BMC Discovery 11.3: Getting Started

Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

BMC Discovery 11.

3
Getting started

Date: 2018-03-14 12:54


URL: https://docs.bmc.com/docs/x/lJr5Lg
Contents

Key concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Discovering cloud services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Virtual Appliance with Agentless Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Data Provenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Exhaustive Pattern Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
BMC Discovery components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
The Community Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Configipedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Find a particular product, storage system, load balancer, or other network device . . . . . . . . . . . . . . . . . . . . . . . . 10
Solve your problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Community Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
What's next on Configipedia? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Active Directory Windows proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
application map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
blackout window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
BMC Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
bonding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Collaborative Application Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
command-line utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
consolidation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Credential Windows proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
data aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Data Integration Point (DIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
datastore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Directly Discovered Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
development appliance (on the customer site) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Discovery endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Discovery Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
External events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
functional component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Functional Component Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
inferencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

BMC Discovery 11.3 Page 2


logical host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Model rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
node ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
node kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
production hours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
provenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Reasoning Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
relationship link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
RemQuery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Rules Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
scanner file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
seed data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
session establishment duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Start anywhere application modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
taxonomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
total discovery duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
total duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
trigger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Windows proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
End-to-end process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Logging in to the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
To log on to the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
First steps in securing BMC Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Performing an initial discovery run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
To start discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Installing the Windows proxy manager and proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Examining scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Rescanning with credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Destroying hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Performing a cloud discovery run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Run a cloud scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Examine results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Scan the hosts running the VMs in the cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Excluding ranges from discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
To add an Exclude Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

BMC Discovery 11.3 Page 3


To edit an existing exclude range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
To enable or disable an exclude range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Scheduling discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Next steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Enabling other users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
To enable other users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

BMC Discovery 11.3 Page 4


The Getting Started topics are intended for anyone who is starting to evaluate, use, or deploy BMC Discovery, including
the BMC Discovery Community Edition. This section covers BMC Discovery planning, installation and configuration,
guides you through core procedures for getting quick results from your discovery process, and suggests the next steps
you might take to improve your discovery results.

Goal Related Benefit


information

Learn the basics of the Key concepts Understand key concepts and core functionality so that you can begin using BMC Discovery right away.
BMC Discovery product. (see page 5)

Start using BMC End-to-end Run your first basic discovery without credentials, examine the results, and configure credentials for
Discovery. process (see page complete discovery. Schedule discovery runs and prevent discovery of specified IP addresses or ranges.
16)

Learn more about the Next steps Learn about the way that you can further enhance the discovery of your IT infrastructure and business
capabilities of BMC applications such as patterns and TKUs, deep database discovery, and Collaborative Application Mapping.
Discovery.

Key concepts
This section contains the following information important to understanding BMC Discovery:

Process overview (see page 5)

Configipedia (see page 9)

Glossary (see page 11)

Process overview
BMC Discovery is a data center discovery solution that automatically discovers data center inventory, configuration and
relationship data, and maps applications to the IT infrastructure. BMC Discovery establishes the foundation for improving
IT processes and productivity by providing timely and actionable insight to make informed decisions in IT service
management, asset management and infrastructure/operations management. Benefits include reducing the number of
incidents caused by change, reducing the time taken to isolate the root cause, reducing the time taken to prepare for
audits, preventing audit penalties, prioritizing incidents based on business impact, and optimizing data center hardware
and software.

Find It – Guarantee data accuracy and reduce costs to collect data center inventory, configuration and
relationship data via an automated discovery process.

Manage It – Leverage rich data to improve IT processes and productivity by replacing guesswork with data-driven
decisions.

Optimize It – Add business context to IT management processes by understanding how the data center
infrastructure supports business applications.

The following topics are provided in this section:

Discovering cloud services (see page 6)

Virtual Appliance with Agentless Discovery (see page 6)

Data Provenance (see page 6)

BMC Discovery 11.3 Page 5


Exhaustive Pattern Library (see page 6)

Related topics (see page 6)

Discovering cloud services


BMC Discovery provides cloud scanning capabilities creating a dynamic, holistic view of data center infrastructure, cloud
services, and their relationships. This gives visibility into how multi-cloud environments enable the digital business.

BMC Discovery can discover multi-cloud environments thanks to BMC’s partnership with both Microsoft Azure and
Amazon Web Services (AWS). BMC Discovery takes an agnostic approach to representing the multi-cloud assets and
relationships. It can map assets and their dependencies to represent data center, public cloud, and private cloud
environments. BMC performs this deep discovery in a cloud-friendly manner, leveraging APIs and agentless protocols.
This allows for a holistic view of the entire IT environment, including hybrid application deployments.

Virtual Appliance with Agentless Discovery


BMC Discovery is available as a ready-to run appliance. Because no installation of the product is required, the
deployment takes place within minutes. Additionally, no external database and operating system is required to be
installed and configured. This allows you to get operational with the product very quickly. With an agentless approach
there is no software to roll out to servers. Therefore, it is the best solution that achieves a balance between discovery
depth, impact to the infrastructure, and administration overhead.

Data Provenance
Data accuracy you can verify and trust. For an automated discovery tool to be trusted and accepted by the user
community, it must provide transparency into how the data was obtained. BMC Discovery’s Provenance feature shows
the actual command that was executed, the output of the command, and the timestamp when it happened. There’s no
searching through log files – all this information is available right in the UI.

Provenance provides indisputable evidence why this data can be trusted and thus speeds adoption of the data into IT
processes.

Exhaustive Pattern Library


The BMC Discovery library includes over 650 patterns for industry leading software such as Oracle, SAP, IBM, HP,
VMware, Hadoop, Citrix and more. New patterns are added monthly. With BMC Discovery, it’s easy to fine-tune and
extend the discovery process to meet the needs of your organization. Discover additional attributes, custom software,
uncommon SNMP devices and more. Simply modify a discovery pattern or use one of the supplied pattern templates. All
patterns are text-based and extending a pattern is as easy as modifying a script or batch file.

Related topics
Key concepts

Getting started

BMC Discovery components


BMC Discovery automatically discovers the hardware and software in your data center, determines configuration and
relationship data, and maps applications to the IT infrastructure.

