{"id":588,"date":"2022-01-03T17:12:14","date_gmt":"2022-01-03T22:12:14","guid":{"rendered":"https:\/\/secognition.com\/?p=588"},"modified":"2022-01-03T17:12:14","modified_gmt":"2022-01-03T22:12:14","slug":"how-to-start-an-asset-inventory","status":"publish","type":"post","link":"https:\/\/secognition.com\/?p=588","title":{"rendered":"How to Start an Asset Inventory"},"content":{"rendered":"<p>At the top of most lists to better secure your network is to have an up to date inventory of physical and virtual assets connected to your network.\u00a0 Most security controls frameworks have as their most fundamental controls to implement.\u00a0 For corporations with mature procurement processes this is easier, but what about a home user or small or medium business?\u00a0 It&#8217;s one thing to have a list but how often is it updated?\u00a0 How can this be automated?\u00a0 Can I get alerts if a new device is detected?<\/p>\n<p>Below I&#8217;ll try to help out with some pointers and outline my journey to an asset inventory.<\/p>\n<p>At it&#8217;s most basic level you can get away with a Microsoft Excel spreadsheet that outlines the following high level criteria:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-590\" src=\"https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/hwinv.png\" alt=\"\" width=\"1120\" height=\"179\" srcset=\"https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/hwinv.png 1120w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/hwinv-300x48.png 300w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/hwinv-1024x164.png 1024w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/hwinv-768x123.png 768w\" sizes=\"auto, (max-width: 1120px) 100vw, 1120px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The Center for Internet Security has a free template that can be used at the following <a href=\"https:\/\/www.cisecurity.org\/white-papers\/cis-hardware-and-software-asset-tracking-spreadsheet\/\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/p>\n<p>Naturally, filling our a spreadsheet and keeping it up to date can be daunting.\u00a0 You fill it out once and give yourself a pat on the back for doing it, but&#8230;. do you really want to get into the habit of updating it every time something new pops up.\u00a0 Imagine 10s or 100s of new things, not to mention things that get lost.\u00a0 This manual approach does not scale well.<\/p>\n<h3>What else can be done?<\/h3>\n<p>Glad you asked.\u00a0 There are a multitude of tools, free and not so free that keep trying to do something about this.\u00a0 In my own small network, I&#8217;ve used the following.<\/p>\n<p>I&#8217;ve had great success with <a href=\"https:\/\/www.rumble.run\">https:\/\/rumble.run<\/a>.\u00a0 There&#8217;s a free tier called the Rumble Starter Edition where you can scan up to 1024 IPs but will track 256 live assets at this tier.\u00a0 More than enough for a small network.\u00a0 One of the big pluses is that I don&#8217;t need to install a client software on each individual machine.\u00a0 The fingerprinting function on the rumble client is really good and constant updates have brought many more device types into the fold.<\/p>\n<p>Steps to get going:<\/p>\n<ul>\n<li>Setup an account on rumble.<\/li>\n<li>Download and install the rumble client on a VM or host that has visibility on your network.<\/li>\n<li>Check the rumble portal to ensure the client is communicating with the mothership<\/li>\n<li>Setup a schedule of scans.\u00a0 Identify the IPs you want to scan and enter these on the Tasks menu.\u00a0 I do mine daily, but other options are available.<\/li>\n<\/ul>\n<p>Once the client has scanned once you should see reports filling in similar to:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-595\" src=\"https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbledash-1.png\" alt=\"\" width=\"1197\" height=\"504\" srcset=\"https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbledash-1.png 1197w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbledash-1-300x126.png 300w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbledash-1-1024x431.png 1024w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbledash-1-768x323.png 768w\" sizes=\"auto, (max-width: 1197px) 100vw, 1197px\" \/><\/p>\n<p>You can then drill down into different asset classes or show all discovered assets through the inventory menu.\u00a0 Many options are available to slice and dice this data into a format you would need to keep track of your hardware assets through the Export button you can extract a report of assets in JSON, XML and CSV formats or through an API call.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-596\" src=\"https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbleasset.png\" alt=\"\" width=\"1760\" height=\"331\" srcset=\"https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbleasset.png 1760w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbleasset-300x56.png 300w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbleasset-1024x193.png 1024w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbleasset-768x144.png 768w, https:\/\/secognition.com\/wp-content\/uploads\/2021\/09\/rumbleasset-1536x289.png 1536w\" sizes=\"auto, (max-width: 1760px) 100vw, 1760px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>I use this mostly to keep an eye on what&#8217;s on the network.\u00a0 I run it once a day across the different VLANs on my network.\u00a0 Coupled with a vulnerability scanner this goes a long way to making sure you&#8217;re kept aware of what&#8217;s responding on your network and if any patching needs to be done.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the top of most lists to better secure your network is to have an up to date inventory of physical and virtual assets connected to your network.\u00a0 Most security controls frameworks have as their most fundamental controls to implement.\u00a0 For corporations with mature procurement processes this is easier, but what about a home user&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/secognition.com\/?p=588\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,5],"tags":[],"class_list":["post-588","post","type-post","status-publish","format-standard","hentry","category-asset-inventory","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/secognition.com\/index.php?rest_route=\/wp\/v2\/posts\/588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secognition.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secognition.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secognition.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secognition.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=588"}],"version-history":[{"count":0,"href":"https:\/\/secognition.com\/index.php?rest_route=\/wp\/v2\/posts\/588\/revisions"}],"wp:attachment":[{"href":"https:\/\/secognition.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secognition.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secognition.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}