Network security is a vital element of any system management platform and Atera’s RMM includes procedures to help you to keep a check on what devices have access to the network. The network discovery tool included with the Atera remote monitoring and management service enhances your MSP’s system security capabilities.


Spot unauthorized devices


The network discovery function of Atera creates a constantly updated inventory of all equipment attached to the network. Naturally, you will want to bill for all of the devices that your MSP has to manage. However, the network discovery tool is also a great way to spot unauthorized or out-of-scope devices attached to the client’s network.


Constant network scans spot any unauthorized devices connecting to the network, enabling system managers to lock out those devices quickly. What action that should be taken on discovery of these extra devices is a matter of policy, but it will probably trigger an immediate notification to the client because they are going to need to be informed that there will be extra line items on the bill at the end of the month. This notice should be attended to immediately by the contact manager at the client’s site. An exchange over the presence of this new device will involve the decision on whether the piece of equipment was expected to be connected to the network.


Although the Atera remote monitoring and management tool isn’t able to physically unplug rogue devices, it is able to highlight the presence of such equipment for the client to deal with themselves. Logs of activities and information about the duration of the connection will also be needed by the client in the4 event of a legal case.


Include new devices quickly


Unmonitored devices present a risk to the system. They might have outdated operating systems, firmware or software and therefore bring unpatched exploits to the equipment base of the client’s site.


Getting all new equipment updated and logged in the Atera patch management system as quickly as possible is vitally important for system security. Rapid logging of newly attached devices through the automated network discovery tool gets that equipment subscribed in the patch management program immediately.


Prevent system overloads


A block of unexpected devices getting added to the networked in an unplanned manner also creates oversight security risks. If the remote management team is not made aware that extra users and endpoints or new servers and applications are coming onto the network, then network capacity won’t have been tested and expanded appropriately.


Unplanned and unnotified additions to the system create uncertainty and will show a sudden surge in traffic. Without being aware of the extra equipment, the unsuspecting monitor and the on-call technician could well raise a security alert creating unnecessary panic and possibly forcing a shutdown of the system.


The network discovery tool creates a feedback channel that shows the support team the reason for increased activity. On checking this new device volume with the client contact, the remote support team will be able to include those extra devices into the monitoring system and not waste time hunting for the reason for increased traffic.


Support incident investigation


The network discovery tool creates a log of precisely what equipment is attached to the network at any one time. Thus, it is possible to see what changes occurred in the composition of the system should performance suddenly nosedive.


The ability to get a timestamped record of when devices were added to a network will also support the investigation efforts into a security breach. The system documentation provided by the network discovery system of Atera will become part of the project documentation when the hunt for any rogue device and its actions becomes a security issue.


Atera’s network discovery information


The information provided by Atera’s network discovery tool helps MSPs manage remote systems more efficiently and it highlights security problems. The automated, continuous updates to the inventory provided by the network discovery process mean that support resources can be drawn into an issue when needed rather than being allocated to a mundane observational role when nothing is happening.