The following list defines the components of BMC Discovery:

BMC Discovery 11.3 Page 6


Discovery Engine (see page 7)

Reasoning (see page 7)

Datastore (see page 7)

CMDB Synchronization (see page 7)

Start anywhere application modeling (see page 8)

Clustering (see page 8)

Related topics (see page 8)

Discovery Engine
Information about your organization's hardware and software is obtained by the Discovery Engine. The Engine uses
credentials, which are held in a secure encrypted vault, to log into target hosts using variety of methods, such as SSH,
Telnet, WMI and SNMP. Once logged in, the Discovery Engine executes commands, the results of which are returned and
stored in the datastore as directly discovered data (DDD). Windows discovery uses an external proxy running on a
dedicated windows server to log into and scan Windows hosts in the estate.

Reasoning
The Discovery Engine is supported by Reasoning which intelligently infers information about hosts and programs from
the DDD returned. The process of adding DDD to the datastore causes Reasoning to execute patterns against the DDD.
Each pattern represents knowledge about particular software or hardware and Reasoning uses this knowledge to create
more detailed "inferred" data. Inferred data is the representation of the scanned IT environment and is stored in the
datastore. The provenance of each item of inferred data is also stored meaning that when examining an inferred entity in
the UI, you can examine the information which was used to create it.

Patterns can be updated, either through monthly Technology Knowledge Update (TKU) releases, or by writing new
patterns using The Pattern Language (TPL).

Datastore
The datastore is the database in which the DDD and inferred data is stored. Data written to the datastore is instantly
indexed allowing you to search for items of interest using simple keywords in the UI. In addition to the DDD and inferred
data mentioned, the datastore holds TKU information, patterns, operational data and some configuration data.

The datastore uses a graph model meaning that it represents data as nodes connected to each other with relationships.
This is more suited to modeling the complex relationships in an IT environment than a relational database.

CMDB Synchronization
CMDB synchronization provides a means of keeping data in the BMC Atrium CMDB continuously synchronized with
information discovered by BMC Discovery. The BMC Discovery data model is different from the Common Data Model
(CDM) used in the CMDB, so the synchronization mechanism transforms the required information from one data model
to the other.

BMC Discovery 11.3 Page 7


Start anywhere application modeling
Start anywhere application modeling is a new approach to application modeling, which enables you to choose any entry
point, or points into an application, and begin modeling from there. For robust applications, logical entry points differ
depending on the view of the user. For example, an application owner might choose where the data is stored as the best
entry point, and a user of the application might choose the server to which they connect to access the application. The
start anywhere approach also prevents parts of applications from being missed if they are not currently connected to an
entry point, such as a URL, which may lead to a load balanced service or web server. You might also choose multiple
entry points to model the application.

You should start application modeling from anywhere that is interesting in the context of the application you are
modeling. The best way of doing this is the search box in the top right of the UI. Enter the name or other detail of
something you know to be in the application, and explore the data from there. When you see what you are looking for,
start modeling.

The models produced with start anywhere application modeling are simple to create and work on the basis of data that
has already been discovered from you network, data that is held in the BMC Discovery datastore. This does not mean
that the models are static, rather, they update automatically to reflect the current data. So, if you scan the application
and a new component of the application is discovered, it is automatically linked in to the existing components, and
reflected when you view the model again. If the new component is of a type that you have excluded from the model, it is
still in the datastore, but not included in the application model.

Clustering
Clustering, also known as Big Discovery, enables you to discover and get usable results from even the largest Data
Centers in the shortest time possible with the help of clusters. A cluster consists of two or more coordinated BMC
Discovery machines, one of which is in control of the group and is referred to as the coordinator. Additional machines
can be added to the cluster at any time. When you do so, the system spreads the existing data out amongst all the
machines evenly, in order to maximize performance and utilization of each machine in the cluster. This can take a while
to happen, but the system is fully usable while it happens: you can do discovery and browse the data.

You can configure clusters with fault tolerance meaning that if a machine fails, it can be removed and replaced, without
any consequent loss of data, and without interrupting normal operation. Managing your cluster has been made as simple
as possible. Use any machine in the cluster to manage all others: update TKUs, add credentials and scans, and even
upgrade the product itself from a single place. Regardless of data center size or complexity, BMC Discovery delivers a
refreshed view of your data center as often as needed. Clustering delivers powerful, actionable data center insight in the
shortest possible time:

Leverages new appliance clustering technology

No scanning limits – just add hardware

Transparent cluster management

Fault tolerance to manage hardware failures

Highly scalable end-user UI

Related topics
BMC Discovery

BMC Discovery 11.3 Page 8


Key concepts

The Community Edition


The Community Edition of BMC Discovery is a version of BMC Discovery which is available for download. The
community edition can be used to scan up to 100 devices in your production environment. When more than 100
inferred nodes have been created in the data store, you cannot create any new discovery runs and discovery is disabled.
This prevents any accidental breach of the license agreement.

You are periodically reminded of the terms of this agreement by a pop up dialog. The dialog can be dismissed by clicking
the Close button.

The dialog provides the following links:

Forums - opens the Community Forums.

Terms and Conditions - opens a page which shows the license terms of the Community Edition.

Additional limitations
In addition to the limitation on discovery, the following features are disabled:

Clustering

Multi-Appliance Consolidation

CMDB Synchronization

Integration SDKs

CSV and XML Export APIs

REST API

Productized Integrations

LDAP integration

Single Sign On

Mainframe discovery

Configipedia

Restricted access to Configipedia

Some information on Configipedia is accessible to BMC customers only. For a user to identify themselves as a
BMC customer, we require them to be a registered community member and to enter their BMC Support ID.

On restricted pages, BMC customers who fulfill the above criteria will see the full text of the page. Other users
will see a limited version of the page.

Configipedia™ Contains:

BMC Discovery 11.3 Page 9


999 pages relating to BMC Discovery Software Patterns that identify 982 products and 39,283 product configurations.
TKU & OS Upgrade Docs

See the Latest TKU and OS Upgrade documentation for the the latest Technology Knowledge Update (TKU), Extended

Data Pack, and Operating System (OS) Upgrade releases.

Find a particular product, storage system, load balancer, or other network device
Look for information about a particular product, publisher or pattern. Find out what BMC Discovery uses to find that
product and what information it can give you.

Check out the lists of supported network devices, printers, SNMP managed devices, storage systems and load balancers.

Read more...

Solve your problems


Got a specific problem that you need to solve? Look here for specific guidance on a wide range of issues.

Read more...

Community Knowledge
BMC Discovery is designed to be expanded. Go here to see how you can benefit from the knowledge of the wider BMC
Discovery community, and how you can add to that knowledge!

Read more...

What's next on Configipedia?


