0 / 5 complete
Module 04 ยท Discovery

Network Device
Discovery & Vaulting

Learn how to configure Secret Server's automated discovery engine to scan networks for routers, switches, firewalls, and other infrastructure devices โ€” then vault their credentials securely.

5 Sections ~25 min Intermediate SS 10.x / 11.x
01

What is Network Device Discovery?

Understand the architecture and flow before you configure anything.

Secret Server's Discovery engine automates the detection and onboarding of accounts on network infrastructure โ€” routers, switches, load balancers, wireless controllers, and firewalls. Instead of manually entering every device credential, Discovery scans IP ranges via SSH or Telnet, fingerprints each device, and surfaces detected accounts so they can be imported directly into the vault.

Discovery Architecture Flow
Secret Server
(Web + DB)
โŸท
Distributed Engine
(optional)
โ†’
Network
IP Range
โ†“
Cisco IOS
Juniper
Palo Alto
F5 / BIG-IP
+ more
โ†‘ Discovered accounts surfaced in Discovery โ†’ Import & Vault
โ„น๏ธ Secret Server uses Extensible Discovery โ€” built-in scanners handle common vendors, and PowerShell-based custom scanners handle bespoke or niche devices.
A
Supported Device Types
Reference โ€บ
Vendor / PlatformProtocolBuilt-in Scanner
Cisco IOS / IOS-XE / NX-OSSSH / Telnetโœ… Yes
Cisco ASA FirewallSSHโœ… Yes
Juniper JunOSSSHโœ… Yes
Palo Alto PAN-OSSSHโœ… Yes
F5 BIG-IPSSHโœ… Yes
HP / Aruba ProCurveSSH / Telnetโœ… Yes
Fortinet FortiGateSSHโœ… Yes
Custom / OtherSSH / Telnet๐Ÿ”ง Custom Scanner
B
Discovery vs. Manual Import
Context โ€บ

Discovery is best used when you have many devices across multiple subnets and want continuous detection of new accounts. Manual import via CSV is better for a one-time migration of a small, well-defined inventory.

๐Ÿ’ก Enable Discovery in a test/staging environment first. On large flat networks, a broad IP range scan can generate significant SSH connection attempts โ€” alert your security team.
02

Prerequisites & Prep Work

Complete these before attempting to configure Discovery.

โš ๏ธ Discovery requires the Discovery module license. Confirm with Admin โ†’ Licenses that the Discovery feature is active on your instance.
1
Create a Secret Template for Network Devices
Required โ€บ

Each discovered account needs to map to a Secret Template. Secret Server ships with templates for Cisco, Juniper, and generic SSH. Verify or create one:

Adminโ€บ Secret Templatesโ€บ Search "Cisco" or "Network"

If a suitable template doesn't exist, duplicate the Unix Account (SSH) template and rename it. Key fields to ensure are present:

Field NamePurpose
Machine reqHostname or IP of the device
Username reqLocal user account name
Password reqAccount password (encrypted)
Enable PasswordCisco enable/privileged-exec secret
NotesOptional metadata (device role, site, etc.)
2
Prepare a Discovery Service Account
Required โ€บ

Discovery needs an existing credential to authenticate to devices during scanning to enumerate local accounts. This is a read-only SSH user created on representative devices (or via TACACS+/RADIUS).

โ„น๏ธ Store this scan credential as a Secret in Secret Server before continuing. It will be referenced in the Discovery Source configuration.

Minimum privileges required for the scan account:

# Cisco IOS โ€” read-only privilege level privilege exec level 1 show running-config privilege exec level 1 show users privilege exec level 1 show version # Juniper JunOS โ€” read-only class set system login class read-only permissions view
3
Network Connectivity & Firewall Rules
Required โ€บ

The Secret Server node (or Distributed Engine) performing discovery must have TCP connectivity to target devices on the following ports:

PortProtocolPurpose
22TCP (SSH)Primary device authentication & account enumeration
23TCP (Telnet)Legacy devices only โ€” avoid where possible
443TCP (HTTPS)F5, Palo Alto REST API scanners
๐Ÿšจ Telnet transmits credentials in plaintext. Only enable Telnet scanning if the device does not support SSH and you are on an isolated management VLAN.
4
Pre-flight Checklist
Checklist โ€บ

Click each item to mark it complete before moving on:

  • โœ“Discovery license is active (Admin โ†’ Licenses)
  • โœ“Network device Secret Template exists or has been created
  • โœ“Scan service account credential is stored as a Secret
  • โœ“TCP/22 is open from SS engine to target IP range
  • โœ“Security/network team is aware of the planned scan window
  • โœ“Target IP range and subnet mask is documented
03

Configuring Discovery

Step-by-step setup of the Discovery Source, scanners, and rules.

