Your guide to testing, scanning, and giving feedback.

Stay up to date with the latest features and security improvements.
Follow the steps below to easily download and install the newest version of the Pipsqueak Network Scanner.
Explore the core tools that make Pipsqueak powerful for your IT management
Don't see what you are looking for? Contact our support for quick help
Contact Support →
Check credentials & network permissions.

Close unused apps, check network load.

Verify discovery settings & IP range.
This guide provides step-by-step instructions on configuring Personally Identifiable Information (PII) scanning in Pipsqueak, including entity selection, folder scanning, and log limits.
To enable Personally Identifiable Information (PII) scanning in Pipsqueak, you need to configure entity selection and folder paths.

To scan specific files, add folder paths:
After configuring PII scanning settings:
To enable Personally Identifiable Information (PII) scanning in Pipsqueak, you need to configure entity selection and folder paths.

Enabling detailed scanning retrieves extra information:
After configuring Localhost scanning settings:
This guide provides step-by-step instructions on configuring Network Scanning in Pipsqueak, covering IP ranges, ports, threading, and protocol filtering.

Network scanning requires defining an IP range and port numbers:
Enabling detailed scanning retrieves extra information:
After configuring Network Scan settings, follow these steps:
This guide provides step-by-step instructions on configuring Active Directory (AD) scanning in Pipsqueak, covering domain controllers, authentication, and account monitoring.

Set up alerts for inactive accounts and missing backups:
After configuring Active Directory scanning, follow these steps:
To integrate Microsoft 365 Scan with the Pipsqueak application, you need to provide the following details.

Pipsqueak allow you to customize the following log retrieval limits:
Sign-in Log Limit
To allow Pipsqueak to access Microsoft 365 data securely, you need to configure the following:
The On-Prem Scan feature in Pipsqueak allows users to monitor on-premises servers, their statuses, and age limits.

To enable On-Premises scanning, users must configure the following:
Set up thresholds for monitoring outdated servers:
After configuring Active Directory scanning, follow these steps:
Choose a form below to report bugs, request new features, or share feedback with our team.



Pipsqueak is a lightweight network monitoring and assessment tool that installs on a single machine and scans the entire network to identify all connected devices, giving you full visibility without complex setup.
Pipsqueak runs from a single device inside your network and performs a scan of connected systems, services, and shared resources. It does this all without sacrificing security or disrupting operations.
No. Pipsqueak runs from a single Windows machine and is completely agentless. Absolutely no software is installed on endpoints and no one on the network knows it’s running.
Pipsqueak scans for risk related to network configuration, host configuration, software versioning, active directory configuration, backup configuration, password reuse and account breach, and Microsoft 365 configuration.
Yes. Pipsqueak is designed to be non-intrusive. It performs passive and lightweight active scans without disrupting day-to-day network traffic.
Pipsqueak produces two main reports:
Risk Summary: A simple, business-friendly overview of vulnerabilities, misconfigurations, and exposed data.
Detailed Report: A technical breakdown of every finding, with device names, IP addresses, evidence, and remediation steps.

See everything.

Identify Potential Problems.

Empower Your Sales Team

506 7th Street, Wichita Falls, TX 76301
Oklahoma City
201 NE 50th St., Oklahoma City, OK 73105
Copyright 2025. BTSG - Business Technology Solutions Group. All Rights Reserved.