BMC Discovery and Configipedia cover more and more all the time thanks to the monthly TKU updates, these include
new products, network devices as well as updates to the Extended Data Pack. Go here to see what's new and what's on
the horizon!

Read more...

BMC Discovery 11.3 Page 10


Glossary

This section provides a glossary of terms.

Active Directory Windows proxy


A BMC Discovery application that runs on a customer-provided Windows host which is part of an Active Directory
domain or workgroup. The user that the discovery service runs as is configured after the Windows proxy is installed.
Where that user is configured on hosts in the domain, the Windows proxy can log in and run discovery commands. The
Active Directory Windows proxy does not use any credentials that are entered using the BMC Discovery user interface.

application map
A dynamic, automatically maintained representation of application structures in your environment. An effective
application map identifies the key relationships between how your business operates and the infrastructure that
supports it. It also becomes the initial, crucial part of Service Impact Analysis by maintaining accurate service models for
BSM.

blackout window
A configuration that enables you to prevent access to the CMDB during sensitive times. During a blackout window, all
processing of the CMDB synchronization queue is paused, and processing cannot resume until the window ends.

BMC Discovery
Automates the process of populating the BMC Atrium Configuration Management Database (BMC Atrium CMDB) by
exploring IT systems to identify hardware and software, and then creating configuration items (CIs) and relationships
from the discovered data.

bonding
Enables you to join two NICs as a single physical device so that they appear as one interface. This is usually performed to
provide failover capabilities or load balancing. Also known as teaming.

Collaborative Application Mapping


The process of investigating and understanding the applications in an estate, and creating the model that represents of
the application in the datastore.

command-line utility
A tool that you can run on a command-line interface to configure BMC Discovery by obtaining information from specific
systems.

component
A general term that is used to mean one part of something more complex. For example, a computer system might be a
component of an IT service, and an application might be a component in an application server.

consolidation
The playback of scanned data from multiple scanning appliances to a single consolidation appliance.

BMC Discovery 11.3 Page 11


Credential Windows proxy
A BMC Discovery application that runs on a customer-provided Windows host and uses credentials supplied by the BMC
Discovery appliance to perform Windows discovery.

data aging
Discovered data is regarded as valid at the time of its last successful scan. The nature of IT infrastructure means that
frequent, minor changes to configurations, hosts, and software are common. Consequently, discovered data can be
regarded as becoming less current with the passing of time. In BMC Discovery when data passes a certain configurable
aging threshold, it is destroyed.

Data Integration Point (DIP)


Code that handles communication with target systems. BMC Discovery connects to target systems in defined ways (such
as through JDBC drivers, a protocol, or specific credentials), and that connection is determined by the DIP.

datastore
All data used by the BMC Discovery system is held in an object database. The datastore treats data as a set of objects and
the relationships between them.

Directly Discovered Data


Data that the Discovery Engine has discovered that has been parsed but not processed. Although the information is not
yet classified or understood, it is stored in a structured form that can be queried and reported on, making it easy to
construct certain kinds of discovery reports and to develop new patterns.

development appliance (on the customer site)


The appliance on the customer site to test the custom patterns and other customer-specific configurations prior to
deploying changes to BMC Discovery on the production environment. The changes are deployed in the customer's
production environment only after verifying and confirming that the development appliance is stable and functions as
intended.

Discovery
The part of the BMC Discovery system that communicates with host systems, and obtains information from them.
Discovery is driven by Reasoning which infers detailed information about hosts and programs and populates the
datastore. See also Reasoning Engine.

Discovery endpoint
The endpoint of a single Discovery access, the IP address of the discovery target.

Discovery Run
A scan of one or more Discovery endpoints, specified as an IP address, address, or range of addresses that are scanned
as an entity. For each Discovery Run, a node is created that records information such as the user who started the run,
the start and end time, and so forth.

BMC Discovery 11.3 Page 12


event
A change or action that affects the discovery process, such as a software instance that was created or updated. In BMC
Discovery, the Rules Engine (ECA Engine) executes rules in response to events.

External events
An event received from an external system used to trigger a pattern.

functional component
A node created by patterns based on Functional Component Definitions. The functional component is a single block of
information that combines similar functionality into logical groups that help application owners and data consumers
discover applications at discovery time.

Functional Component Definition


The specification that is used to create a functional component. Functional Component Definitions (FCDs) help
application owners and data consumers define and develop application structures. The primary goal of an FCD is to help
provide tangible data to BMC Discovery during an iterative and collaborative application modeling process to build an
appropriate application model.

host
A node in the model which represents a physical or virtual computer system including information about its OS and its
physical or virtual hardware. A host is sometimes referred to as an OSI (Operating System Instance). See Glossary.

ID
A unique identifier for a node (also known as a node ID). For a BMC Discovery node, an internal identifier that is used as
an index by the database. It is a binary identifier represented in hexadecimal format. An ID is not intended to be human-
readable; it is designed to be used by the datastore (for example, 4e4fd2c2ae4ccf123272d8446e486f7374. It identifies a
stored node, not the item that the node represents. If the node corresponding to an entity is destroyed, and a new node
is subsequently created for it, the new node will have a different ID, but it will have the same key.

inferencing
The act of drawing conclusions about data based on what is known about other data.

key
A unique identifier for the entity that a node represents. Unlike the node ID, the key of a node is persistent.

kind
The type of a node, such as Host or Person. Also referred to as node kind.

lifecycle
The conditions that describe when an entity comes into existence to when it no longer exists. For nodes in the BMC
Discovery model, the lifecycle stages are:

Current — Describes nodes that exist in the model. BMC Discovery contains evidence that nodes currently exist
in your environment.

BMC Discovery 11.3 Page 13


Aging — Describes nodes that exist in your model; however, they represent entities that BMC Discovery has not
detected in a certain period of time, and has 'aged out' of the model. BMC Discovery does not always age entities
that it cannot identify over a period of time.

Destroyed — Describes nodes that have been marked as destroyed (yet remain in the model).

Purged — Describes destroyed nodes that have been purged from the model. Purging a node indicates that it no
longer exists in the model and it has been removed from the datastore.

logical host
A hardware or software host that is contained in a virtual machine (software), a collaborating host in a cluster
(hardware) or a blade in a blade server (hardware).

