Discover Everything, Miss Nothing: Device & Account Discovery in Kron PAM
Apr 30, 2026
/
Erhan YILMAZ
In modern IT environments, visibility is everything. Yet as infrastructures expand across data centers, cloud networks, and hybrid environments, gaining a complete and up-to-date inventory of devices and privileged accounts becomes increasingly difficult.
Kron PAM addresses this challenge with advanced discovery capabilities designed specifically for network infrastructures—giving security teams and system administrators continuous insight, control, and confidence.
Flexible Onboarding for Network Devices
Every organization manages its infrastructure differently, which is why Kron PAM supports multiple ways to bring devices under management. System administrators can add devices manually, import them from Active Directory or LDAP services, synchronize from a CMDB, or perform bulk imports using Excel files.
Beyond these traditional methods, Kron PAM enables active discovery by scanning network subnets. This approach ensures that even devices not documented in existing systems are identified and evaluated—closing gaps that are often exploited by attackers.
Active Network Discovery Through Subnet Scanning
Subnet-based discovery in Kron PAM allows administrators to define one or more network ranges and associate them with specific device groups. These subnets can represent a single environment or span multiple segments across the organization.
Once configured, Kron PAM scans these networks to identify reachable devices and determine whether they should be managed as part of the privileged access environment. This proactive approach helps organizations maintain an accurate inventory, even as networks continuously change.
Discovery Profiles Designed for Network Infrastructure
Discovery in Kron PAM is driven by configurable discovery profiles, giving administrators precise control over how scanning is performed. Within a profile, admins select the protocol to be used—such as SSH, Telnet, SNMP, or RDP—and define which types of network elements should be identified.
Discovery profiles can be executed manually when immediate insight is required or scheduled to run periodically. This ensures visibility is maintained over time without adding operational burden to system administrators.
Visibility and Insights Through the Discovery Dashboard
When a subnet discovery is completed, results are presented in the Discovery Dashboard. From a single view, administrators can see how many devices were scanned, how many responded to the specified ports, and how many Kron PAM successfully authenticated to retrieve detailed information.
This level of transparency allows teams to quickly assess the state of their network, spot connectivity or access issues, and make informed decisions about onboarding and remediation.

Local Account Discovery Beyond the Device Level
Discovery does not stop identifying devices. Unmanaged local accounts on network infrastructure are a common source of risk, particularly in environments where shared or legacy credentials still exist.
Kron PAM integrates device discovery with its Password Vault to continuously scan managed devices for local user accounts. These scans run automatically at defined intervals, and authorized users can also trigger them manually when needed. Any newly discovered accounts are flagged for review, ensuring administrators are always aware of changes at the access level.

Automated Response with Full Administrative Control
Once local accounts are discovered, Kron PAM helps organizations respond quickly and consistently. Depending on policy, unauthorized accounts can be deleted automatically; notifications can be sent to administrators, or accounts can be reviewed and selectively imported into the Password Vault.
This combination of automation and control allows security teams to reduce risk without sacrificing operational flexibility.
Why Discovery Is Critical for Network PAM
Network devices often fall outside the scope of traditional identity and endpoint security solutions, creating dangerous blind spots. Kron PAM eliminates these gaps by unifying network discovery, credential visibility, and account governance into a single platform.
By continuously discovering both devices and privileged accounts, Kron PAM helps organizations gain a stronger security posture, improve compliance, and significantly reduce the attack surface across their network infrastructure.
Final Thoughts
You cannot secure what you cannot see. With its advanced discovery capabilities, Kron PAM ensures that every device and every privileged account in the network is visible, controlled, and protected.
Discovery is not just a feature—it’s the foundation of effective network security. And with Kron PAM, that foundation is always up-to-date.
*Written by Erhan YILMAZ. He is the Director of PAM Product Management at Kron.