Free Network Mapping and Discovery Tool - as-a-Service!

Action1 includes a free network discovery tool, which is managed from the cloud. Action1 performs real-time network mapping, detects all network devices and allows to quickly start managing newly discovered devices by deploying Action1 endpoint management agents on them.



 



According to cybersecurity analysts from Gartner, RSA and Verizon, unmanaged network devices brought by employees represent one of the biggest risks in most enterprises. All endpoint security hardening projects need to start with discovering what assets exist on the network, both managed and unmanaged. Having full asset visibility and real-time inventory of all devices and new network interfaces connected to your corporate network allows you to assess the risks, secure the right devices and block rogue devices from accessing your data and causing security breaches.




 

* Free Edition is provided free of charge with limited functionality and technical support.

If your organization cannot use Action1, what other methodologies can be used to discover and map your entire network? Here are the most common methods (some of them are used internally by Action1):

  • 1. ICMP (ping). Simply pinging (which uses ICMP protocol) a range of known IP addresses retrieves the endpoint that are active and responsive on your network. However, pinging the entire subnets can prove very expensive, because it requires a lot of traffic. A typical recommendation is to scan only s-called “IP range gaps” between known endpoint addresses. It usually works in a DHCP managed environment, with sequentially assigned IP addresses. Such as if you have 3 known endpoints: 192.168.1.34, 192.168.1.45 and 192.168.1.78, then the range would be 192.168.1.34 – 192.168.1.78. Running a “ping” command from the command line on each one of the IP addresses in a range will give you the results.



  • 2. ARP. ARP stands for Address Resolution Protocol and it’s a protocol used by network devices to map IP addresses to MAC addresses within a local network. All devices cache the mappings internally. Try running “arp -a” in the command line to see the contents of the cache.



  • 3. Active Connections (netstat). Analyzing what other endpoints are connected to each endpoint can help to discover all active endpoints on your network. Run “netstat” in the command line to see all active connection (similar data can be obtained using PowerShell or WMI)



  • 4. Third Party. You can also use some good 3rd party tools such as PRTG, nmap, Nagios, Icinga, NeDi, Spiceworks and others. Some of them are free, some are paid.




Hundrends of Organizations Worldwide Use Action1 Platform

Action1 gives us close-to-instant ability to undertstand what is happening across our entire network of endpoints and helps us respond in real-time.

Credit Union in Ohio

Being able to understand which new software is being installed and where is critical for our network of several thousand employee workstations

Major Regional Hospital on the East Coast

Our students love technology. But sometimes they break it too. Action1 allows us to understand all abnormal activities happening on college computers.

Community College in Texas