Model rule
Rules used in visualizations and Start anywhere application modeling.

node
An object in the BMC Discovery datastore that represents an entity in the environment. Nodes have a kind, such as
'Host', and a number of named attributes. Nodes can be connected to other nodes using relationships. Most node kinds
have a key that uniquely identifies the entity in the environment.

node ID
See ID (see page 13).

node kind
The type of a node, such as a Host or Software Instance. The default set of nodes and their associated attributes and
relationships are defined in the BMC Discovery taxonomy.

pattern
In BMC Discovery, the Pattern Language (TPL) creates and maintains the model. Each pattern in TPL has a
corresponding pattern node in the model, which is related to the nodes that the pattern maintains. Patterns are used to
extend the functionality of the reasoning engine.

production hours
The core business hours corresponding to a specific time zone. Typically, Discovery scans are scheduled at non-
production hours to avoid any potential impact on the BMC Discovery end users, or target critical systems when they are
the busiest, or schedule any CMDB synchronization black-out windows to avoid impacting the AR System and CMDB end
users.

provenance
Meta-information describing how inferred information came to exist. It is generated as Reasoning builds and maintains
the model. Provenance information is stored as relationships in the model.

Reasoning Engine
An event-based engine that orchestrates and drives the population of different parts of the data model through a series
of rules that make up the core functionality of the BMC Discovery product. It is extensible through the use of patterns.

BMC Discovery 11.3 Page 14


relationship
The way that objects are associated with each other. Relationships are non-directional, and are defined by the roles
represented by each object. They are stored in the datastore in the format Node:Role:RelationshipLink:Role:Node.

relationship link
The connection between two roles in a relationship.

RemQuery
A utility that enables you to execute commands on remote Windows hosts in a similar way to the commercial PsExec
utility.

When BMC Discovery requests a discovery action using the RemQuery utility, RemQuery copies a binary (itself) to the
ADMIN$ share on the target system, and then installs and runs that binary as a service. Each of these steps requires Local
Administrator permissions. The service is then used to execute the discovery scripts. At the end of the scan, the service
is stopped and uninstalled, but the executable is left in the ADMIN$ share. If a copy already exists, it is not copied again.

removal
The concept of taking data out of the model using one or more of the BMC Discovery lifecycle methodologies (Aging,
Destroyed or Purged).

role
The responsibility or actions of the relationship between two nodes. A node with a relationship to another node acts in a
role in the relationship, which indicates its part of the relationship. For example, in a 'Dependency' relationship, one node
has the role 'Dependant' and the other has the role 'DependedUpon'.

Rules Engine
Another term used to describe the Reasoning Engine. The Rules Engine processes the rules that are generated from
Patterns, in order to maintain the model. The Rules Engine is an Event Condition Action (ECA) engine.

rules
Small fragments of executable code that run in the Rules Engine in BMC Discovery. Rules are generated from patterns
when they are activated. Additional core rules are distributed with BMC Discovery.

scanner file
A scanner file is a plain text file that is used to simulate the discovery of a system that is unreachable, or one that you are
not permitted to scan. You create a scanner file by running the standard discovery commands on a host and saving the
output. Only the standard discovery commands are run on the host; information that is discovered by patterns is not
available.

seed data
In Collaborative Application Mapping, a small sample of host names that are involved in the application or component
names. The goal of finding seed data is to provide just a few pieces of information to the application owner (typically
communicated through e-mail or instant message) that are clues to help determine what to start investigating.

BMC Discovery 11.3 Page 15


session establishment duration
The time it takes to establish a session to log in to the host. See also Total Duration (see page 16) and Total Discovery
Duration (see page 16).

Start anywhere application modeling


Start anywhere application modeling is a new approach to application modelling, which enables you to choose any entry
point, or points into an application, and begin modeling from there. For robust applications, logical entry points differ
depending on the view of the user. For example, an application owner might choose where the data is stored as the best
entry point, and a user of the application might choose the server to which they connect to access the application. The
start anywhere approach also prevents parts of applications from being missed if they are not currently connected to an
entry point, such as a URL, which may lead to a load balanced service or web server. You might also choose multiple
entry points to model the application.

taxonomy
The template defining the nodes, attributes, and relationships used by BMC Discovery and stored in the datastore. The
BMC Discovery taxonomy also defines how much of the data model is represented in the user interface.

total discovery duration


The time it takes to establish a session and to run commands. See also Session Establishment Duration (see page 16)
and Total Duration (see page 16).

total duration
The time it takes to discover and process the data from the target (the duration between the start and end times). See
also Session Establishment Duration (see page 16) and Total Discovery Duration (see page 16).

trigger
The conditions under which a pattern executes. Triggers correspond to the creation, confirmation, modification, or
destruction of a node.

Windows proxy
A discovery proxy that is installed on a Windows system, on which the discovery process is controlled by a Linux-based
appliance (known as the master). See Active Directory Windows proxy (see page 11) and Credential Windows proxy
(see page 12).

End-to-end process
The end-to-end process for getting started with BMC Discovery is as follows:

Logging in to the system (see page 17)

First steps in securing BMC Discovery (see page 20)

Performing an initial discovery run (see page 21)

Installing the Windows proxy manager and proxies (see page 24)

BMC Discovery 11.3 Page 16


Examining scan results (see page 25)

Rescanning with credentials (see page 26)

Performing a cloud discovery run (see page 27)

Excluding ranges from discovery (see page 29)

Scheduling discovery (see page 32)

Enabling other users (see page 35)

Next steps

Logging in to the system


You must log in to BMC Discovery before you can use it to discover your IT infrastructure.

Before you begin


Before you start using BMC Discovery, your BMC Discovery Administrator will give you a user name and password and
the URL of the BMC Discovery system at your location. Your user account and password may be the same as you use
throughout your organization (single sign-on) or it may be specific to BMC Discovery.

The BMC Discovery appliance can be configured to use https rather than http. If you then specify a login URL which uses
http, you are automatically redirected to the https page. See HTTPS Configuration for more information.

BMC Discovery 11.3 Page 17


To log on to the system

1. Enter the BMC Discovery URL in your browser's address bar. It might look like the following example:

http://ip-address/

Where ip-address is the address of the virtual machine, which is displayed when you log in to the virtual
machine hosting the BMC Discovery using VMware console. If you received the login URL from your
administrator, it might have the host name instead of the IP address.
If your administrator has configured single sign on, you are redirected to the single sign on login page. After you
have successfully logged in, you are redirected back to the BMC Discovery UI.
If you are unable to log in to BMC Discovery using BMC Remedy SSO, use the local login URL to access the BMC
Discovery UI and log in as a local user.

http://ip-address/ui/LocalLogin

The BMC Discovery login screen is displayed.

