Discovery Service Account flagged by security team for failed logins on servers

Lance_B
Tera Contributor

Hey all,

We just implemented ServiceNow ITSM in April and just started working on Discovery and ITOM. Our security team has noticed a spike in failed logins from the local Discovery Service account on the MID server. From what I can gather, it looks like Discovery tries every possible credential available to the MID server when it performs the discovery. I'm not seeing failures because I have the proper logins configured in Connections & Credentials. I'm guessing that Discovery is trying the Service credentials first, which fail, and then it tries the correct credentials and succeeds which is why I don't get a failure reported.

I can't think of a reason to try the Service credentials to perform discovery on domain-joined servers, but please let me know if there is one. Otherwise, is there a way to stop Discovery from trying this credential so I can make my security team happy?

Thanks,

Lance

1 REPLY 1

bvl0120
Tera Contributor

Hi Lance,

 

Typically discovery would try all the credentials first and if none succeed then it would "fallback" to the service account for your midserver.  There is a mid server parameter that turns off the fallback option.

 

mid.powershell.local_mid_service_credential_fallback to False, default is true.  

 

I am running into the same issue and will test it this week.  Let me know if you had any better results.

 

Thanks