1
Navigate to Discovery Configuration
Step โ€บ

Log in to Secret Server as an Administrator and navigate to the Discovery configuration area:

Adminโ€บ Discoveryโ€บ Configuration

Ensure the Enable Discovery toggle is turned ON. Save the page if you need to toggle it.

๐Ÿ’ก If you don't see the Discovery menu, your account may lack the Administer Discovery role permission. Contact your SS administrator.
2
Create a New Discovery Source
Step โ€บ

A Discovery Source defines the IP range to scan and the scanner type. For network devices, select the appropriate source type:

Adminโ€บ Discoveryโ€บ Discovery Sourcesโ€บ + Create Discovery Source

On the creation form, configure these fields:

FieldValue / Notes
Name reqDescriptive name, e.g. "Core Network โ€” Datacenter 1"
Discovery Source Type reqSelect Network (IP Range)
EnabledToggle ON
Discovery SiteChoose the Distributed Engine site closest to the target network, or "Local" for the main SS server
3
Define the IP Scan Range
Step โ€บ

Under the IP Address Ranges tab of your new Discovery Source, add one or more IP ranges:

Discovery Sourceโ€บ IP Address Rangesโ€บ Add Range
FieldExampleNotes
Friendly NameCore SwitchesLabel for this subnet block
Start IP req10.10.1.1First IP in scan range
End IP req10.10.1.254Last IP in scan range
โš ๏ธ Avoid scanning the entire /8 or /16 of a large flat network. Use targeted /24 or management-VLAN ranges to reduce noise and scan time.
4
Add a Machine (Host) Scanner
Step โ€บ

The Machine Scanner is the first phase โ€” it probes each IP to determine if a device is present and identifies its type. Navigate to the Scanners tab:

Discovery Sourceโ€บ Scannersโ€บ Add Scannerโ€บ Scanner Type: Host Range

Select the relevant built-in scanner for your environment:

Scanner NameUse For
Network Device โ€” CiscoCisco IOS, IOS-XE, NX-OS, ASA
Network Device โ€” JuniperJuniper JunOS routers & switches
Network Device โ€” Palo AltoPAN-OS firewalls
Network Device โ€” F5F5 BIG-IP load balancers
Network Device โ€” Generic SSHAny SSH-capable device not listed above
โ„น๏ธ You can add multiple scanners to a single Discovery Source if the IP range contains mixed vendors. Each scanner runs independently and results are merged.
5
Add an Account Scanner & Assign Credentials
Step โ€บ

After machines are found, an Account Scanner authenticates to each device and enumerates local user accounts:

Discovery Sourceโ€บ Scannersโ€บ Add Scannerโ€บ Scanner Type: Account
FieldValue
ScannerMatch the vendor scanner used in the Host Range step
Credential Secret reqSelect the scan service account Secret created in Prerequisites
Default Secret TemplateSelect the network device template from Prerequisites Step 1
Default FolderTarget folder in SS where new Secrets will land after import
๐Ÿ’ก Set the Default Folder to a staging folder (e.g. "Discovery Inbox โ€” Network") so newly imported secrets can be reviewed before being moved to production folders.
6
Configure Discovery Rules (Auto-Import)
Optional โ€บ

Discovery Rules allow Secret Server to automatically create Secrets from discovered accounts without manual review. Use cautiously in production.

Adminโ€บ Discoveryโ€บ Discovery Rulesโ€บ + Add Rule
FieldRecommended Value
Rule Namee.g. "Auto-Import Cisco Accounts"
ScannerSelect matching account scanner
Import Enabledโœ… Toggle ON to activate auto-import
Secret TemplateNetwork device template
FolderTarget vault folder for auto-created secrets
SiteMatch the Distributed Engine site
โš ๏ธ Auto-import will create Secrets with discovered passwords โ€” these are the current live credentials on the device. Ensure the target folder has appropriate access controls before enabling.
04

Running Discovery & Reviewing Results

Execute scans, interpret outputs, and import accounts into the vault.

