×

Process and system for comprehensive IT discovery without credentials

  • US 9,778,953 B2
  • Filed: 06/16/2009
  • Issued: 10/03/2017
  • Est. Priority Date: 06/16/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for discovering dependencies, configurations and utilizations among IT resources comprising:

  • preparing at least one prediscovery script, the at least one prediscovery script associated with the discovering the dependencies, the configurations and the utilizations among the IT resources;

    obfuscating the prepared prediscovery script;

    sending the obfuscated prediscovery script to at least one user who has a privilege on at least one target server to run the obfuscated prediscovery script in the at least one target server;

    running the obfuscated prediscovery script on said at least one target server on a list to configure said at least one target server to discover the dependencies, the configurations and the utilizations among the IT resources and further to configure the at least one target server to prevent accessing files or directories that include financial information;

    discovering, based on the dependencies of the at least one target server, at least one outside server which is not on the list;

    running the obfuscated prediscovery script on the discovered outside server;

    providing to an analysis system at least one result of the running of the obfuscated prediscovery script on the at least one target server and the at least one outside server to parse and analyze the at least one result to generate data;

    providing the generated data to a user, the generated data representing the dependencies, the configurations and the utilizations among the IT resources and the at least one outside server, the generated data excluding the files or the directories that include the financial information,determining from the generated data whether the obfuscated prediscovery script needs to be re-executed on a specific target server under a different parameter representing a different level of privilege, wherein the at least one user can adjust a level of privilege when re-executing the obfuscated prediscovery script in the at least one target server based on the at least one result of the run prediscovery script, the level of privilege including;

    a normal user privilege and a root user privilege; and

    determining from the generated data an optimization of the IT resources, said optimization including a reconstructing of an IT environment of said IT resources for operational efficiency, said reconstructing of an IT environment comprising;

    moving of an application from one server to another server, and eliminating an unused software application and/or stale data in the IT resources, wherein the eliminating of the unused software application or stale data comprises respectively;

    deleting an software application of the IT resources that has not been accessed for a ore-determined amount of time, or deleting data that has not been accessed for a pre-determined amount of time, wherein the generated data is utilized in a virtualization of the IT resources, mapping a logical storage device to one or more physical storage devices, andwherein the analysis system does not require user privileges, does not directly communicate with the at least one target server except receiving the at least one result of the run prediscovery script from the at least one target server, and the dependencies, the configurations and the utilizations among the IT resources, including discovering dependent applications of a first application on said at least one target server and dependencies among a number of target servers and their related applications, are discovered without requiring user privileges, wherein the discovering dependencies include discovering which application programs communicate with each other.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×