CloudSphere
Overview & Readiness
Cyber Asset Discovery
Knowledge Base
Categories
-
Overview
- The Cyber Asset Management Platform
- Why CloudSphere?
- Platform Architecture
- Virtual Appliances
- How Scanning Works
-
Pre-Deployment Planning
- Step 1 - Identify Network Segments for Discovery
- Step 2 - Plan your Virtual Appliance Deployment Strategy
- Step 3 - Get Ready for Appliance Deployment
- Step 4: Collect the Credentials - WIP
- Step 5: Endpoint Considerations (Windows & Linux Requirements)
- Step 6: Get access to the CloudSphere CAM Web UI
-
Deploy and Configure Virtual Appliance(s)
- Virtual Appliance Installation
- Configure the Virtual Appliance
- Register the Appliance
- Configuring Proxy
- Updating Appliance
-
System Requirements & Pre-requisites
- Virtual Appliance Hardware Requirements
- Network Pre-requisites
- Windows Pre-requisites
- Unix/Linux Pre-requisites
- MS SQL Pre-requisites
- Service Account Privileges to access on Windows endpoint
-
Release Notes
See All Articles
-
Virtual Appliance Installation
- Appliance Installation - VMware
- Appliance Installation - AWS
- Appliance Installation - Azure (VHD Image)
- Appliance Installation - Azure (Marketplace)
- Appliance Installation - GCP
- Appliance Installation - Hyper-V
-
Scanning & Discovery
See All Articles -
How To
- Appliance - Updating Scan Engine
- Appliance - Manual Update Process
- Validate CloudSphere Credential has the right permissions to access WMI.
- Convert Open SSH Key to RSA Format
-
Commands Executed
- Bash (Sudo Elevated Privilege)
- Bash
- Windows Command Line
- Accessed WMI Tables
- Accessed Registry Entries
- Windows VB Scripts