CLI Scanning via N-central

After selecting your organization and scan type from the Scan Computers page, choose N-able N-Central from the Scan Delivery Method dropdown:

To create a Scripting Task in the N-central Management Console that runs a scan using the Risk Intelligence Command Line Executable file follow these steps:

Step 1: Download the executable for Windows

  1. Download the command line executable for Windows to the device from which you are running the N-central Management Console. The downloaded file will be named iscanruntime_XXXXXX_.exe.
  2. Rename the file to iscanruntime.exe.
  3. Take note of the Short Code to use later.
  4. Take note of the download location to use later.

Step 2: Enter scheduled task and task details

  1. On the N-central Management Console left navigation, choose Actions > Run a Script to launch the wizard.
  2. Enter a descriptive name for the task. For example: Risk Intelligence Security Scan
  3. Select the appropriate Credentials option.
  4. From the SCRIPT Location: dropdown, select "From My Computer".
  5. Enter a descriptive name for the script. For example: Risk Intelligence Security Scan
  6. Enter a description. (Optional)
  7. Click Browse to locate the command line executable file you downloaded earlier.
  8. Once located, select the file and click Open to add that file name. NOTE: Only the file name will show up, not the full path. This is expected.
  9. Delete any text from the Command Line Parameters entry box and add the following: -k XXXXXX (Where XXXXXX is the Short Code for the scan you're going to run.)

Step 3: Select target devices

  1. Select the Targets tab.
  2. Select the target(s) via the Filters or Devices list.

Step 4: Set a schedule

  1. Select the Schedule tab.
  2. Choose the appropriate schedule type: "Now", "Once" or "Recurring".
  3. Set the Execution Timeout value. NOTE: For Data Scans, it is recommended that this value be set to a minimum of 24 hours to ensure proper completion of those scans. The Data Scans are: Data Discovery / Breach, Expanded Data Discovery / Breach and PAN. The default value of one hour is sufficient for all other scans.
  4. Configure the other scheduling options as needed. NOTE: If you are setting a recurring task, make sure to allow enough time for any Data Scans to complete before scheduling another scan.
  5. Click Save.

Step 5: Monitor progress

  • Select the Status tab and monitor the progress of your task.

Step 6: View results

When the scan is completed, the output will be displayed in the Task Output.

To view the scan results, open the zip file provided and copy the report URL prefaced with “See results here:” into your web browser.

Alternatively, from your browser you can log in to your Risk Intelligence dashboard, click View and Manage from the left navigation, then select Scan Results to see a full listing of all scans. From there, locate the appropriate device and double click the scan to open the results.