How do I stop vScope from reading /etc/shadow?
If your security policy disallows any access to /etc/shadow, you can disable that probe behavior.
Steps
- Stop the vScope Server service.
- Open (or create)
config.iniin the vScope data folder- Windows (default):
C:\vScopeData\configuration\config.ini - Linux/Docker (default):
/data/configuration/config.ini
- Windows (default):
- Add:
discovery.probe.ssh.read_etc_shadow=false
- Save the file and start the vScope Server service.
- Run a discovery against a Linux host and check Discovery → Log History to confirm the shadow file is no longer read.
What changes? Only the SSH probe stops attempting to read /etc/shadow; other discovery steps continue normally.
Need to revert? Remove the line or set it to true, restart the service, and rerun discovery.