Shadow IT Discovery
Identify unprotected IT assets and control the risks associated with Shadow IT.

Unprotected IT assets pose a risk to your entire information system.
Keep control of the assets connected to your network with the Shadow IT Discovery feature.
Easily identify the devices on your IT infrastructure and detect those that need to be protected by your security platform.
Strengthen control over your information system
Thanks to the HarfangLab agent deployed on your workstations and servers, all endpoints can be mapped and associated with the network they are on without the need to install a probe.
HarfangLab uses the data collected on each endpoint by the agents to detect the presence of IT assets that are not protected by HarfangLab.
The endpoints send requests, or network packets, and based on the responses, the EDR detects the presence of unknown devices and can infer their specific characteristics (device type, OS, version, etc.).


This feature is accessible via the HarfangLab console for EDR and EPP users, and it is also available as a standalone feature with the Scout offering without EDR or EPP.
HarfangLab detects Shadow IT only on devices present on the network.
Yes, you can define networks to scan or exclude specific networks. In addition, HarfangLab automatically ignores home or irrelevant networks.