Where to go from here
The following topics contain information about more advanced configuration options:
- To use start anywhere application modeling, a quick and easy approach to application modeling, which enables you to choose any entry points into an application, and begin modeling from there.
- To avoid exposing credentials in the information about discovered processes (for example, the command used to launch the process), learn how to mask sensitive data.
- To examine or modify discovery commands, follow the guidelines provided in Managing-the-discovery-platform-scripts.
- Some commands return more information when they are launched with the superuser credentials. You can authorize log-on with the privileged credentials for such commands by adding privileged execution to the related discovery script.
- To improve discovery you can monitor the success rate of the credentials, troubleshoot access issues, and see discovery conditions for information about potential access issues.
- To simulate the discovery of a system that is unreachable for the BMC Discovery machine, you can use manual scanning using the discovery scripts. For Windows systems, you can use the Standalone-Windows-scanning-tool.
- To enrich the discovered data with the information available in external databases, see Discovering-content-from-databases.
- To enable centralized management and decentralized discovery in firewalled environments and restricted networks, use Consolidation.
- To allow BMC Discovery connect with the required level of access to the discovered systems in your network, see Configuring-credentials.
- To learn about the ports and protocols BMC Discovery uses to scan your IT environment, see Network-ports-used-for-discovery-communications.
- To explore how to create clusters from any BMC Discovery machine, see Creating-a-cluster. You can then discover clusters in your environment, or troubleshoot cluster issues.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*