Where to go from here

The following topics contain information on more advanced configuration options:

  • To use start anywhere application modeling, a quick and easy approach to application modeling, which enables you to choose any entry points into an application, and begin modeling from there.
  • To avoid exposing credentials in the information about discovered processes (for example, the command used to launch the process), learn how to mask sensitive data.
  • To examine or modify discovery commands, follow the guidelines provided in Managing the discovery platform scripts.
  • Some commands return more information when they are launched with the superuser credentials. You can authorize log on with the privileged credentials for such commands by adding privileged execution to the related discovery script.
  • To enable custom port scanning for OS fingerprinting, follow the guidelines here.
  • To improve discovery you can monitor the success rate of the credentials, troubleshoot access issues, and see discovery conditions for information on potential access issues.

  • To simulate a discovery of a system that is unreachable for the BMC Discovery machine, you can use manual scanning using the discovery scripts. For Windows systems, you can use the Standalone Windows scanning tool.
  • To enrich the discovered data with the information available in external databases, see Integration points.
  • To enable centralized management and decentralized discovery in firewalled environments and restricted networks, use Consolidation.

  • To allow BMC Discovery connect with the required level of access to the discovered systems in your network, see
    Configuring credentials.
  • To learn about the ports and protocols BMC Discovery uses to scan your IT environment, see Discovery communications.

Was this page helpful? Yes No Submitting... Thank you

Comments