Ivanti Endpoint Security connector
The Ivanti Endpoint Security (IES) connector gathers data about devices and patches from Endpoint Security.
For information about what data is imported and how it is mapped, see Mapping (below).
An Endpoint Security connector has the following options:
- Connector name: A name for the connector.
- Connector server name: The name of the connector server that this connector is associated with. Each connector can only be associated with one connector server. If you added the connector to a specific connector server, this field may be populated for you. Otherwise, you can select the connector server from the list.
- SQL server name: The fully-qualified domain name of the server where the Endpoint Security database is.
- SQL database: The name of the SQL Server database.
- Authentication: The type of authentication to use to access the database.
- Username and Password: Credentials to access the database. The account must have read and write permissions.
- Repeats: How often the connector should gather data.
- Start time: The time of day the connector should start running. To minimize the impact on your network and applications, we recommend that connectors generally run at night or on weekends.
- Active: Whether the connector is active or not. While the connector is active, it runs according to the schedule you create. If you clear the check box, the connector is inactive and will not gather data until the check box is enabled again and the connector is saved.
For details on configuring or using connectors, see Setting up connectors.
The data that this connector imports is mapped to target attributes in the Neurons Platform database.
- Device status
- Serial number
- IP Address and subnet mask
- OS name, version, build, and service pack
- Processor architecture, vendor, type, core count, and speed
- Total RAM
- Memory slots
- CD\DVD drives
- Available and total storage
- BIOS asset tag, serial number, and firmware version
- Login name
- Patch information, including architecture, status, vulnerability name and ID, vulnerability description, vulnerability code and code type, CVE list, DNS name, vendor name, results and result scan date, patchable status, impact, and release date
- Last scan date
For an overview of how the data imported by this connector is mapped to the Neurons target attributes, please download the CSV file using the button below.
For an overview of the Neurons target attributes per data type and the connector source attributes that are mapped to them, see Connector data mapping.