Difference between revisions of "Template:ITOM Discovery Job Properties"

From Hornbill
Jump to navigation Jump to search
 
(11 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Discovery Job Properties==
 
 
[[File:ITOMAddDiscovery.png|right|350px|link=https://wiki.hornbill.com/images/2/28/ITOMAddDiscovery.png|ITOM Add Discovery Job]]
 
[[File:ITOMAddDiscovery.png|right|350px|link=https://wiki.hornbill.com/images/2/28/ITOMAddDiscovery.png|ITOM Add Discovery Job]]
{{Bullet1|Name|Name given to identify this Discovery Job}}
+
{{Bullet1|Site Target [Group / Server ]|whether the job needs to run on an SIS Group or on a single SIS/Managed CI}}
{{Bullet1|Site Target [Group / Server ]|whether the job needs to run on a SIS Group or on a single SIS/Managed CI}}
+
<div class="mw-collapsible mw-collapsed" data-collapsetext="Show Less" data-expandtext="Read More" style="width:1000px">
{{Bullet1|Protocol|The Discovery process once a computer has been identified as a Windows device, Windows Management Instrumentation (WMI) is used to retrieve Windows Information that is used to populate the Inventory.  The discovery Job will always be executed directly from the SIS server and thus needs to remotely connect with any computers that it discovers to retrieve their detailsThere are two methods supported, that can be utilised:}}
+
{{Bullet1|Protocol|A device is identified as discovered once it can be accessed and its inventory retrieved. This is achieved by probing its Operating System (OS) using various methods dependant on the devices Operating System.  The probe will be initiated from the SIS server and does not require any software to be uploaded to the device.  In order to achieve this, a protocol will be required in order for the SIS to access the deviceWhich protocol will depend on the OS and what is supported, in general for Windows devices WMI is used along with DCOM or WinRM, and for Linux / Unix (inc Apple Mac) Secure Shell (SSH) is used.}}
{{Bullet2|WinRm|Provides secure and firewall-friendly communications, in order to access WMI. This feature is supported on Windows 2008R2 and later, Windows 7 and later and later.}}
+
<div class="mw-collapsible-content">
{{Bullet2|DCOM|Communication relies on Remote Procedure Calls and can be tricky to configure over firewalls.}}
+
{{Bullet2|Auto|Will attempt to access the device using all of the provided protocols, in the following order; WinRM, DCOM and SSH, using the first successful one.}}
{{Bullet1|Discovery Mode|The Discover Mode dictates the method that identifies devices on the Network.  Each Mode will have specific settings; these will be visible in the Discover Mode Settings.  It is only possible to have a single mode per Job use of multiple modes, will require the creation of multiple Jobs.}}
+
{{Bullet2|WinRm|Provides secure and firewall-friendly communications, in order to access WMI. This feature is supported on Windows 2008R2 and later and Windows 7 and later.}}
<div class="mw-collapsible mw-collapsed" data-collapsetext="Show Less" data-expandtext="Read More" style="width:400px">
+
{{Bullet2|DCOM|Communication relies on Remote Procedure Calls and can be tricky to configure over firewalls.  Widely supported on the Windows platform, this protocol is mainly used to access legacy devices.}}
<br>
+
{{Bullet2|SSH|Secure Shell is a network communication protocol that allows for remote connection between two computers to communicate and share data, commonly used but not exclusively by Linux / Unix (inc Apple Mac) devices.  The protocol can be used on Windows devices, but may require additional software to be installed and configured.}}
 +
</div>
 +
</div>
 +
<div class="mw-collapsible mw-collapsed" data-collapsetext="Show Less" data-expandtext="Read More" style="width:1000px">
 +
{{Bullet1|Discovery Mode|The Discover Mode dictates the method that identifies devices on the Network.  Each mode will have specific settings; these will be visible in the Discover Mode Settings section.  It is only possible to have a single mode per Job, use of multiple modes will require the creation of multiple Jobs.}}
 
<div class="mw-collapsible-content">
 
<div class="mw-collapsible-content">
 
{{Bullet2|[[Active Directory]]|}}
 
{{Bullet2|[[Active Directory]]|}}

Latest revision as of 11:50, 14 December 2020

ITOM Add Discovery Job
  • Site Target [Group / Server ]
whether the job needs to run on an SIS Group or on a single SIS/Managed CI
  • Protocol
A device is identified as discovered once it can be accessed and its inventory retrieved. This is achieved by probing its Operating System (OS) using various methods dependant on the devices Operating System. The probe will be initiated from the SIS server and does not require any software to be uploaded to the device. In order to achieve this, a protocol will be required in order for the SIS to access the device. Which protocol will depend on the OS and what is supported, in general for Windows devices WMI is used along with DCOM or WinRM, and for Linux / Unix (inc Apple Mac) Secure Shell (SSH) is used.
  • Auto
Will attempt to access the device using all of the provided protocols, in the following order; WinRM, DCOM and SSH, using the first successful one.
  • WinRm
Provides secure and firewall-friendly communications, in order to access WMI. This feature is supported on Windows 2008R2 and later and Windows 7 and later.
  • DCOM
Communication relies on Remote Procedure Calls and can be tricky to configure over firewalls. Widely supported on the Windows platform, this protocol is mainly used to access legacy devices.
  • SSH
Secure Shell is a network communication protocol that allows for remote connection between two computers to communicate and share data, commonly used but not exclusively by Linux / Unix (inc Apple Mac) devices. The protocol can be used on Windows devices, but may require additional software to be installed and configured.
  • Discovery Mode
The Discover Mode dictates the method that identifies devices on the Network. Each mode will have specific settings; these will be visible in the Discover Mode Settings section. It is only possible to have a single mode per Job, use of multiple modes will require the creation of multiple Jobs.
  • Ping Check Settings
  • Ping check Discovered
[Yes / No] Check that the discovered machine is pinged - if ICMP is disabled or firewalled, then select "No"
  • Timeout
  • Hop Count