Standalone Windows scanning tool
This functionality does not permit interactive running of patterns to gather the full depth of data that a Windows proxy or Outpost provides; however, it enables BMC Discovery to contain data about hosts that would otherwise be unreachable and to synchronize this information to BMC CMDB. After the tool is run on the target host, the collected data must be manually uploaded to BMC Discovery.
The standalone Windows scanning tool is only supported on 64-bit versions of Windows.
Accessing and downloading the tool
The Windows scanning tool is a .zip archive file that can be extracted onto the target system or onto some form of removable storage (such as a USB drive). The .zip archive file contains everything you need to scan the Windows system; no connection to BMC Discovery is required.
To access and download the file:
- From the main menu, select Manage > Discovery Tools.
- In the Standalone Windows Scanner section, click Download the Standalone Windows Scanner archive to download a .zip file.
- Extract the .zip file to a directory on a writable a USB flash drive or similar removable media.
Supported platforms
The standalone Windows scanning tool is supported on the following 64 bit versions of Windows:
- Windows Server 2022
- Windows Server 2019 version 1809
- Windows Server 2016 version 1607
- Windows Server 2012 R2 version 6.3
- Windows 10 x64 version 1909
- Windows 7 x64 SP1 version 6.1
- Windows Server 2012 version 6.2 *
- Windows Server 2008 R2 SP1 x64 version 6.1 *
- Windows Server 2008 SP2 x64 version 6.0 *
- Windows 8.1 x64 version 6.3 *
- Windows 8 x64 version 6.2 *
In testing, the starred * versions required the Microsoft Visual C++ 2015 run-time DLLs to be installed.
Using the tool
The standalone Windows scanning tool runs as a portable console application directly from an external flash drive.
To use the tool:
- Insert the USB flash drive into the host system and explore the contents.
- If necessary, change the command options.
For example, it is recommended that you select a target IP address, if known, to avoid the possibility of overlapping IP addresses. Double-click the tw_windows_scanner.exe file.
A command window opens, and the tool begins collecting data.
The following example output lists the informational messages the tool displays during data collection:U:> tw_windows_scanner
Output file is results\192.168.1.1.scan
Collecting Host Information ... DONE
Collecting Interface Information ... DONE
Collecting Process Information ... DONE
Collecting Service Information ... DONE
Collecting File System Information ... DONE
Collecting Package Information ... DONE
Changing the command options
By default, the scan files are named based on the IP address of the Windows system (the lowest selected by the tool, after it ignores the localhost 127.0.0.1 address). The system does not overwrite existing scan files unless you change the options shown in the following table.
Changing the IP address to be scanned
In certain cases, the IP address of the Windows system (the lowest selected by the tool, after it ignores the localhost 127.0.0.1 address) might not be correct (for example, a VPN connection). Although these occurrences are uncommon, the tool will display an error message and exit. To help prevent these occurrences, it might be necessary to explicitly specify the IP address you want to use. To do so, run the tool and use the --target IPADDR option to set the target system.
It is also possible to scan other sytems using this option, as long as your user account has the required privileges (typically Administrator privileges). Setting the IP address to a specific target is especially useful for scanning an isolated subnet, because you would need only to insert the tool into one computer to collect data from all of them.
Uploading the data to the appliance
After you have collected the data, upload it to the appliance by using the SCP utility to transfer the files to the appliance as the upload user.
For more information about uploading scanner files to an appliance, see Loading a scanner file onto the appliance.
After the data is uploaded, it is processed by BMC Discovery. For more information about scanner files, see Standalone-UNIX-scanning.