
Is Local UserThis reports if a user is a local user or a remote (domain) user.
SSH Authorization Key
Key PathLocation where the key was found.
Key TypeThe type of key.
Key AlgorithmThe encryption algorithm used by the key.
Key ValueThe encrypted key value.
Key BitsThe number of bits the key is.
Key ExponentThe exponent portion of the key.
Key ModulusThe modulus component of the key.
Key CommentThe comment associated with the key.
SSH Keys
BitsThe number of bits the key is.
FingerprintA hash representation of the key.
CommentThe comment associated with the key.
UserThe user the key is associated with.
AlgorithmThe algorithm used to generate the key.
Groups - The below information is returned for each group discovered on the target. Not all items are available on all OS variants.
Group NameThis is the name of the group.
CommentThis is a comment or description for the group.
Group IDThis is the numeric ID of the group.
MembersThis is a list of members belonging to the group.
SIDThis is the SID of the group.
PrivilegesThis is a list of privileges granted to the group.
OS TypeThe type of OS the group was found on.
Services - The below information is returned for each service configured on the target. Not all items are available on all OS variants.
PIDThe process ID of the service task.
Control PIDThe process ID of the service control task.
ResultThe result of the last time the service ran.
Main StartA Linux assigned value returned when querying Systemctl for a service status.
Main PIDThe process ID of the service task.
Execution StartThe last time the service ran OR the initial service start time.
Execution ReloadA Linux assigned value returned when querying Systemctl for a service status.
MemoryThe amount of memory associated with the service task.
IDA Linux assigned value returned when querying Systemctl for a service status.
DescriptionA description of the service.
Load StateThe current state of the service code.
StateThe current state of the service execution status.
Sub StateA Linux assigned value returned when querying Systemctl for a service status.
Fragment PathA Linux assigned value returned when querying Systemctl for a service status.
TimestampA Linux assigned value returned when querying Systemctl for a service status.
Refuse Manual StartA Linux assigned value returned when querying Systemctl for a service status.
Refuse Manual StopA Linux assigned value returned when querying Systemctl for a service status.
Log On AsThe user the service impersonates as while running.
Software - The below information is returned for each software component installed on the target system. Only those packages using the preferred package management system are reported.
NameThe name of the software package.
VersionThe version of the software package.
VendorThe company owning or distributing the software package.
DescriptionA description of the software package.
Installation PathThe location of the software package in the file system.
Scheduled Tasks - The below information is reported for each scheduled task discovered on the target system. Not all items are available on all OS variants.
Task NameThe name of the scheduled task. This may be generated by the scanner.
StatusThe current status of the scheduled task.
Run As UserThe user which will be impersonated by the task execution.
Task To RunThe actual command to be run.
Last ResultThe result from the last time the task was run.
Last Run TimeThe time stamp for the last time the task was run.
Next Run TimeThe next scheduled run time for the task.
Schedule TypeThe type of schedule for the task.
CommentA comment about the scheduled task.
Timer FileThe location of the timer file containing the schedule information for systemctl scheduled tasks.
Service FileThe location of the service file containing the task command information for systemctl scheduled tasks.
Cron Time SpecificationThe time specification for Cron Table scheduled tasks.
AT Time SpecificationThe time specification for AT command scheduled tasks.

©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.