Configuring Asset Discovery module parameters
The configuration of the Asset Discovery module is done via the Asset Discovery subnode of the Agent Configuration > Module Configuration node, or directly under the defined Scanner's Module Configuration node under the main Asset Discovery node. It provides the possibility to modify the configuration parameters for the module and adapt its behavior to company policies and requirements. The Module Configuration node has the following tabs:
- Device List
To configure module parameters
The Asset Discovery module of the BCM Inventory provides all necessary settings to configure a device to execute an asset discovery scan on a remote device on which no BCM agent is installed. The General tab displays the list of parameters that must be defined for the Asset Discovery module and its general behavior.
- In the General tab, select any line in the table in the right window pane.
- Click Edit> Properties
The Properties pop-up menu appears. .
- Make the appropriate modifications to the individual values.
The Asset Discovery module of the BCM Inventory provides all necessary settings to configure a device to execute an asset discovery scan on a remote device on which no BCM agent is installed.
Parallel Script Count
The maximum number of scripts that can be executed simultaneously, possible values for this are Low : 5 simultaneous scripts, Normal : 10 simultaneous scripts and High : 20 simultaneous scripts.
Fine tunes the low level network packets sending, indicating the maximal time to use for scanning a single host. This allows to abort a device scan when it takes too long.
Max. Inventory Timeout
Indicates the global timeout for the whole session. The special value of 0 can be used to deactivate this option, that is, there is no timeout limit for the duration. Otherwise, the scan is aborted once the threshold value has been reached. The value in an integer followed by s for seconds or m for minutes or h for hours.
IP Address Range
Indicates the device range to be scanned. The expected format is a comma separated list of IP addresses or IP ranges. For instance, IP ranges must be supplied using different notations such as complete address range (192.168.0.0-192.168.5.254 ), a CIDR range (192.168.1.0/24 or 2001:db8:85a3::8a2e:370:152/896 ), a byte range notation (192.168.0-5.0-254 ) or single named devices (DNS, NetBIOS).nIt is strongly recommended not to specify complete subnet IPv6 address ranges, scanning these is extremely time consuming.
Excluded IP Address Range
Indicates the device range to be excluded from the previously defined range. The expected format is the same as for the included address range. This makes it possible to disable the scan for sensible devices even when using a short notation concerning the included device range (include: 192.168.1.0/24 and exclude: 192.168.1.255,mailserver,fileserver ).
Defines if a hardware inventory is to be executed on the remote device.
Defines if a software inventory is to be executed on the remote device.
Indicates how and when to process the information upload. When set to Immediate Upload , the module does upload the inventories as soon as they are supplied by a scan. When set to Upload at Scan End , the inventories is uploaded when the scan is completed or aborted (except if the abort operation indicates not to upload). When set to No Upload , the module does not upload the inventories at all until specifically called for via the operational rule step.
Nmap Installation Path
Contains the relative installation path to the BCM software, relative to the agent installation directory, for example, ../bin if it is located in the bin directory of the agent.
Use Nmap for Port/OS Detection
Defines if BCM, if installed, is used to detect the ports and operating system of the remotely inventoried device.
Prevent NMAP from sending IGMP packets on the network
Check this box if some of your network devices have problems with IGMP traffic. In this case BCM is prohibited from sending IGMP packets on the network.
Select the checkbox to connect using sudo (on Linux servers) to execute commands that require elevated privileges.
- Click OK to confirm the modifications and close the window.
The new module settings will be taken into account immediately.
To view credentials
You can view the credentials defined for the remote inventory process. These values are defined and assigned via an operational rule. They cannot be added or modified in this view.
The table provides the following information:
This field displays the protocol for which the account is defined, possible protocols are
The login name for the respective protocol. It has either one of the following formats: