Managing asset discovery scans

A scan presents information about its configuration, that is, its targets, ports, schedule, and so on, and details on its last execution. Each Asset Discovery Scan node has the following tabs:

  • Scan Configuration
  • Target Lists
  • Assigned Schedule
  • Sessions

The following topics are provided:

Assigning a configuration to a scan

If you manually created the scan, you might still need to assign a configuration to it. If the scan was created by the wizard, the configuration might already be defined. You can change an assigned scan configuration by first removing the currently assigned configuration as explained and then adding the newly required one. To do so, proceed as follows:

  1. Click Edit > Assign Scan Configuration .
    The Assign a Scan Configuration to the Scan dialog box opens on the screen. It displays the list of available scan configurations in its Available Objects box.
  2. Select the desired configuration
  3. Click OK to add it and close the window.

Assigning a schedule to a scan

When a scan is created it is automatically assigned a scheduler. The Assigned Schedule tab of the scan's node provides the possibility to modify the timer for the currently selected scan and to define when and at which frequency it is to run. The default settings of the scheduler's timer are to execute the scan once a immediately with immediate activation as well, however, the assignment is still paused. If you created the scan via the wizard you will also defined the schedule, and these settings will be displayed here.

Parameter

Description

Status

The fields of this column display the status of the scan.

Last Status Update Time

This time value indicates at which date and time the status previously displayed was updated by the target's agent for the last time.

Activation

This field shows the condition on which the scan will start executing on the targets.

Schedule

The fields of this column display the frequency with which the scan will be executed on the assigned device.

Termination

This field displays when the scan execution is scheduled to be terminated, that is, when the scan is to be run for the definitely last time of the current scheduling cycle.

Time of Assignment

This field displays the date and time at which the assignment between the objects was created in the database.

Reassigning scan

If you made modifications to a scan which is already assigned for execution it must be reassigned. To reassign, proceed as follows:

  1. Select the scan which is to be reassigned in the table in the right window pane.
  2. Click Edit > Reassign Scan .

The reassignment process of the scan will be launched.

Activating scan

Depending on the choice of activation the scan might be deactivated. To activate, proceed as follows:

  1. Select the entry to activate in the table in the right window pane.
  2. Click Edit > Activate Scan .

The scan will be automatically activated.

Reassigning scan

If you made modifications to a scan which is already assigned for execution it must be reassigned. To reassign, proceed as follows:

  1. Select the scan which is to be reassigned in the table in the right window pane.
  2. Click Edit > Reassign Scan .

The reassignment process of the scan will be launched.

Canceling scan

To cancel a currently executing scan proceed as follows:

  1. Select the scan to stop in the table in the right window pane.
  2. Click Edit > Cancel Scan .

The scan will be stopped.

Assigning a target list to a scan

The Targets Lists tab of a scan displays the target lists and targets the scan is to check. These lists can contain individual devices with or without a CM agent installed and all the members of already existing device groups.

If you manually created the scan, you need to assign target lists to it. If the scan was created by the wizard, these might already be defined. You can also add additional targets or target lists later on, which is done via this tab. To do so, proceed as follows:

  1. Select the Target Lists tab of the scan to which you want to add a new target list.
  2. Click Edit> Assign Target List .
    The Assign a Target List dialog box opens on the screen. It displays the list of available target lists in its Available Objects box.
  3. Select the desired target list(s)
  4. Click OK to add it and then close the window.

Viewing scan sessions

Scans are executed in sessions. A session is the complete scanning of one device of the target list. Generally an executing scan consists of as many sessions as it has targets, which can, however, not all be executed at the same time. The number of simultaneously running sessions can be defined in the settings of the Asset Discovery module of the respective scanner.

The Sessions tab displays the following information about the different sessions of the currently executing scan on the scanner:

ParameterDescription
StatusThese fields display the current scan status of the respective target. If the target cannot be scanned, that is, it is not contactable, the status displays Unreachable.
Device NameThe fields of this column display the names of the scan targets.
IP AddressThe IP address of the device in its dotted version, such as 194.50.68.255.
Operating System NameName The name of the operating system installed on the discovered device.
NMAPOSThe field indicates the status of operating system detection via Network Mapper (NMAP). (See the legend at the bottom of the table for status information.)
SSH

The field indicates the status of Secure Shell (SSH) credential validation. (See the legend at the bottom of the table for status information.)

If the SSH credentials are valid, SSH is used to detect operating system, software, and hardware.

If the credential validation fails, the SSHOS, SSHSW, and SSHHW tests are not run and the corresponding columns remain empty.

SMB

SMB The field indicates the status of Server Message Block (SMB) credential validation. (See the legend at the bottom of the table for status information.)

If the SMB credentials are valid, SMB is used to detect operating system and software.

If the credential validation fails, the SMBOS and SMBSW tests are not run and the corresponding columns remain empty.

WMI

WMI The field indicates the status of Windows Management Instrumentation (WMI) credential validation. (See the legend at the bottom of the table for status information.)

If the credentials are valid, WMI is used to detect operating system, software, and hardware.

If the credential validation fails, the WMIOS, WMISW, and WMIHW tests are not run and the corresponding columns remain empty.

SNMP

SNMP The field indicates the status of Simple Network Management Protocol (SNMP) credential validation. (See the legend at the bottom of the table for status information.)

If the SNMP credentials are valid, SNMP is used to detect operating system, hardware, and network connectivity.

If the credential validation fails, the SNMPOS, SNMPHW, and SNMPCON tests are not run and the corresponding columns remain empty.

SSHOSSSHOS The field indicates the status of operating system detection via SSH. (See the legend at the bottom of the table for status information.)
SMBOSSMBOS The field indicates the status of operating system detection via SMB. (See the legend at the bottom of the table for status information.)
WMIOSWMIOS The field indicates the status of operating system detection via WMI. (See the legend at the bottom of the table for status information.)
SNMPOSSNMPOS The field indicates the status of oeprating system detection via SNMP. (See the legend at the bottom of the table for status information.)
SSHSWSSHSW The field indicates the status of software detection via SSH. (See the legend at the bottom of the table for status information.)
SMBSWSMBSW The field indicates the status of software detection via SMB. (See the legend at the bottom of the table for status information.)
WMISWWMISW The field indicates the status of software detection via WMI. (See the legend at the bottom of the table for status information.)
SSHHWSSHHW The field indicates the status of hardware detection via SSH. (See the legend at the bottom of the table for status information.)
WMIHWWMIHW The field indicates the status of hardware detection via WMI. (See the legend at the bottom of the table for status information.)
SNMPHWSNMPHW The field indicates the status of hardware detection via SNMP. (See the legend at the bottom of the table for status information.)
SNMPCONSNMPCON The field indicates the status of network connectivity detection via SNMP. (See the legend at the bottom of the table for status information.)
DetailThis field displays the latest status of the scan.
Discovery TimeThis column displays the date and time at which the individual devices were discovered for the first time.
Start TimeThe date and time at which the scanning session was started on the target client.
End TimeThe date and time at which the session finished.
Duration (Sec)The the total time the session needed to execute in the regular time format hh:mm:ss.
MAC AddressThe MAC, that is, the hardware address of the currently discovered device.

Legends:

  • Yellow (): Operation in progress
  • Red (): Operation failed
  • Green (): Operation successful
  • (Empty cell): Operation not performed as the protocol credentials are either not supplied or are invalid.

Viewing scan log

You can view the log of each item in the inventory scan. To view the log:

  • Right click the row for which you want to view the log and select Display Log .

This version of the documentation is no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.

Comments