2. Enter the username and password provided by your system administrator, or if this is the first time that anyone
has accessed the appliance, use the following default values:

User name: system

Password: system

3. If you are using the Community Edition, agree to the terms and conditions of the Community Edition license by
selecting the I accept the Terms and Conditions of use check box. To review the license, click the Terms and
Conditions link.

4. Click Login.

BMC Discovery 11.3 Page 18


5. If this is the first time that anyone has accessed the appliance, the Change Password for the System User screen
is displayed.

6. Change the system user password, to do this, complete the following fields:

Current password - enter the password you used to log in.

New password - enter your new password.

Verify password - enter your new password again to verify it.

7. Change the password for the command line user root. This can only be done if the default password has not
been changed. A message is displayed if the password has been changed

New password - enter the new root password.

Verify password - enter the new root password again to verify it.

8. Change the password for the command line user tideway. This can only be done if the default password has not
been changed. A message is displayed if the password has been changed

New password - enter the new tideway password.

Verify password - enter the new tideway password again to verify it.

9. It is strongly recommended that you secure the credential vault with a passphrase. If you choose not to, clear the
Set Passphrase checkbox. Otherwise:

New password - enter the new credential vault passphrase.

Verify password - enter the new credential vault passphrase again to verify it.

10. Click Apply to make the changes.

The main BMC Discovery home page displays (see Viewing the Home page).

BMC Discovery 11.3 Page 19


Password quality
By default, the UI password that you enter must have at least one lowercase letter, one uppercase letter, one numeric
character, and one special character. It must also contain a minimum of six characters. You can change this requirement
by configuring password policies. See Managing security policies in the BMC Discovery Configuration Guide.

By default, the command line passwords that you enter must have at least one lowercase letter, one uppercase letter,
one numeric character, and one special character. They must also contain a minimum of six characters, at least 4
characters must have been changed against the last password, and there must be no more than three repeated
characters.

Related topics
End to end process

Managing security policies

Viewing home page

HTTPS configuration

First steps in securing BMC Discovery


Once you have installed and logged into the BMC Discovery UI, you can make some initial configuration changes to
improve the security of the system. If you have sufficient permissions to configure security settings, for example you are
logged in as the system user, a Securing Your Appliance checklist is provided on the Home page default dashboard.

BMC Discovery 11.3 Page 20


When you first log into the UI, you are required to change the system user password and the passwords for the tideway
and root command line users. These checklist items are shown as changed. The additional steps you should consider are
enabling HTTPS access to the UI and redirecting HTTP access requests to HTTPS. Once you have configured these, the
checklist updates (you may need to use CTRL+F5 to force refresh) and you are provided with a Dismiss button which you
can click to remove the checklist from the dashboard.

The BMC Discovery appliance is designed and built with security in mind; a description of the security considerations and
the types of measure taken are described in the Security section.

Related topics
Enabling HTTPS

End to end process

Security

Performing an initial discovery run


This section provides guidelines for an initial snapshot discovery without credentials. This produces a list of potential
hosts that can be discovered.

The following topics are covered in this section:

Before you begin (see page 22)

BMC Discovery 11.3 Page 21


To start discovery (see page 22)

Related topics (see page 24)

Before you begin


Ensure you have the list of IP addresses in your network to scan, as well as IP addresses that should not be scanned and
discovered for any reason.

To start discovery

1. Log in into BMC Discovery as the discovery user.

2. Click Manage > Discovery in the menu bar.


The Discovery status page is displayed.

3. On the discovery page, click Add New Run.

4. Ensure that the Snapshot is selected.

5. Select IP Address. You can also perform a cloud scan here by selecting the Cloud option, though you must have
configured cloud credentials and enabled cloud discovery.

BMC Discovery 11.3 Page 22


6. Enter the IP address information in one of the following formats:
• IPv4 address (for example 192.168.1.100). Labelled v4.
• IPv6 address (for example 2001:500:100:1187:203:baff:fe44:91a0). Labelled v6.
• IPv4 range (for example 192.168.1.100-105, 192.168.1.100/24, or 192.168.1.*). Labelled v4.

Note

Scanning the following address types is not supported:


• IPv6 link local addresses (prefix fe80::/64)
• IPv6 multicast addresses (prefix ff00::/8)
• IPv6 network prefix (for example fda8:7554:2721:a8b3::/64)
• IPv4 multicast addresses (224.0.0.0 to 239.255.255.255)

As you enter text, the UI divides it into pills, discrete editable units, when you enter a space or a comma.
According to the text entered, the pill is formatted to represent one of the previous types or presented as
invalid.

Invalid pills are labeled with a question mark. You can also paste a list of IP addresses or ranges into this
field. If any pills are invalid, a message stating the number of invalid pills is displayed above the range field.
Clicking the link applies a filter which shows only invalid pills which you can then edit or delete. The filter
can be removed by clicking clear in the Showing n of n label below the Range field. There is no paste
option on the context sensitive (right click) menu.

Warning: You cannot paste a comma-separated list of IP address information into the Range field in
Firefox. This can crash the browser. You can use a space separated list without any problems.
• To edit a pill, click the pill body and edit the text.
• To delete a pill, click the X icon to the right of the pill, or click to edit and delete all of the text.
• To view the unformatted source text, click the source toggle switch. The source view is useful for
copying to a text editor or spreadsheet. Click the source toggle switch again to see the formatted pill

view.

Underneath the entry field is a filter box. Enter text in the filter box to only show matching pills.

Pills are not currently supported in Opera.

7. Select Sweep Scan level for the discovery run. In sweep scan mode, the discovery is trying to determine what is
at each endpoint in the scan range.

8. Enter a label for the discovery run. Where the discovery run is referred to in the UI, it is this label that is shown.

9. For multitenant deployments, select the company name to assign to the discovery run. This drop-down list is
only displayed if multitenancy has been set up. If (No company) is displayed, or a company name that you were
expecting is missing, refresh the list by clicking Lookup Companies on the CMDB Sync. See multitenancy for more
information about this feature.

BMC Discovery 11.3 Page 23


10. Click OK.
The Currently Processing Runs tab is displayed with the new discovery run.

11. If discovery is running, the scan will start immediately.


If the scans are stopped and you see the Discovery is Stopped message, you can enable discovery by clicking
START ALL SCANS.
The screen is automatically refreshed to show the status of the discovery process. When the scan is complete,
you can find the discovery scan details and results on the Recent Runs tab.

Next steps

See Examining scan results (see page 25).

