Agentless Discovery
Discover cloud and on-premises infrastructure without deploying agents.
Overviewβ
Agentless Discovery provides comprehensive visibility into your infrastructure using native cloud APIs and standard protocols. No agents to install, manage, or updateβjust configure credentials and start discovering.
Supported Providersβ
Amazon Web Services (AWS)β
Discover EC2 instances, VPCs, security groups, IAM, S3, RDS, Lambda, and more using IAM role assumption.
Setup:
- Create an IAM role with read-only permissions
- Configure a trust policy allowing Infracast to assume the role
- Add an External ID for security
- Enter the Role ARN in Infracast
Multi-Region: Automatically scans all enabled regions concurrently.
Microsoft Azureβ
Discover virtual machines, virtual networks, NSGs, storage accounts, Entra ID, and more using service principal authentication.
Setup:
- Create a Service Principal in Entra ID
- Grant Reader role on target subscriptions
- Enter Tenant ID, Client ID, and Client Secret in Infracast
Google Cloud Platform (GCP)β
Discover Compute instances, VPC networks, firewall rules, IAM, Cloud Storage, and more.
Setup:
- Create a Service Account with Viewer role
- Configure Workload Identity Federation (recommended) or export a key file
- Enter Project ID and credentials in Infracast
Microsoft 365β
Discover Entra ID users, groups, apps, Conditional Access policies, Exchange mailboxes, SharePoint sites, and Teams.
Setup:
- Create an App Registration in Entra ID
- Add required Microsoft Graph API permissions
- Grant admin consent
- Enter Tenant ID, Client ID, and Client Secret in Infracast
Compliance: Includes 23 CIS Microsoft 365 Benchmark rules for automated security assessment.
On-Premisesβ
Discover Linux/Unix hosts via SSH and Windows hosts via WinRM.
Resources discovered:
- Operating system and version
- Installed packages
- Running services
- Open ports
- Network interfaces
- Storage configuration
Authentication options:
- SSH: Password, key-based, or key with passphrase
- WinRM: Basic, domain, or certificate-based
Target specification:
- Single IP address
- Comma-separated IP list
- CIDR range (up to /24)
Using Agentless Discoveryβ
Start a Scanβ
- Navigate to Operations β Agentless Discovery
- Select your provider (AWS, Azure, GCP, M365, On-Prem)
- Follow the setup wizard to configure credentials
- Click Test Connection to validate
- Click Start Scan
View Resultsβ
- Discovered resources appear in the Asset Graph
- Relationships are automatically mapped
- Compliance rules run against discovered resources
Schedule Scansβ
Configure recurring scans to maintain up-to-date visibility:
- Daily, weekly, or custom schedules
- Automatic drift detection
- Alert on new resources or changes
Security Modelβ
Agentless Discovery is designed with security in mind:
- Read-only access β All providers use read-only permissions
- No stored credentials β Credentials are used once to obtain session tokens
- External ID (AWS) β Prevents confused deputy attacks
- Connection testing β Validate credentials before running full scans
Agent vs Agentlessβ
| Aspect | Agentless | Agent-Based |
|---|---|---|
| Setup time | Minutes | Hours |
| Depth | API-visible resources | Deep (processes, files, connections) |
| Coverage | All API-discoverable | Hosts with agents installed |
| Runtime data | Point-in-time snapshot | Real-time monitoring |
| Maintenance | None | Agent updates required |
Recommendation: Start with Agentless for quick visibility. Add agents to critical systems for deeper runtime insights.
On-Prem Relayβ
For on-premises infrastructure that isn't directly accessible from Vulcan SaaS, deploy a Relay Connector:
- No VPN required β Relay connects outbound to Vulcan
- No inbound firewall rules β Only port 443 outbound
- Credentials stay secure β Stored in Vulcan, sent per-task over TLS
docker run -d --name vulcan-relay \
-e RELAY_TOKEN="your-token" \
-e RELAY_ID="your-relay-id" \
ghcr.io/azgardtek/vulcan-relay:latest
See On-Prem Relay Connector for complete setup instructions.
Troubleshootingβ
AWS: Access Deniedβ
- Verify the IAM role trust policy includes the correct External ID
- Ensure the role has
SecurityAuditor equivalent read permissions
Azure: Authentication Failedβ
- Verify the Service Principal has Reader role on the subscription
- Check that the Client Secret hasn't expired
On-Prem: Connection Timeoutβ
- Verify network connectivity to target hosts
- Check firewall rules allow SSH (22) or WinRM (5985/5986)
- Verify credentials are correct