This documentation supports the 21.3 (12.3) version of BMC Discovery.

Where to go from here


The following topics contain information about more advanced configuration options:

  • To use start anywhere application modeling, a quick and easy approach to application modeling, which enables you to choose any entry points into an application, and begin modeling from there.
  • To avoid exposing credentials in the information about discovered processes (for example, the command used to launch the process), learn how to mask sensitive data.
  • To examine or modify discovery commands, follow the guidelines provided in Managing-the-discovery-platform-scripts.
  • Some commands return more information when they are launched with the superuser credentials. You can authorize log-on with the privileged credentials for such commands by adding privileged execution to the related discovery script.
  • To improve discovery you can monitor the success rate of the credentials, troubleshoot access issues, and see discovery conditions for information about potential access issues.
  • To simulate the discovery of a system that is unreachable for the BMC Discovery machine, you can use manual scanning using the discovery scripts. For Windows systems, you can use the Standalone-Windows-scanning-tool.
  • To enrich the discovered data with the information available in external databases, see Discovering-content-from-databases.
  • To enable centralized management and decentralized discovery in firewalled environments and restricted networks, use Consolidation.


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*