Deploy TYCHON cryptographic scanner across your enterprise with BigFix
Deploy and execute the TYCHON cryptographic scanner across Windows, macOS, and Linux endpoints using BigFix. The integration enables centralized deployment and scheduling with scan results posted directly to Elasticsearch for analysis and visualization.
Upload binaries to BigFix site Files tab and automatically distribute to endpoints
Scan results post directly to Elasticsearch for dashboards and reporting
Support for Windows (x64), macOS (Intel/ARM64), and Linux (x64)
Upload the scanner binaries to your BigFix server so they can be distributed to endpoints.
cryptographic-analyzer-windows-amd64-X.X.X.X.exe - Windows x64cryptographic-analyzer-darwin-amd64-X.X.X.X - macOS Intelcryptographic-analyzer-darwin-arm64-X.X.X.X - macOS Apple Siliconcryptographic-analyzer-linux-amd64-X.X.X.X - Linux x64Where X.X.X.X is the version number (e.g., 1.0.0.0)
cryptographic-analyzer-windows-amd64-X.X.X.X.execryptographic-analyzer-darwin-amd64-X.X.X.Xcryptographic-analyzer-darwin-arm64-X.X.X.Xcryptographic-analyzer-linux-amd64-X.X.X.XAfter uploading files to the site:
IMPORTANT: After checking "Send to clients", wait 20-30 minutes before deploying the task to allow BigFix to distribute files to endpoints.
__BESData/CustomSite_TYCHON_Lab/)
⚠️ Critical Timing Note: Do NOT deploy the task immediately after uploading files. The binaries must finish distributing to endpoints first (20-30 minutes). If you deploy too early, the action will fail with "file does not exist" errors because the continue if {exists file ...} checks will evaluate to false.
Use the form below to generate your customized action script. Enter your configuration details and copy the generated script into the Actions tab in the BigFix Create Task dialog.
The site where you uploaded the binaries
Version number of uploaded binaries
✅ How This Works:
parameter statementsif blocks) automatically selects the correct binary for each endpoint's OS-insecure flag skips SSL certificate verification (useful for self-signed certificates)⚠️ Security Note: The license key and Elastic API key will be visible in the task definition. For enhanced security, consider storing sensitive values as BigFix secure settings or using environment variables on endpoints.
After the scan completes (typically 2-15 minutes depending on system size), verify data in Elastic:
tychon-pqc*Explore X Matching Indexes - click that buttonobserver.hostname - Endpoint hostnametychon.cipher_negotiation.cipher_suite - The primary ciphertychon.cipher_negotiation.intel.security_category - Secuirty Level of a cipherThe -fullscan flag triggers a comprehensive cryptographic inventory scan. Results are sent directly to your Elastic instance in real-time:
cryptographic-analyzer -mode local -fullscan -posttoelastic -elasticnode "https://elastic:9200" -elasticapikey "..." -insecure
🔍 Direct Elastic Posting: The -posttoelastic flag sends scan results directly to your Elastic instance. Results are indexed to tychon-pqc and are immediately available for search and analysis. No local files are created.
✅ Execution: The scanner runs from BigFix's __Download directory with no custom installation or directories required.
| Scan Type | Flag | Description |
|---|---|---|
| Filesystem | -scanfilesystem |
Scans OS certificate stores and discovers certificates, private keys, and keystores |
| Cipher Enumeration | -cipherscan |
Comprehensive TLS/SSL cipher suite enumeration on active connections, includes protocol versions, key exchange algorithms, and PQC support detection |
| VPN Clients | -detect-vpn-clients |
Detects 19+ enterprise VPN clients with PQC readiness assessment |
| IPSec | -detect-ipsec |
Discovers IPSec tunnel configurations and cryptographic settings |
| Memory | -scanmemory |
Identifies certificates and keys loaded in process memory (Windows/Linux) |
| Outlook Archives | -scanoutlookarchives |
Scans for encrypted Outlook archives (.pst, .ost, .pab) |
Binaries are uploaded to your custom BigFix site's Files tab and automatically distributed to endpoints. Files are staged in each agent's custom site directory (__BESData/CustomSite_<SiteName>/).
Binary Location:
C:\Program Files (x86)\BigFix Enterprise\BES Client\__BESData\CustomSite_TYCHON_Lab\cryptographic-analyzer-windows-amd64-2.0.0.169.exe
Results Destination:
Posted directly to Elastic (no local files)
Binary Location:
/Library/BESAgent/__BESData/CustomSite_TYCHON_Lab/cryptographic-analyzer-darwin-arm64-2.0.0.169
Results Destination:
Posted directly to Elastic (no local files)
Binary Location:
/var/opt/BESClient/__BESData/CustomSite_TYCHON_Lab/cryptographic-analyzer-linux-amd64-2.0.0.169
Results Destination:
Posted directly to Elastic (no local files)
📋 File Distribution Process:
Schedule the TYCHON scanner to run automatically on a recurring interval using BigFix's reapplication behavior.
When you right-click the task and select Take Action, configure the Execution tab:
Common intervals:
To restrict scans to specific days/times:
Monthly scan on Saturday nights:
⚠️ Important: The "while relevant, waiting..." method requires the task to always be relevant. Our action script automatically handles this - the scanner will run every X days as configured, regardless of system state.
📅 Recommended Schedules:
Symptom: Action log shows continue if {exists file ...} evaluated to false
Cause: Files haven't finished distributing from BigFix server to endpoints yet
Solution:
⏱️ Timing is critical: BigFix needs time to synchronize files to relays and then to endpoints. Deploying the action too early will result in file not found errors.
__BESData/CustomSite_TYCHON_Lab/)chmod +x runs in action script)Symptom: Scan completes but no data visible in Elastic
Troubleshooting:
curl https://elastic-ip:9200)-insecure flag is needed for self-signed certificatesTo test the scanner manually on an endpoint from the custom site directory:
cd "C:\Program Files (x86)\BigFix Enterprise\BES Client\__BESData\CustomSite_TYCHON_Lab"
.\cryptographic-analyzer-windows-amd64-2.0.0.169.exe -license-key "YOUR-KEY" -mode local -fullscan -posttoelastic -elasticnode "https://elastic:9200" -elasticapikey "YOUR-API-KEY" -insecure
cd /Library/BESAgent/__BESData/CustomSite_TYCHON_Lab
chmod +x ./cryptographic-analyzer-darwin-arm64-2.0.0.169
./cryptographic-analyzer-darwin-arm64-2.0.0.169 -license-key "YOUR-KEY" -mode local -fullscan -posttoelastic -elasticnode "https://elastic:9200" -elasticapikey "YOUR-API-KEY" -insecure
cd /var/opt/BESClient/__BESData/CustomSite_TYCHON_Lab
chmod +x ./cryptographic-analyzer-linux-amd64-2.0.0.169
./cryptographic-analyzer-linux-amd64-2.0.0.169 -license-key "YOUR-KEY" -mode local -fullscan -posttoelastic -elasticnode "https://elastic:9200" -elasticapikey "YOUR-API-KEY" -insecure
💡 Tip: Replace YOUR-KEY, elastic:9200, and YOUR-API-KEY with your actual credentials. Remove -insecure if using valid SSL certificates.
To troubleshoot action execution, review BigFix Client logs:
C:\Program Files (x86)\BigFix Enterprise\BES Client\__BESData\__Global\Logs\
/Library/BESAgent/__BESData/__Global/Logs/
/var/opt/BESClient/__BESData/__Global/Logs/
Look for action execution details, file existence checks, and command output in the client log files.
tychon-pqc*