After a discovery run has completed, you can examine the results and look for potential hosts in the range that was scanned. You can access the scan results in several ways, such as from the Reports page.
- To show the reports that are available on the discovered data, click Discovery Reports.
The left side of the page shows the amount of information discovered in the credential-free scan, as shown in the following illustration.
- To show the discovery run details, click the 1 Discovery Run icon.
- To display the reports that are available on the Discovery run, click Reports.
- Click Possible Endpoint Host Devices (Detailed).
- Click the chart icon in the OS Class column heading.
- From the menu, click Pie Chart.
A chart displays the breakdown of the scan by OS class, as shown in the following illustration.
- Continue based on the dominant OS class. This enables you to model a larger proportion of your environment in the first instance, and then return to the other operating system class for more complete modeling.
- If UNIX is the predominant OS class in the scanned environment, you can continue scanning by entering credentials to gather more information. Ideally, these credentials are valid for a range of computers and have sufficient rights to run system-level commands to discover richer data. Adding a credential is the same whether you add it for UNIX systems or Windows systems accessed through a Credential Windows proxy. You do not need to add credentials for systems accessed through the Active Directory Windows proxy because it uses the permissions of the user it was installed as. For more information, see Configuring host login credentials.
- If Windows is the predominant OS class, you must download and install a BMC Atrium Discovery Windows proxy to perform Windows-specific discovery tasks. Go to Installing Windows discovery proxies.