1
Run Discovery Manually (First Run)
Step โ€บ

For the initial scan, trigger Discovery manually so you can monitor the results in real time:

Adminโ€บ Discoveryโ€บ Discovery Sourcesโ€บ [Your Source]โ€บ Run Now

The scan runs asynchronously. Track progress under the Discovery Network Scan Log tab โ€” each IP probed is logged with a status (Reachable / Unreachable / Auth Failure / Found Accounts).

โ„น๏ธ Scan duration depends on IP range size and network latency. A /24 typically completes in 2โ€“5 minutes; larger ranges may take 15โ€“30+ minutes.
2
Reviewing Computer & Account Results
Step โ€บ

After a scan completes, review found devices and accounts in two separate views:

Adminโ€บ Discoveryโ€บ Discovery Resultsโ€บ Computers tab

The Computers tab lists every IP that responded. The Accounts tab lists accounts found on each device, colour-coded by import status:

StatusMeaning
๐ŸŸก Not ManagedAccount found, no Secret exists yet โ€” action required
๐ŸŸข ManagedA Secret exists and is actively managed by SS
โšช IgnoredAccount has been manually excluded from management
๐Ÿ”ด MissingPreviously found account no longer detected โ€” investigate
3
Manually Import Accounts into the Vault
Step โ€บ

For Not Managed accounts you want to vault without auto-import rules:

  1. Check the box next to each account you want to import
  2. Click Import in the toolbar
  3. Choose or confirm the Secret Template and destination Folder
  4. Enter or confirm the current password for the account
  5. Click Import Selected
๐Ÿ’ก After importing, consider enabling Remote Password Changing (RPC) on the Secret so Secret Server can rotate the device password on your schedule.
4
Schedule Recurring Discovery
Best Practice โ€บ

Once the first run looks clean, schedule Discovery to run automatically to catch new devices and accounts:

Adminโ€บ Discoveryโ€บ Configurationโ€บ Discovery Interval
SettingRecommended
Discovery IntervalDaily (or every 4โ€“8 hours for dynamic networks)
Scan TimeOff-peak hours (e.g. 02:00 AM)
Email NotificationEnable for newly found unmanaged accounts
5
Troubleshooting Common Issues
Reference โ€บ
SymptomLikely CauseFix
No computers foundFirewall blocking TCP/22Verify ACL/NSG rules; test with SSH client from engine host
Auth failure on all devicesWrong scan credential SecretTest credential manually; check username format (user@domain vs domain\user)
Some devices show "Unreachable"ICMP blocked or device offlineSS uses TCP ping โ€” ensure TCP/22 is open even if ICMP is blocked
Accounts found but 0 importedNo matching Discovery Rule / no import action takenEither add a Discovery Rule or manually import from Results
Discovery log shows "Engine Offline"Distributed Engine service not runningRestart the Distributed Engine service on the engine server
05

Knowledge Check

Test your understanding before signing off on this module.

1. Which Secret Server permission is required to configure Discovery Sources?
AView Secrets
BAdminister Discovery
COwn Secret
DAdminister Remote Password Changing
2. What is the primary purpose of the Machine (Host) Scanner in a Discovery Source?
ATo rotate passwords on discovered accounts
BTo import accounts directly into Secret folders
CTo probe IPs, detect device presence, and identify device type
DTo authenticate to devices and enumerate local user accounts
3. A discovered account showing status "Not Managed" means:
AThe account has been deliberately excluded from Secret Server
BThe account was found but no corresponding Secret exists yet
CThe account was previously vaulted but has since been deleted
DThe account password has expired and needs rotation
4. Which of the following is the BEST practice when scanning a large flat corporate network (/16)?
AScan the entire /16 range in a single Discovery Source for comprehensive coverage
BEnable Telnet scanning as a fallback for all devices in the range
CTarget specific /24 management VLANs and notify the security team before running
DUse the same scan credential for all vendors to simplify configuration
5. Where should newly discovered Network Device secrets be placed initially to allow review before production use?
AThe root Secret Server folder so all users can access them
BThe same folder as existing Windows server secrets for consistency
CA dedicated staging/inbox folder with restricted access for review
DNo folder is needed โ€” discovery results are stored in the Discovery log only