Related topics
End to end process

System login

Installing the Windows proxy manager and proxies


To discover Windows hosts, BMC Discovery uses one or more Windows proxies. After the BMC Discovery appliance
decides that a discovery target is running a Microsoft Windows operating system, it uses a proxy to interrogate the
target. Often, the proxy is also responsible for providing authentication and authorization of discovery activities.

There are two types of proxy:

Active Directory proxy—Runs as an Active Directory user, and uses those user credentials to connect to
Windows hosts within the Active Directory domain. Credentials are not stored in the BMC Discovery credential
vault.

Credential proxy—Runs as a local administrator user. Credentials are stored in the BMC Discovery credential
vault and are provided to the proxy as required.

A single Windows host may run both types of proxy. To handle complex Active Directory environments, it is possible to
run multiple Active Directory proxies as different users. The Active Directory proxy can also be used in a legacy Windows
Workgroup environment to connect to workgroup members using the proxy's workgroup credentials.

The BMC Discovery Proxy Manager (Proxy Manager) is used to manage the running proxies and their configuration, and
to establish secure connections with approved BMC Discovery appliances. Installation of the Proxy Manager and
Windows proxies is described in Adding Windows proxies.

BMC Discovery 11.3 Page 24


Examining scan results
After a discovery run has completed, you can examine the results and look for potential hosts in the range that was
scanned. You can access the scan results in several ways, such as from the Reports page.

1. To show the reports that are available on the discovered data, click Explore > Reports.

2. To view the Possible Host Endpoints, click Possible Host Endpoints from the Discovery Diagnostics section.

3. Click the chart icon in the OS Class column heading.

BMC Discovery 11.3 Page 25


4. From the menu, click Pie Chart.
A chart displays the breakdown of the scan by OS class, as shown in the following illustration.

5. Continue based on the dominant OS class. This enables you to model a larger proportion of your environment in
the first instance, and then return to the other OS class for more complete modeling.

If UNIX is the predominant OS class in the scanned environment, you can continue scanning by entering
credentials to gather more information. Ideally, these credentials are valid for a range of computers and
have sufficient rights to run system-level commands to discover richer data. Adding a credential is the
same whether you add it for UNIX systems or Windows systems accessed through a Credential Windows
proxy. You do not need to add credentials for systems accessed through the Active Directory Windows
proxy because it uses the permissions of the user it was installed as. For more information, see Adding
device credentials.

6. If Windows is the predominant OS class, you must download and install a BMC Discovery Windows proxy to
perform Windows-specific discovery tasks. Go to Installing the Windows proxy manager and proxies (see page
24).

Related topics
End to end process

Performing an initial run (see page 21)

Rescanning with credentials


After you have added credentials, you can run the first scan again.

1. Click Manage > Discovery to go to the Discovery page.

2. Select the Recent Runs tab.

BMC Discovery 11.3 Page 26


3. For the first test scan, click Rescan Now.
The same scan runs again, with login credentials for the IP addresses. You can now view the results of the scan
and look for details of hosts in the range that you have scanned.

4. Click Explore > Data to display the reports that are available on the discovered data.
Comparing the results to the Discovery reports page after the credential free scan (see page 25), you can see
that significantly more information was obtained on the later scan.
Now you can examine the hosts that BMC Discovery has discovered.

5. For finding the list of hosts, Click Explore > Data.

6. Click the Hosts icon to display a list of discovered hosts.

7. Click on a host to view it.


You have now successfully scanned the network segment with and without credentials and have viewed a
discovered host.

Destroying hosts
If you have reached the maximum number of devices (60) permitted in the Community Edition of BMC Discovery,
discovery stops and you cannot start any new discovery runs. Ideally, you should only target discovery runs at the devices
that you are interested in scanning.

If you need to carry out further work and scan additional hosts, you must destroy some existing ones so that you can
start discovery again.

1. Click Explore > Data .

2. Click the Hosts icon to display a list of discovered hosts.

3. Select the hosts that you want to destroy by clicking the selection box at the left of the host row. You can select
multiple hosts. You can also select all hosts by clicking the selection box at the left of the heading row.

4. Click Destroy.

5. Click OK to destroy the hosts, or click Cancel to return to the hosts page without destroying any hosts.

Performing a cloud discovery run


Before you can perform a cloud discovery run, you must:

1. Create a credential or access key in the tool you use to access the cloud provider. For Amazon Web Services
(AWS), this is the AWS Identity and Access Management (IAM) console.

2. Create a cloud credential in BMC Discovery using the credential or access key you just created.

3. Test the credential.

These steps are described in greater detail in Discovering Amazon Web Services. The following procedure describes
performing the cloud discovery run once you have configured ad tested your credentials.

BMC Discovery 11.3 Page 27


Run a cloud scan
To perform cloud discovery, from the Discovery Status page, use the Add New run control.

1. Click Add New run.


The Add a Cloud Run dialog is displayed.

2. Enter a Label for the cloud discovery run.

3. To add a scheduled cloud run, select Scheduled and fill in the scheduling information as with normal scheduled
discovery runs.

4. Select Cloud.

5. Select the provider from the drop-down list. Select Amazon Web Services

6. Select the appropriate cloud credential. If none are available, you must add one.

7. Select the region to scan, for example, for Amazon Web Services, US East (N. Virginia). You can also select all
regions by clicking the All button.

8. Click OK.

Examine results
Once you have scanned, you can examine the results. The screen below shows a discovered VM running in AWS.

BMC Discovery 11.3 Page 28


Scan the hosts running the VMs in the cloud
Perform a normal scan on the hosts running the VMs discovered in the cloud scan. Use the Unscanned Cloud Hosts
report on the Cloud Overview dashboard to find these.

Scanning the hosts assumes that the appliance or proxy has network access to hosts running in the cloud, for example,
using a VPN.

Public IP addresses do not respond to ICMP pings. You must disable "Ping before scanning", otherwise all
scans are dropped reporting no response.

Excluding ranges from discovery


Your network might have some IP devices that you never want to be scanned, or that you want to exclude from a scan at
a scheduled time. For example, you might have some legacy applications that will run only on old hardware and might be
regarded as fragile. You can add such a device as a single IP exclude, or as an exclude range.

To add an Exclude Range (see page 29)

To edit an existing exclude range (see page 31)

To enable or disable an exclude range (see page 32)

Related topics (see page 32)

To add an Exclude Range


You can add the following types of exclude ranges:

BMC Discovery 11.3 Page 29


Permanent

Scheduled

To add a permanent exclude range

1. From the main menu , select Manage > Discovery .


The Discovery page opens .

