PDFs and videos
This topic describes and links to the ready-made PDF of this space. If the ready-made PDF of this space does not satisfy your requirements, you can export a custom PDF.
Topic | Duration (in minutes) | Description |
---|---|---|
BMC Helix Discovery videos | ||
Overview of BMC Discovery Outpost | 02:17 | |
Integrating BMC Helix Discovery with One Identity Safeguard for Privileged Passwords | 07:54 | |
Resynchronizing a CMDB connection | 05:17 | This video explains the options available for resynchronizing a CMDB connection and how to resume an interrupted sync. |
How to handle unsupported network devices | 04:00 | This video explains how you can handle unsupported network devices. |
Resolving missing attributes in a SoftwareInstance node | 04:17 | This video explains what you can do when an SI attribute is missing. |
How to discover unsupported devices | 04:58 | This video explains how to find if a device is fully supported and how to use SNMP Recognition Rules to discover an unsupported device. |
How to use BMC Discovery Outpost | 06:23 | This video explains the usage of the BMC Discovery Outpost. |
Webinar: Discovery Patterns—TPL for Beginners | 1:05:03 | This webinar video explains TPL details for beginners. |
How to monitor credential usage in BMC Helix Discovery | 03:19 | This video describes how to run a BMC Helix Discovery query to see which hosts or devices were scanned using a specific credential. |
How to set up Extended Database discovery | 03:48 | This video explains how you can set up Extended Database discovery. |
How to troubleshoot missing attributes for Linux hosts in BMC Helix Discovery | 06:26 | This video explains how to scan a Linux host, view the discovered data, and find the missing attributes. |
How to configure Storage Discovery | 02:39 | This video explains how to configure Storage Discovery, which includes credential creation and discovery scan of the storage system. |
How to integrate BMC Helix Discovery with CyberArk Vault using REST API | 03:57 | This video explains how you can integrate BMC Helix Discovery with CyberArk Vault using REST API. |
How host aging works in BMC Helix Discovery | 03:34 | This video explains how the device aging works, such as checking the age count of a device, how a device can be forced to age out, and so on. |
How to improve scan results | 02:04 | This video helps you write custom graphs, reports, and channels and add them to the Discovery dashboard. |
How to integrate BMC Helix Discovery with Thycotic Secret Server | 04:57 | This video helps you understand how to integrate Thycotic Secret Server with BMC Helix Discovery. |
Integrating with HashiCorp Vault | 04:19 | This video helps you understand how to integrate HashiCorp Vault with BMC Helix Discovery. |
How to integrate BMC Helix Discovery with Centrify Identity Platform | 03:06 | This video explains the procedure for integrating BMC Helix Discovery with the credential broker, Centrify Identity Platform. |
How to use the DiscoveryAccess page to troubleshoot scan failures | 02:04 | This video explains how you can use the DiscoveryAccess page information to troubleshoot the scan failures for endpoints. |
Discovering Windows hosts with PowerShell | 03:39 | This video explains how to discover Windows hosts by using PowerShell. |
End-to-end process for your first BMC Helix Discovery scan | 5:58 | This video explains how to download and install a BMC Discovery Outpost, register the Outpost with the service, and the service with the Outpost, add a credential, and scan and discover a host. |
Scanning your IT infrastructure in BMC Discovery and BMC Helix Discovery | 07:19 | This video explains how you can scan your IT infrastructure for endpoints in BMC Helix Discovery and BMC Discovery 20.08. You can learn how to perform snapshot and scheduled scans for IP addresses and cloud resources. |
Removing nodes and creating rules in visualizations | 03:25 | This video explains how you can remove nodes and create rules in visualizations. |
Managing related, removed, and suppressed nodes in visualizations | 02:15 | This video demonstrates how you can manage related, removed, and suppressed nodes in visualizations. |
A brief introduction to Start Anywhere Application Modeling (SAAM) | 02:42 | This video provides a brief introduction to Start Anywhere Application Modeling (SAAM). |
Troubleshooting Windows scan failures | 12:00 | This video explains how you can troubleshoot Windows WMI discovery failures. |