Ivanti Endpoint Security connector

The Ivanti Endpoint Security (IES) connector gathers data about devices and patches from Endpoint Security.

An Endpoint Security connector has the following options:

  • Connector name. A name for the connector.
  • Connector server name. The name of the connector server that this connector is associated with. Each connector can only be associated with one connector server. If you added the connector to a specific connector server, this field may be populated for you. Otherwise, you can select the connector server from the list.
  • SQL server name. The fully-qualified domain name of the server where the Endpoint Security database is.
  • SQL database. The name of the SQL Server database.
  • Authentication. The type of authentication to use to access the database.
  • Username and Password. Credentials to access the database. The account must have read and write permissions.
  • Device threshold. To limit the amount of data that is gathered for Neurons, set a threshold for a specific number of days. The connector will not include records unless the device has checked in or otherwise changed during that time.
  • Repeats. How often the connector should gather data.
  • Start time. The time of day the connector should start running. To minimize the impact on your network and applications, we recommend that connectors generally run at night or on weekends.
  • Active. Whether the connector is active or not. While the connector is active, it runs according to the schedule you create. If you clear the check box, the connector is inactive and will not gather data until the check box is enabled again and the connector is saved.

For details on configuring or using connectors, see Setting up connectors.