2. Click Add New Exclude.

3. Enter the information for the exclude range in the fields, using the following table as a guide.
Field name Details

Range Enter IP address information in one of the following formats:


• IPv4 address (for example 192.168.1.100). Labelled v4.
• IPv6 address (for example 2001:500:100:1187:203:baff:fe44:91a0). Labelled v6.
• IPv4 range (for example 192.168.1.100-105, 192.168.1.100/24, or 192.168.1.*). Labelled v4.
As you enter text, the UI divides it into pills (discrete editable units) when you enter a space or a comma. According to the text
entered, the pill is formatted to represent one of the previous types or presented as invalid.
Pills are not supported in Opera.

Label Enter a label for the discovery run. Where the discovery run is referred to in the UI, this label is shown.

Description A free-text description of the exclude range.

4. Click OK.
The Excluded Ranges tab is displayed with the new exclusion.

To add a scheduled exclude range

1. From the main menu , select Manage > Discovery .


The Discovery page opens .

2. Click Add New Exclude.

BMC Discovery 11.3 Page 30


3. Enter the information for the exclude range in the fields, using the following table as a guideField name
  Details

Range Enter IP address information in one of the following formats:


• IPv4 address (for example 192.168.1.100). Labelled v4.
• IPv6 address (for example 2001:500:100:1187:203:baff:fe44:91a0). Labelled v6.
• IPv4 range (for example 192.168.1.100-105, 192.168.1.100/24, or 192.168.1.*). Labelled v4.

Large scheduled exclude ranges

If you specify a scheduled exclude range that blocks 65535 IP addresses or more of a scan range, new IP addresses from
that scan are not added to the scan queue until at least one of the blocked IP addresses is allowed to scan.

As you enter text, the UI divides it into pills (discrete editable units) when you enter a space or a comma. According to the text
entered, the pill is formatted to represent one of the previous types or presented as invalid.
Pills are not supported in Opera.

Label Enter a label for the discovery run. Where the discovery run is referred to in the UI, this label is shown.

Description A free-text description of the exclude range.

Frequency Add text.

Start Based on the selected frequency of the scheduled exclude, you are presented with the following start options:
• Weekly by days of week—You are provided with buttons for each day and drop-down menus for the start time in hours and
minutes. You can select one or more days from the day buttons.
• Once per week—You are provided with drop-down menus to select the day of the week and the start time in hours and minutes.
• Monthly by day of month—You are provided with drop-down menus to select the day of the month and the start time in hours and
minutes.
• Monthly by week of month—You are provided with drop-down menus to the select the week, the day of the week, and the start
time in hours and minutes.

For example, to start a scheduled weekly exclude which starts on Friday at 19:30 hrs and continues until Saturday, do the following:

a. Select the exclude frequency as Weekly by days of week.

b. Click the F and S day buttons.

c. From the time drop-down menu, select 19 hours and 30 minutes.

End Based on the selected frequency of the scheduled exclude, you are presented with the following end options:
• Weekly by days of week—You are provided with the drop-down menus to select the end time in hours and minutes.
• Once per week—You are provided with the drop-down menus to select the day of the week and time to end a scheduled exclude.
• Monthly by day of month—You are provided with menus to select the day of the month and time to end a scheduled exclude.
• Monthly by week of month—You are provided with the drop-down menus to the select the number of days and the time within
which a scheduled exclude must end.

For example, to end a scheduled weekly exclude which starts on Friday at 19:30 hrs and continues until 21 hours 30 minutes on
Saturday (see the example for the Start field in the previous row), you will select 21 hours and 30 minutes from the time drop-down
menu.

To edit an existing exclude range


You can edit an existing exclude range. If the exclude range is currently in progress, it is automatically canceled when you
edit it.

BMC Discovery 11.3 Page 31


1. From the Exclude Ranges tab of the Discovery Status page, click the exclude range that you want to edit.
All of the fields are editable.

2. Make the required changes and click OK.

To enable or disable an exclude range


You can enable or disable an existing exclude range, whether it is permanent or scheduled.

From the Exclude Ranges tab of the Discovery Status page, select individual, multiple, or all exclude ranges to enable or
disable. If the exclude range is in progress, it is canceled if you make and apply any changes.

Related topics
Performing a discovery run

Stalled discovery runs

Scheduling discovery
You can choose times and frequencies for performing discovery, whether the discovery is for normal or cloud scans. The
cloud scan is different from other scan types as it simply retrieves information from the cloud provider API. To schedule
a discovery run, perform the following steps:

1. On the discovery page, click Add New Run.

2. Select Scheduled.
The dialog displays Frequency, Targeting, Ping, Start, and End menus.

3. Click OK.
The Scheduled Runs tab is displayed with the new scheduled discovery run.

To add another scan to the page, click Add New Run.


To delete any existing scheduled scans, select the entry and click Delete.

The table below describes explanation of all the fields that are required either for normal scan or cloud scan:

Field name Details

Label Enter a label for the discovery run. Where the discovery run is referred to in the UI, it is this label that is shown.

Timing Select the timing for the discovery run. This is either:

Snapshot — Enter information for scan to occur in a snapshot view.

Scheduled — Enter information for the scan to occur at any time and for a specified amount of time .

Targeting Select the target for the discovery run. This is either:

IP Address — Enter IP address information.

Cloud — Enter cloud provider information.

BMC Discovery 11.3 Page 32


Field name Details

Range Enter IP address information in one of the following formats:


• IPv4 address (for example 192.168.1.100). Labelled v4.
• IPv6 address (for example 2001:500:100:1187:203:baff:fe44:91a0). Labelled v6.
• IPv4 range (for example 192.168.1.100-105, 192.168.1.100/24, or 192.168.1.*). Labelled v4.

Note

Scanning the following address types is not supported:


• IPv6 link local addresses (prefix fe80::/64)
• IPv6 multicast addresses (prefix ff00::/8)
• IPv6 network prefix (for example fda8:7554:2721:a8b3::/64)
• IPv4 multicast addresses (224.0.0.0 to 239.255.255.255)

As you enter text, the UI divides it into pills, discrete editable units, when you enter a space or a comma. According to the text entered, the pill is
formatted to represent one of the previous types or presented as invalid.

For more information, see here.

