Anzen Discovery

    Automatic network scanning and CMDB population

    Not suitable for OT / ICS / SCADA environments

    Anzen Discovery performs active TCP port scanning which sends connection attempts to every host in the target range. This may disrupt sensitive operational technology (OT), industrial control systems (ICS), or SCADA devices. Only use this tool on IT networks you are authorised to scan.

    What is Anzen Discovery?

    Anzen Discovery is a native desktop application that scans your network, discovers devices with open ports, and pushes the results directly into your Anzen CMDB as Configuration Items. It eliminates the manual effort of building and maintaining an asset inventory - run a scan, review the results, and your CMDB is up to date.

    How It Works

    Discovery uses a guided wizard with the following steps:

    1. Connect - authenticate with your Anzen instance using your credentials or a pre-provisioned API key.
    2. Configure - select the target entity, enter a CIDR range (e.g. 10.0.0.0/24), and adjust scan parameters such as ports, concurrent workers, and connection timeout.
    3. Scan - Discovery performs a TCP connect scan across all specified ports on every host in the range. Progress is shown in real time with an estimated time remaining.
    4. Enrich - for each host with open ports, Discovery performs reverse DNS lookups, grabs service banners, and makes an OS guess based on the open port combination.
    5. Review - a table shows all discovered hosts with checkboxes. Hosts that already exist in your CMDB are marked as "Update", new hosts as "New". You choose exactly which hosts to push.
    6. Push - selected hosts are created or updated in the CMDB under the chosen entity. Each host becomes a Configuration Item with IP address, hostname, OS info, and open port details.

    Enrichment

    After port scanning, Discovery enriches each host with additional data:

    • Reverse DNS - resolves the IP address to a hostname. If DNS is slow or unavailable, Discovery automatically skips DNS lookups after 5 consecutive timeouts.
    • Banner grabbing - connects to open ports and reads the service banner (e.g. SSH version string, HTTP server header).
    • OS detection - heuristic-based guess using the combination of open ports (e.g. ports 135/445/3389 suggests Windows, port 22 suggests Linux).

    Enrichment can be skipped entirely via a checkbox on the configuration screen. When skipped, only port-based OS detection runs (which is instant).

    Review Before Push

    Before any data is written to your CMDB, Discovery shows a review screen listing every discovered host. Each row includes a checkbox, the host's IP, hostname, OS guess, open ports, and whether the host is new or already exists in the CMDB. You can select or deselect individual hosts, or use "Select All" / "Select None". Only checked hosts are pushed when you click "Push to CMDB".

    Authentication

    Discovery supports two authentication methods:

    • User credentials - enter your Anzen instance URL, email, and password. The scanner authenticates via the same login flow as the management interface.
    • API key (pre-provisioned) - a scanner.json file placed next to the application contains the instance URL, client ID, and client secret. The scanner authenticates automatically on launch using the API key, skipping the login screen. This is ideal for distributing pre-configured scanners to teams.

    Supported Platforms

    Anzen Discovery is available as a native application for macOS (Apple Silicon and Intel) and Windows (x64). Both versions include the Anzen shield logo as the application icon and are code-signed for a smooth installation experience. A CLI version is also available for Linux.

    Disclaimer

    Anzen Discovery performs active network scanning which sends TCP connection attempts to target hosts. This is normal network activity but may trigger intrusion detection systems or firewall alerts. Anzen / SCRTY B.V. accepts no liability for any damages or disruptions caused by the use of this tool. Always ensure you have proper authorisation before scanning a network.