Device list

This tab displays the device inventory generated by the last scan. The following information is displayed:

ParameterDescription
StatusThis field displays the current scan status of the respective target. If the target cannot be scanned or contacted, the status displays Unreachable.
Device NameThis field displays the name of the scan targets.
IP AddressThis field displays the IP address of the device in its dotted version, such as 194.50.68.255.
Operating System NameThis field displays The name of the operating system installed on the discovered device.
NMAPOSThis field displays the status of operating system detection via Network Mapper (NMAP). (See the legend at the bottom of the table for status information.)
SSH

This field displays the status of Secure Shell (SSH) credential validation. (See the legend at the bottom of the table for status information.)

If the SSH credentials are valid, SSH is used to detect operating system, software, and hardware.

If the credential validation fails, the SSHOS, SSHSW, and SSHHW tests are not run and the corresponding columns remain empty.

SMB

This field displays the status of Server Message Block (SMB) credential validation. (See the legend at the bottom of the table for status information.)

If the SMB credentials are valid, SMB is used to detect operating system and software.

If the credential validation fails, the SMBOS and SMBSW tests are not run and the corresponding columns remain empty.

WMI

This field displays the status of Windows Management Instrumentation (WMI) credential validation. (See the legend at the bottom of the table for status information.)

If the credentials are valid, WMI is used to detect operating system, software, and hardware.

If the credential validation fails, the WMIOS, WMISW, and WMIHW tests are not run and the corresponding columns remain empty.

SNMP

This field displays the status of Simple Network Management Protocol (SNMP) credential validation. (See the legend at the bottom of the table for status information.)

If the SNMP credentials are valid, SNMP is used to detect operating system, hardware, and network connectivity.

If the credential validation fails, the SNMPOS, SNMPHW, and SNMPCON tests are not run and the corresponding columns remain empty.

SSHOSThis field displays the status of operating system detection via SSH. (See the legend at the bottom of the table for status information.)
SMBOSThis field displays the status of operating system detection via SMB. (See the legend at the bottom of the table for status information.)
WMIOSThis field displays the status of operating system detection via WMI. (See the legend at the bottom of the table for status information.)
SNMPOSThis field displays the status of oeprating system detection via SNMP. (See the legend at the bottom of the table for status information.)
SSHSWThis field displays the status of software detection via SSH. (See the legend at the bottom of the table for status information.)
SMBSWThis field displays the status of software detection via SMB. (See the legend at the bottom of the table for status information.)
WMISWThis field displays the status of software detection via WMI. (See the legend at the bottom of the table for status information.)
SSHHWThis field displays the status of hardware detection via SSH. (See the legend at the bottom of the table for status information.)
WMIHWThis field displays the status of hardware detection via WMI. (See the legend at the bottom of the table for status information.)
SNMPHWThis field displays the status of hardware detection via SNMP. (See the legend at the bottom of the table for status information.)
SNMPCONThis field displays the status of network connectivity detection via SNMP. (See the legend at the bottom of the table for status information.)
DetailThis field displays the latest status of the scan.
Discovery TimeThis field displays the date and time at which the individual devices were discovered for the first time.
Start TimeThis field displays the date and time at which the scanning session was started on the target client.
End TimeThis field displays the date and time at which the session finished.
Duration (Sec)This field displays the total time the session needed to execute in the regular time format hh:mm:ss.
MAC AddressThis field displays the MAC, that is, the hardware address of the currently discovered device.

Legend:

  • Yellow (): Operation in progress
  • Red (): Operation failed
  • Green (): Operation successful
  • (Empty cell): Operation not performed as the protocol credentials are either not supplied or are invalid.

Viewing scan log

You can view the log of each item in the inventory scan. To view the log:

  • Right click the row for which you want to view the log and select Display Log .

Was this page helpful? Yes No Submitting... Thank you

Comments