Instant Scans/Customer Onboarding
Atera’s network discovery function will ease many of the headaches encountered while running an MSP business. Take a look at how network discovery will speed up your service and save you money.
The network discovery function of Atera creates a constantly updated inventory of all equipment attached to the network. Naturally, you will want to bill for all of the devices that your MSP has to manage. However, the network discovery tool is also a great way to spot unauthorized or out-of-scope devices attached to the client’s network.
Constant network scans spot any unauthorized devices connecting to the network, enabling system managers to lock out those devices quickly. What action that should be taken on discovery of these extra devices is a matter of policy, but it will probably trigger an immediate notification to the client because they are going to need to be informed that there will be extra line items on the bill at the end of the month. This notice should be attended to immediately by the contact manager at the client’s site. An exchange over the presence of this new device will involve the decision on whether the piece of equipment was expected to be connected to the network.
Although the Atera remote monitoring and management tool isn’t able to physically unplug rogue devices, it is able to highlight the presence of such equipment for the client to deal with themselves. Logs of activities and information about the duration of the connection will also be needed by the client in the4 event of a legal case.
Unmonitored devices present a risk to the system. They might have outdated operating systems, firmware or software and therefore bring unpatched exploits to the equipment base of the client’s site.
Getting all new equipment updated and logged in the Atera patch management system as quickly as possible is vitally important for system security. Rapid logging of newly attached devices through the automated network discovery tool gets that equipment subscribed in the patch management program immediately.
The network discovery tool creates a log of precisely what equipment is attached to the network at any one time. Thus, it is possible to see what changes occurred in the composition of the system should performance suddenly nosedive.
The ability to get a timestamped record of when devices were added to a network will also support the investigation efforts into a security breach. The system documentation provided by the network discovery system of Atera will become part of the project documentation when the hunt for any rogue device and its actions becomes a security issue.