Invalid pills are labeled with a question mark. You can also paste a list of IP addresses or ranges into this field. If any pills are invalid, a message
stating the number of invalid pills is displayed above the range field. Clicking the link applies a filter which shows only invalid pills which you can
then edit or delete. The filter can be removed by clicking clear in the Showing n of n label below the Range field. There is no paste option on the
context sensitive (right click) menu.
Warning: You cannot paste a comma-separated list of IP address information into the Range field in Firefox. This can crash the browser. You can
use a space separated list without any problems.
• To edit a pill, click the pill body and edit the text.
• To delete a pill, click the X icon to the right of the pill, or click to edit and delete all of the text.
• To view the unformatted source text, click the source toggle switch. The source view is useful for copying to a text editor or spreadsheet.
Click the source toggle switch again to see the formatted pill view.
Underneath the entry field is a filter box. Enter text in the filter box to only show matching pills.

Pills are not currently supported in Opera.

Level Select the level for the discovery run. This is either:

Full Discovery — Retrieves all the default info for hosts, and complete full inference.

Sweep Scan — Performs a sweep scan, trying to determine what is at each endpoint in the scan range. It will attempt to login to a device
to determine the device type.

Ping Select a ping for the discovery run to be performed. This can be:
• Use default
• Ping before scanning
• Do not ping before scanning

Public Select Allow patterns to scan in this range if you want patterns to be able to trigger scans on endpoints in this range.

Frequency Select a frequency for the discovery run to be performed. This can be:
• Every n hours
• Weekly by days of week
• Once per week
• Monthly by day of month
• Monthly by week of month.

BMC Discovery 11.3 Page 33


Field name Details

Start Based on the selected scan frequency, you are presented with different options to start scheduled scans. Discovery must be running at this
time.

• Every n hours: You are provided with drop down menus to choose the frequency of the scan (every 1, 2, 3, 4, 6, 8, and 12 hours), start times at
minutes past the hour, and the hours after which the scan should start. For example, if a scan is scheduled to occur every two hours, then the
starting hours may be 00, 02, 04, and so on, or 01, 03, 05, and so on.
• Weekly by days of week: You are provided with buttons for each day and drop down menus for the start time in hours and minutes. You can
select one or more days from the day buttons. The selected buttons appear with a Yellow border.
• Once per week: You are provided with drop down menus to select the day of the week and the start time in hours and minutes.
• Monthly by day of month: You are provided with drop down menus to select the day of the month and the start time in hours and minutes.
• Monthly by week of month: You are provided with drop down menus to the select the week, the day of the week, and the start time in hours
and minutes.

For example, to start a scheduled weekly discovery run which starts on Friday at 19:30 hrs and continues until Saturday, you will do the
following:

1. Select the scan frequency as Weekly by days of week.

2. Click on the F and S day buttons.

3. From the time drop down menu, select 19 hours and 30 minutes.

End You can choose end a scheduled scan when it is completed by selecting when completed.
Alternatively, use the available option to end the scan which is based on the selected scan frequency. If the duration of the end time expires
before the scan has completed, then the scan is suspended until the next scheduled time that the scan occurs. The scan resumes from the point
where it was previously suspended.
• Every n hours: This scan type does not have a scheduled end time; they run to completion.
• Weekly by days of week: You are provided with the drop down menus to select the end time in hours and minutes.
• Once per week: You are provided with the drop down menus to select the day of the week and time to end the scan.
• Monthly by day of month: You are provided with the menus to select the day of the month and time to end the scan.
• Monthly by week of month: You are provided with the drop down menus to the select the number of days and the time within which the scan
must end.

For example, to end a scheduled weekly discovery run which starts on Friday at 19:30 hrs and continues until 21 hours 30 minutes on Saturday
(see the example for the Start field above), you will select 21 hours and 30 minutes from the time drop down menu.

Following are the additional fields required for cloud scan discovery:

Provider Specify the type of cloud provider such as Amazon Web Services or Microsoft Azure.

Credentials The list populates the credentials corresponding to the selected cloud provider.

Region The region to scan.

Next steps
For more information, see Performing a discovery run.

Related topics
Excluding ranges from discovery

Rescanning scan results

Examining scan results

BMC Discovery 11.3 Page 34


Enabling other users
Typically, when you want to enable additional users to access BMC Discovery, you should log in as a user with the
appropriate privileges. In addition to the system user, the following additional users are configured in BMC Discovery, but
are not enabled by default:

admin

appmodel

discovery

Use the system user only for configuration tasks which require system privileges.

To enable other users

1. From the main menu, click the Administration Settings icon .

2. In the Security Policy section of the Administration page, ensure the "Disabled Accounts can be reactivated"
option is set to Yes

3. In the Security section of the Administration page, click the Users icon.

4. For each user, click the Set Password link.

5. On the Set Password page, enter the new password in each text entry field and click Apply.

6. After you have changed the passwords for each user, log off from the system user account by clicking the logout
icon at the top right of the page.

BMC Discovery 11.3 Page 35


BMC Discovery 11.3 Page 36
© Copyright 2003 – 2017 BMC Software, Inc.© Copyright 2003 – 2017 BladeLogic, Inc.

BMC, BMC Software, and the BMC Software logo and the BMC marks are the exclusive properties of BMC Software, Inc. and are registered or may be registered
in the U.S and in other countries. BladeLogic and other BladeLogic marks are the exclusive properties of Bladelogic, Inc. and are registered or may be registered in
the U.S and in other countries. All other trademarks or registered trademarks are the property of their respective owners.

Cisco Nexus®, Cisco IMC Web API® are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Compuware, the Compuware logo and all other Compuware Software product and service names are owned by Compuware Corporation and are registered or
pending registration in the US Patent and Trademark Office or in the trademark offices of other countries.

AIX, DB2 Universal Database, and IBM are trademarks or registered trademarks of International Business Machines Corporation in the United States, other
countries, or both.

IT Infrastructure Library® is a registered trade mark of AXELOS Limited.

ITIL® is a registered trade mark of AXELOS Limited.

Linux is the registered trademark of Linus Torvalds.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

UNIX® is the registered trademark of The Open Group in the US and other countries.

BMC Software Confidential.

The information included in this documentation is the proprietary and confidential information of BMC Software, Inc., its affiliates, or licensors. Your use of this
information is subject to the terms and conditions of the applicable End User License agreement for the product and to the proprietary and restricted rights
notices included in the product documentation.

Click here for the provisions described in the BMC License Agreement and Order related to third party products or technologies included in the BMC product.

BMC Software Inc.


2103 CityWest Blvd,
Houston TX 77042-2828, USA
713 918 8800
Customer Support: 800 537 1813 (United States and Canada) or contact your local support center

BMC Discovery 11.3 Page 37

You might also like