In the realm of IT infrastructure management, efficient and comprehensive discovery of your digital assets is paramount. For professionals relying on BMC Discovery, ensuring complete visibility across all environments, including isolated or unreachable networks, is a crucial task. This is where the Discover Scanning Tool, specifically the standalone Windows scanner, becomes an indispensable asset.
This article serves as your expert guide to understanding and utilizing the standalone Windows scanning tool provided by BMC Discovery. We will delve into its functionalities, benefits, and step-by-step instructions on how to effectively employ it to gather essential data from Windows hosts, even in the most challenging network configurations. While it’s important to note that this tool offers a limited dataset compared to a full Windows proxy or Outpost, its value in specific scenarios is undeniable.
Accessing and Downloading Your Discover Scanning Tool
Getting started with the standalone Windows scanner is straightforward. The tool is conveniently packaged as a .zip archive, ensuring easy deployment and portability. You can download it directly from your BMC Discovery instance and deploy it to the target Windows system or a removable storage device like a USB drive. Here’s how to access and download this vital discover scanning tool:
- Navigate to the main menu within your BMC Discovery interface.
- Select Manage > Discovery Tools. This will lead you to the central hub for various discovery utilities.
- Locate the Standalone Windows Scanner section. Here, you’ll find all the necessary resources related to this tool.
- Click on Download the Standalone Windows Scanner archive. This action will initiate the download of a
.zip
file containing the scanner executable and associated files. - Once downloaded, extract the contents of the
.zip
file to a directory on a USB flash drive or any other writable removable media. This extracted folder will contain everything needed to run the discover scanning tool independently.
This simple download process empowers you to quickly equip yourself with a powerful discover scanning tool ready for offline or isolated network environments.
Supported Platforms for the Windows Discover Scanning Tool
Before deploying the standalone Windows scanner, it’s essential to ensure compatibility with your target systems. This discover scanning tool is designed to operate seamlessly on 64-bit versions of Windows operating systems. Below is a comprehensive list of supported platforms:
- Windows Server 2019 version 1809
- Windows Server 2016 version 1607
- Windows Server 2012 R2 version 6.3
- Windows 10 x64 version 1909
- Windows 7 x64 SP1 version 6.1
- Windows Server 2012 version 6.2 *
- Windows Server 2008 R2 SP1 x64 version 6.1 *
- Windows Server 2008 SP2 x64 version 6.0 *
- Windows 8.1 x64 version 6.3 *
- Windows 8 x64 version 6.2 *
Note: Platforms marked with an asterisk (*) may require the Microsoft Visual C++ 2015 run-time DLLs to be installed. The scanner package conveniently includes the vcredist_x64.exe installer to address this dependency if needed.
Utilizing the Discover Scanning Tool: Step-by-Step Guide
The standalone Windows scanning tool is engineered for ease of use. It functions as a portable console application, readily executable from a USB drive or local directory. Here’s a detailed guide on how to effectively use this discover scanning tool:
- Insert the USB flash drive (or navigate to the directory where you extracted the tool) into the target Windows host system.
- Open File Explorer and browse to the location of the extracted scanner files.
- Optional: Customize Command Options. While the tool works effectively with default settings, you can customize its behavior using command-line options. For instance, specifying a
--target IPADDR
is recommended to avoid potential IP address conflicts and ensure accurate identification, especially in complex network environments. - Double-click the tw_windows_scanner.exe file. This action will launch a command window and initiate the data collection process. The console will display informational messages indicating the progress of the scan, as illustrated below:
U:> tw_windows_scanner Output file is results192.168.1.1.scan
Collecting Host Information ... DONE
Collecting Interface Information ... DONE
Collecting Process Information ... DONE
Collecting Service Information ... DONE
Collecting File System Information ... DONE
Collecting Package Information ... DONE
The tool automatically gathers vital information, including host details, interface configurations, running processes, services, file system structure, and installed packages. This data is then stored in a .scan
file within the results
subdirectory, ready for upload to BMC Discovery.
Customizing Command Options for Advanced Scanning
The standalone Windows discover scanning tool offers several command-line options to tailor its operation to specific needs. These options provide flexibility in naming output files, targeting specific IP addresses, and managing existing scan data. Here’s a breakdown of the available command options:
Command Option | Description |
---|---|
--id XXX |
Allows you to set a custom name for the scan output file. Instead of the default IP address-based naming, using --id XXX will name the file resultsXXX.scan . This is crucial to prevent accidental overwriting of scan files when scanning multiple machines. |
--target IPADDR |
Specifies a particular IP address to be scanned. This is beneficial in scenarios where the automatically detected IP address might be incorrect, such as VPN environments. It also enables scanning remote systems within an isolated subnet, given appropriate privileges. |
-x, --overwrite |
Instructs the tool to overwrite any existing scan files with the same name. Use this option with caution to avoid losing previous scan results. |
-q, --quiet |
Suppresses the display of informational messages in the command window, providing a cleaner output if desired. |
--wmi-timeout |
Adjusts the timeout duration for WMI queries. The default is 2 minutes, but you can increase this value if you encounter timeout issues in certain environments. |
Specifying the Target IP Address for Precise Discovery
In certain network configurations, especially those involving VPNs or complex addressing schemes, the default IP address detection of the discover scanning tool might not be accurate. To ensure precise scanning, the --target IPADDR
option becomes invaluable. By explicitly specifying the IP address of the target system, you eliminate ambiguity and guarantee that the tool focuses on the intended host.
Furthermore, this option extends the tool’s capabilities to scan other systems remotely, provided your user account possesses the necessary administrative privileges. This is particularly advantageous when dealing with isolated subnets, as you can deploy the discover scanning tool on a single machine and then target scan multiple systems within that subnet, streamlining the discovery process.
Uploading Scan Data to BMC Discovery
Once the discover scanning tool has completed its data collection, the next crucial step is to upload the generated .scan
file to your BMC Discovery appliance. This process integrates the discovered information into your central IT infrastructure management platform.
The recommended method for uploading the data is using the SCP (Secure Copy Protocol) utility. Transfer the .scan
files to the BMC Discovery appliance as the designated upload
user. For detailed instructions on uploading scanner files and further information on processing standalone scanner data within BMC Discovery, refer to the BMC Discovery documentation on “Loading a scanner file onto the appliance” and “Standalone UNIX scanning.”
By following these steps, you can effectively leverage the standalone Windows discover scanning tool to extend the reach of BMC Discovery into isolated Windows environments, ensuring comprehensive visibility and control over your entire IT landscape. This tool, while specialized, is a powerful addition to your IT discovery arsenal, enabling you to bridge gaps in network accessibility and maintain a unified view of your digital infrastructure.