Managing asset discovery scans
A scan presents information about its configuration, that is, its targets, ports, schedule, and so on, and details on its last execution. Each Asset Discovery Scan node has the following tabs:
- Scan Configuration
- Target Lists
- Assigned Schedule
- Sessions
To assign a configuration to a scan
If you manually created the scan, you might still need to assign a configuration to it. If the scan was created by the wizard, the configuration might already be defined. You can change an assigned scan configuration by first removing the currently assigned configuration as explained and then adding the newly required one. To do so, proceed as follows:
- Click Edit > Assign Scan Configuration .
The Assign a Scan Configuration to the Scan dialog box opens on the screen. It displays the list of available scan configurations in its Available Objects box. - Select the desired configuration
- Click OK to add it and close the window.
To assign a schedule to a scan
When a scan is created it is automatically assigned a scheduler. The Assigned Schedule tab of the scan's node provides the possibility to modify the timer for the currently selected scan and to define when and at which frequency it is to run. The default settings of the scheduler's timer are to execute the scan once a immediately with immediate activation as well, however, the assignment is still paused. If you created the scan via the wizard you will also defined the schedule, and these settings will be displayed here.
Parameter | Description | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Status | The fields of this column display the status of the scan. The possible values are:
| ||||||||||||||||||||||||||||||||||||||||||
Last Status Update Time | This time value indicates at which date and time the status previously displayed was updated by the target's agent for the last time. | ||||||||||||||||||||||||||||||||||||||||||
Activation | This field shows the condition on which the scan will start executing on the targets. | ||||||||||||||||||||||||||||||||||||||||||
Schedule | The fields of this column display the frequency with which the scan will be executed on the assigned device. | ||||||||||||||||||||||||||||||||||||||||||
Termination | This field displays when the scan execution is scheduled to be terminated, that is, when the scan is to be run for the definitely last time of the current scheduling cycle. | ||||||||||||||||||||||||||||||||||||||||||
Time of Assignment | This field displays the date and time at which the assignment between the objects was created in the database. |
To reassign a scan
If you made modifications to a scan which is already assigned for execution it must be reassigned. To reassign, proceed as follows:
- Select the scan which is to be reassigned in the table in the right window pane.
- Click Edit > Reassign Scan .
The reassignment process of the scan will be launched.
To activate a scan
Depending on the choice of activation the scan might be deactivated. To activate, proceed as follows:
- Select the entry to activate in the table in the right window pane.
- Click Edit > Activate Scan .
The scan will be automatically activated.
To cancel a scan
To cancel a currently executing scan proceed as follows:
- Select the scan to stop in the table in the right window pane.
- Click Edit > Cancel Scan .
The scan will be stopped.
To assign a target list to a scan
The Targets Lists tab of a scan displays the target lists and targets the scan is to check. These lists can contain individual devices with or without a CM agent installed and all the members of already existing device groups.
If you manually created the scan, you need to assign target lists to it. If the scan was created by the wizard, these might already be defined. You can also add additional targets or target lists later on, which is done via this tab. To do so, proceed as follows:
- Select the Target Lists tab of the scan to which you want to add a new target list.
- Click Edit> Assign Target List .
The Assign a Target List dialog box opens on the screen. It displays the list of available target lists in its Available Objects box. - Select the desired target list(s)
- Click OK to add it and then close the window.
To view scan sessions
Scans are executed in sessions. A session is the complete scanning of one device of the target list. Generally an executing scan consists of as many sessions as it has targets, which can, however, not all be executed at the same time. The number of simultaneously running sessions can be defined in the settings of the Asset Discovery module of the respective scanner.
The Sessions tab displays the following information about the different sessions of the currently executing scan on the scanner:
Parameter | Description |
---|---|
Status | These fields display the current scan status of the respective target. If the target cannot be scanned, that is, it is not contactable, the status displays Unreachable . |
Device Name | The fields of this column display the names of the scan targets. |
IP Address | The IP address of the device in its dotted version, such as 194.50.68.255. |
Operating System Name | Name The name of the operating system installed on the discovered device. |
NMAPOS | The field indicates the status of operating system detection via Network Mapper (NMAP). (See the legend at the bottom of the table for status information.) |
SSH | The field indicates the status of Secure Shell (SSH) credential validation. (See the legend at the bottom of the table for status information.) If the SSH credentials are valid, SSH is used to detect operating system, software, and hardware. If the credential validation fails, the SSHOS, SSHSW, and SSHHW tests are not run and the corresponding columns remain empty. |
SMB | SMB The field indicates the status of Server Message Block (SMB) credential validation. (See the legend at the bottom of the table for status information.) If the SMB credentials are valid, SMB is used to detect operating system and software. If the credential validation fails, the SMBOS and SMBSW tests are not run and the corresponding columns remain empty. |
WMI | WMI The field indicates the status of Windows Management Instrumentation (WMI) credential validation. (See the legend at the bottom of the table for status information.) If the credentials are valid, WMI is used to detect operating system, software, and hardware. If the credential validation fails, the WMIOS, WMISW, and WMIHW tests are not run and the corresponding columns remain empty. |
SNMP | SNMP The field indicates the status of Simple Network Management Protocol (SNMP) credential validation. (See the legend at the bottom of the table for status information.) If the SNMP credentials are valid, SNMP is used to detect operating system, hardware, and network connectivity. If the credential validation fails, the SNMPOS, SNMPHW, and SNMPCON tests are not run and the corresponding columns remain empty. |
SSHOS | SSHOS The field indicates the status of operating system detection via SSH. (See the legend at the bottom of the table for status information.) |
SMBOS | SMBOS The field indicates the status of operating system detection via SMB. (See the legend at the bottom of the table for status information.) |
WMIOS | WMIOS The field indicates the status of operating system detection via WMI. (See the legend at the bottom of the table for status information.) |
SNMPOS | SNMPOS The field indicates the status of oeprating system detection via SNMP. (See the legend at the bottom of the table for status information.) |
SSHSW | SSHSW The field indicates the status of software detection via SSH. (See the legend at the bottom of the table for status information.) |
SMBSW | SMBSW The field indicates the status of software detection via SMB. (See the legend at the bottom of the table for status information.) |
WMISW | WMISW The field indicates the status of software detection via WMI. (See the legend at the bottom of the table for status information.) |
SSHHW | SSHHW The field indicates the status of hardware detection via SSH. (See the legend at the bottom of the table for status information.) |
WMIHW | WMIHW The field indicates the status of hardware detection via WMI. (See the legend at the bottom of the table for status information.) |
SNMPHW | SNMPHW The field indicates the status of hardware detection via SNMP. (See the legend at the bottom of the table for status information.) |
SNMPCON | SNMPCON The field indicates the status of network connectivity detection via SNMP. (See the legend at the bottom of the table for status information.) |
Detail | This field displays the latest status of the scan. |
Discovery Time | This column displays the date and time at which the individual devices were discovered for the first time. |
Start Time | The date and time at which the scanning session was started on the target client. |
End Time | The date and time at which the session finished. |
Duration (Sec) | The the total time the session needed to execute in the regular time format hh:mm:ss. |
MAC Address | The MAC, that is, the hardware address of the currently discovered device. |
Legends:
|
To view a scan log
You can view the log of each item in the inventory scan. To view the log:
- Right click the row for which you want to view the log and select Display Log .
Comments
Log in or register to comment.