Managing scan configurations

The scan configurations define the actual scanning parameters. Depending on your network features, these might vary considerably and you can select the most suitable to scan for your environment or system. Scan configuration folders are created as organizational containers for the different scan configurations. They can contain any number of scan configurations for the execution of asset discovery scans of your system.

To create a scan configuration

To create a new scan configuration, proceed as follows:

  1. Go to Asset Discovery > Configuration > Scan Configurations.
  2. Select Edit > Create Scan Configuration .
    The Properties dialog box opens on the screen.
  3. Enter the name of the object under which it is known in BMC Client Management. The name can be of any combination of characters. 
  4. Enter notes if any.
  5. Click OK to add it and close the window.

To manage active protocols

Asset discovery supports the following protocols:

  • Windows: Server Message Block - (SMB)
  • Linux/Unix: Secure Socket Shell (SSH)
  • Network devices: Simple Network Management Protocol (SNMP)
  • VMwave Vsphere
  • Hyper-V

The Active Protocols tab allows you to configure the parameters for the protocols used by the scan. It allows you to define the following settings:




The fields in this column display the list of protocols available for scanning.


The symbol in these fields indicate if the respective protocol is defined for scanning or not.


This field displays the long name of the protocol abbreviation.

User Account

These fields display if user authentication is not required for the scanning of this protocol and the number of user accounts/communities entered as authentication for the respective protocol.

To configure the credentials required for authentication, perform the following steps:

  1. Press F2 or double-click the protocol for which you want to add the credentials.
  2. In the Active Protocol Window, select a protocol.
  3. In the Credentials section, click .
  4. In the Add a Credential window, perform one of the following steps:
  5. Click OK.


If a Linux device is configured as a scanner, it cannot discover, test or probe windows devices that run Hyper-V. Only a Windows scanner can discover devices running Hyper-V.

Was this page helpful? Yes No Submitting... Thank you