CloudScape 2.0 Quick Start

Getting started with CloudScape 2.0 is quick and easy. The setup process generally takes between 5 minutes to an hour, depending on the number of credentials you have for your environment. Follow the step by step instructions below to get started. If you have a question not covered in this quick start, please see our Frequently Asked Questions section at the bottom of this page. View the CloudScape Pre-Deployment Checklist

In addition to our quick start guide below, we offer professional services. For more information on professional services, please go to

Important! All CloudScape engagements require a subscription and licenses. If you do not have a subscription, click here and fill out the form at the bottom, or contact If you have a subscription and need to purchase node licenses, please contact your account manager or contact

Create an Assessment

The first step to Using CloudScape is creating an assessment. Follow the instructions below to get started.

CloudScape 2.0
  • Navigate to
  • Log in, or register if you don’t already have an account.
  • Click the “Add Assessment” Button in the assessment list window.
  • You will see a prompt asking whether or not you have an assessment code or subscription code. Click yes.
  • Enter your coupon code in the box provided. If you do not have a coupon code, please see the FAQ to find out how to retrieve your coupon code.
  • Fill in the company information under the “Add Assessment” pop-up.
  • Invite people if you would like. You can always invite people later on.
  • Upon completion, you should see a pane with your new assessment.

Deploy RN-150

We must download and deploy the RISC Networks RN-150 virtual machine to handle data collection for our assessment.

  • Click your assessment to open the “Appliance Status” page.
  • Click the green “Download RN150” button.
  • While waiting on your download to complete, copy the code Under “Step 2”, and save it somewhere you can retrieve it later.
  • When your download completes, extract the files to a safe place.
  • Follow VMware documented procedures for Deploying OVF Templates in your specific version of VMware.
  • Wait for the machine to boot. You should see the RISC Networks Logo and briefly see a white screen before being redirected to a log in screen.
Additional Resources

Log In to RN-150

After powering on the RN-150, you can log in and accept the RISC Networks End User License Agreement. We offer an option to use the RISC Networks RN-150 in a browser, which we recommend. We recommend this because copy/paste may not be available through the hypervisor console. If you are going to use a browser, Open your browser of choice and navigate to the url that is displayed in the top right corner of the log in page. Follow the instructions below to log in.

  • Enter your username(Email address)
  • Enter your password.
  • Go to the box on the right to read the eula. Scroll to the botton.
  • Elect whether or not use professional services.
  • Accept the End User License Agreement.
  • Click Login.

Enter Your Assessment Key

Now it is time to enter the assessment key we copied when we created our assessment. Again, we recommend using the RN-150 in a browser window because copy/paste may not be available in a hypervisor console.

  • Enter your assessment key.
  • You will be prompted to choose whether or not you are using FlexDeploy. If you are unsure, click no.
  • If you are using FlexDeploy, enter the network address of the FlexDeploy appliance you have previously set up.

Enter Subnet Information

Now it is time to enter Subnet information. We can’t go any further without entering at least one subnet. There are two options for entering subnet information. You can enter a subnet individually, or populate from a routing table.

  • Click the subnets link on the dashboard page.
  • To enter subnets individually, enter an network address and select the subnet mask from the dropdown.
  • Click add
  • To populate from a routing table, click “Populate from routing table”.
  • In the prompt, choose which version of SNMP you are using, and enter the necessary credentials.
  • To enter subnets using a .csv file, click “Populate from CSV”.
  • Your csv file must be named “subnets.csv”. The file must be under 1MB and formatted as either network address/CIDR prefix, or network address/CIDR prefix new line. (ex.,
  • In the table below, make sure to select all of the subnets you wish to scan.
  • After you have confirmed that you have selected all subnets for which you want information, click the “Dashboard” button.

Enter SNMP Information

  • Click the snmo link on the dashboard page.
  • Enter an SNMP string in the input box or click the “Add SNMP Version 3” button if you are using SNMP version 3.
  • Click add
  • Enter the IP address. and click “Test”.
  • After testing successfully, click “Ok” and return to the dashboard.

Enter Windows Credentials

It is time to enter Windows Credentials. It is important to note that RISC Networks’ CloudScape is more effective if you enable application socket collection. More information can be found on application socket collection (Netstat) in our Operations and Security Guide.

  • Click the Windows link on the Dashboard page.
  • If you have a Domain for your credential, enter it.
  • Enter a user name and password.
  • Select an option for application socket collection.
  • If you selected enable, you will be prompted to confirm your choice. click next.
  • If you clicked next, you will be asked whether or not you want to enable this feature on workstations. We recommend enabling this as well.
  • Click add.
  • You will be prompted to test your credential. We recommend testing all credentials. This helps to ensure we collect information on all relevant devices and prevents problems later on.
  • After receiving confirmation that your credential is correct, click ok and either add more credentials, or click the “Dashboard” button.

Enter VMWare Credentials

Entering VMWare credentials is similar to entering windows credentials.

  • Click the VMWare link on the Dashboard page.+
  • Enter a network address.
  • Confirm you are hitting the right port. The default is port 443.
  • Enter a username and password
  • Click “Add”.
  • You will be prompted to test your credential. It is important to test all credentials before starting the scan. After a successful test, click
  • After receiving confirmation that your credential is correct, click ok and either add more credentials, or click the “Dashboard” button.

Complete Bootstrap and Start Scan

There are 3 more options for entering credentials. Cisco CallManager, Cisco Discovery Services, and Additional Credentials. In this video, we opted out of these options however, feel free to enter and test them if you have them. After we enter all relevant credentials, we can start the scan.

  • After entering or opting out of all credential categories, You have the option to start the assessment. Click the “Start Assessment” button.
  • You will be prompted to confirm your settings. Confirm that all of the credentials you entered are accounted for in this pop up.
  • Click “Start”.
  • You are done for now. You will receive an email when the discovery process is complete.
Additional Resources

Review Assets and Request Rescan

ou should receive an email letting you know when your scan is complete. Once you receive this email, you should review your assets to verify that all devices that are in-scope for the assessment are accessible.

  • Log in to
  • Click the “Consume Intelligence” link after selecting your assessment.
  • Click the “Assets” link
  • Verify all devices and subnets are in scope and in scope devices are accessible. (ie. Make sure Windows Servers are in the “Windows Devices” section and not under “Inaccessible Devices”.)
  • Go back to the RISC Networks RN-150 appliance and add any missing credentials and click the “Request Rescan” button as needed.
Additional Resources

License Devices for Data Collection

Now it is time to license devices in your network. You may or may not want to license everything. You may only want to license “Windows Servers” or, devices in a certain ip range. Either way, you have the option to filter based on certain criteria.

  • Log in
  • Log in to
  • Click the “Collect Data” link and select “Licensing”.
  • Filter to the devices you would like to license.
  • Add Core licenses and Feature Licensess as needed.
  • Devices will start collecting once they are checked. To free a device from collection, simply uncheck it.

Application Review Process

There are two stages in the process of reviewing auto-generated application grouping with a customer. Each customer is different based on size and complexity, but it is reasonable to think that both stages can be completed (with customer input) in less than one day. For more information on the application review process, please click the link below.


About Us

Q. Who is RISC Networks?

RISC Networks was founded in 2007 and specializes in providing Business Technology Analytics services to customers all over the world. RISC Networks, LLC has its home office at 81 Broadway st, Suite C, Asheville, NC, 28801.

Q. How many assessments have you run?

A. RISC Networks has run over 8,000 IT Assessments since 2009. We have run engagements on every continent in the world, except Antarctica. Penguins don’t do IT Assessments apparently.


Q. Can I get support if I need it?

A. Yes. We offer email support by opening a ticket here. We also have many great partners who have tremendous experience with our tools. We would be happy to have a discussion with you about our partners or using our in house services should you need it. Please click the link here to submit a request.

Q. If we have questions while reviewing the data, is there someone we can talk to?

A. Yes. We can recommend one of our Solution Providers to assist you in creating a forward looking plan if you would like. We can also help you directly by providing a report review for an additional fee. Please open a ticket here if you would like us to help.

Q. How do I retrieve my coupon code to create an assessment?

A. You should have received your coupon code in an email from your RISC Networks account representative. If you cannot find it, please contact your account representative or open a ticket open a ticket here.

About the Assessment

Q. How long does this assessment take?

A. From one to thirty days or longer. It depends on you, your environment and your business/project objectives. The longer it runs, the more information it has to analyze. But your timetable is what is important. You can start and stop the engagement whenever you need to. Though, at a minimum we do recommend at least one week of data analysis.

Q. How many devices can I evaluate?

A. Our platform will scan and identify an unlimited number of devices. You will receive an asset report showing all of the devices we have identified. For these devices to show up in our platform, they must be licensed. You can license all of your devices, or just the devices you need to see in our platform.

Virtual Appliance

Q. What is required to run the Virtual Appliance?

A. Our Virtual Appliance runs in VMware products such as VMware Player, VMware Workstation, and all ESX versions of VMware. The Virtual Appliance requires 4 GB of memory and 50 GB of hard drive space (Thin Provisioned). That’s it. Everything else is included.

For more detailed instructions on setting up your Virtual Appliance, please visit our instructions page.

Q: What access do we need to provide?

A: The RISC Networks Virtual Appliance will need to be bootstrapped with credentials in order to access your IT assets for inventory and performance collection. These credentials never leave the Virtual Appliance and the RISC Networks team never sees them. Depending on what you would like to analyze, you will need to provide the following credentials and information:

  • IP Subnets (required)
  • SNMP Read-Only Strings (optional)
  • Windows Domain Administrator Credentials (optional)
  • VMware vSphere Credentials or ESX root logins (optional)
  • Cisco Unified Communications Manager login (optional)
  • Cisco network equipment CLI credentials (optional)
Q: Why does RISC Networks need Domain Administrator Credentials?

A: RISC Networks utilizes WMI, SNMP, ICMP and other scanning techniques to maximize Assessment success. WMI (Windows Management Instrumentation) is a Microsoft Windows component that allows one computer to access performance statistics and inventory information on another computer. RISC Networks uses this to complete its Windows inventory and performance analysis. Domain Administrator privileges are needed to complete this portion of the Assessment.