Docs.bmc.com will undergo a brief maintenance outage 27 March 2025. The site will be unavailable for ten minutes starting at 7:30 AM CDT/6 PM IST.

  Space banner This version of the product is in limited support. However, the documentation is available for your convenience. You will not be able to leave comments.

Managing scan configurations


The scan configurations define the actual scanning parameters. Depending on your network features, these might vary considerably and you can select the most suitable to scan for your environment or system. Scan configuration folders are created as organizational containers for the different scan configurations. They can contain any number of scan configurations for the execution of asset discovery scans of your system.

To create a scan configuration

To create a new scan configuration, proceed as follows:

  1. Go to Asset Discovery > Configuration > Scan Configurations.
  2. Select Edit > Create Scan Configurationscanconfig_create.png .
    The Properties dialog box opens on the screen.
  3. Enter the name of the object under which it is known in BMC Client Management. The name can be of any combination of characters. 
  4. Enter notes if any.
  5. Click OK to add it and close the window.

To manage active protocols

Asset discovery supports the following protocols:

  • Windows: Server Message Block - (SMB)
  • Linux/Unix: Secure Socket Shell (SSH)
  • Network devices: Simple Network Management Protocol (SNMP)
  • VMwave Vsphere
  • Hyper-V

The Active Protocols tab allows you to configure the parameters for the protocols used by the scan. It allows you to define the following settings:

Parameter

Description

Name

The fields in this column display the list of protocols available for scanning.

Activated

The symbol in these fields indicate if the respective protocol is defined for scanning or not.

Description

This field displays the long name of the protocol abbreviation.

User Account

These fields display if user authentication is not required for the scanning of this protocol and the number of user accounts/communities entered as authentication for the respective protocol.

To configure the credentials required for authentication, perform the following steps:

  1. Press F2 or double-click the protocol for which you want to add the credentials.
  2. In the Active Protocol Window, select a protocol.
  3. In the Credentials section, click image2018-9-27_13-49-44.png.
  4. In the Add a Credential window, perform one of the following steps:
  5. Click OK.

Note

If a Linux device is configured as a scanner, it cannot discover, test or probe windows devices that run Hyper-V. Only a Windows scanner can discover devices running Hyper-V.