Skip to Main Content
Liongard Library

Welcome to Liongard Library, where Lions share! This is a community-led space where Liongard users can come to teach and learn from one another.
Share custom Metrics, get inspired and see what’s trending in the Pride.

Pride Etiquette:
➕ Have great custom Metrics? Add them as entries!
🌟 Want to use a Metric? Copy the query and
follow this doc.
👍 Tried a Metric from the Library? Like it!
📣 Have a question or feedback on a Metric? Add a comment!
🔎 Not sure where to start? Learn about Metrics and how to write them.
💬 Need help writing a metric or want to help support others? Join the conversation in our Liongard Lounge #metrics slack channel.


🥴 See something off? Open a support chat to let us know.

Categories Windows Server
Created by Noah Tatum
Created on Feb 21, 2024

Windows Server: Unknown ScreenConnect Fingerprints

Replace the "xxxxxxxxxxxxxxxx" with your known ScreenConnect fingerprints. You can add additional fingerprints as needed with more "contains" statements separated by "||". These fingerprints can be found via software inventory (Add/Remove Programs, RMM, Liongard, etc). Look for the ScreenConnect entries and grab the 16-character string.

Query

Software[?contains(Name, `ScreenConnect`) && !(contains(Name, `xxxxxxxxxxxxxxxx`) || contains(Name, `xxxxxxxxxxxxxxxx`))].join(`: `, [Name,DisplayVersion]) | sort(@)

  • Attach files
  • Ted Thueson
    Reply
    |
    Feb 27, 2024

    I've adjusted this to not fuzzy match "ScreenConnect" since this vulnerability does not apply to client installations (from my understanding). Obviously it's good to check over the client versions as well, but this will further scope things down to catch only SC server installations.

    Software[?contains(Name, `ScreenConnect`) && !(contains(Name, `xxxxxxxxxxxxxxxx`) || contains(Name, `xxxxxxxxxxxxxxxx`))].join(`: `, [Name,DisplayVersion]) | sort(@)

    1 reply