Standalone Windows scanning tool
In certain applications, computer and server assets are located on systems that typically cannot be reached by the BMC Atrium Discovery appliance, either because of network security or because the systems are on an isolated network.
The standalone Windows scanning tool enables you to perform discovery on these standalone systems. It enables you to run BMC Atrium Discovery from a USB drive inserted into the target Windows host and to inventory all assets on that system. The tool gathers data from Windows computers that are not connected to a network, and creates scanner files with the discovered data.
The standalone Windows scanning tool compliments the equivalent UNIX scanner scripts.
This functionality does not permit interactive running of patterns to gather the full depth of data that a Windows proxy provides; however, it enables BMC Atrium Discovery to contain data about hosts that would otherwise be unreachable and to synchronize this information to BMC Atrium CMDB. After the tool is run on the target host, the collected data must be manually uploaded to the appliance.
The standalone Windows scanner can be used to manually collect a limited set of information from a Windows host. The scanner is designed to be used solely on isolated systems or networks. It is NOT equivalent to a Windows proxy, because it will only collect basic host, process and package information that can be obtained by WMI queries, not additional data such as NIC registry information (for NIC discovery).
Accessing and downloading the tool
The Windows scanning tool is a .zip archive file that can be extracted onto the target system or onto some form of removable storage (such as a USB drive). The .zip archive file contains everything you need to scan the Windows system; no connection to a BMC Atrium Discovery appliance is required.
To access and download the file:
- From the Discovery tab, click Tools.
- In the Standalone Windows Scanner area of the Discovery Tools page, click the Download link at the bottom of the page.
- Extract the .zip file to a directory on a writable a USB flash drive or similar removable media.
Using the tool
The standalone Windows scanning tool runs as a portable console application directly from an external flash drive.
To use the tool:
- Insert the USB flash drive into the host system and explore the contents.
- If necessary, change the command options. (For example, it is recommended that you select the target IP address, if known, to avoid the possibility of overlapping IPs).
Double-click the tw_windows_scanner.exe file.
A command window opens, and the tool begins collecting data.
The following example output illustrates what informational messages the tool displays during data collection:
Changing the command options
By default, the scan files are named based on the IP address of the Windows system (the lowest selected by the tool, after it ignores the localhost 127.0.0.1 address). The system will not overwrite existing scan files unless you change the options shown in the following table.
Sets the name of the scan file to results\XXX.scan. Scanner files are automatically named based on the host's first listed IP address. If you do not set the file name using this option, you might inadvertently generate the same result file from two computers.
Sets the IP address to be scanned. For more information, see Changing the IP address to be scanned.
Specifies to overwrite any existing scan file.
Specifies to not display informational messages
Specifies to alter the WMI timeout (the default is 2 minutes)
Changing the IP address to be scanned
In certain cases, the IP address of the Windows system (the lowest selected by the tool, after it ignores the localhost 127.0.0.1 address) might not be correct (for example, a VPN connection). Although these occurrences are uncommon, the tool will display an error message and exit. To help prevent these occurrences, it might be necessary to explicitly specify the IP address you want to use. To do so, run the tool and use the
--target IPADDR option to set the target system.
It is also possible to scan other sytems using this option, as long as your user account has the required privileges (which are typically Administrator privileges). Setting the IP address to a specific target is especially useful for scanning an isolated subnet, because you would only need to insert the tool into one computer to collect data from them all.
Uploading the data to the appliance
After you have collected the data, upload it to the appliance. To do this, you use the SCP utility to transfer the files to the appliance as the
upload user. For more information on uploading scanner files to an appliance, see Loading a scanner file onto the appliance.
After the data is uploaded, it is processed by BMC Atrium Discovery. For more information about scanner files, see Using scanner files.