The Discovery application allows you can create IRE rules and define priorities for discovering assets on a target platform.
Note
To enable IRE, we have to add Keys to both Proxy and DC.
To configure the IRE Rules, perform the following steps:
Navigate to Admin > Discovery Monitoring > General > IRE Rule.
Click Add New from the right action panel to configure new IRE Rule.
The IRE Rule page is displayed.
Figure: IRE RULES Page
3. Enter the details for configuring the IRE Rules. For example: You can define the Rule Name as RED HAT Linux, Rule Type as Hardware (system configured), Target Platform as Linux, Device Type as ESXi or SUSE or Select All, System Type as Computer, and select the Vendor type as HP from the list.
Note
Target platform and Device type are not mandatory for configuring IRE Rules.
4. Select the Sync Rule as Now to process the rule immediately.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: Configuring IRE Rule
For more information about fields on the IRE Rules, see Field Description.
Field Description
Field | Description |
DETAILS | |
Tenant | Select the name of the Tenant. |
Rule Name | Type in the name of IRE Rule. |
Rule Type | Select the type of rule (Hardware or Software). |
Target Platform | Select the name of device class from the list. |
Device Type | Select the type of device from the list. |
System Type | Select the type of system from the list. |
Vendor | Select the type of Vendor from the list. |
Sync Rule | Select the option Now or Later to apply the rule. |
Active | Select this check box to enable the IRE rule. |
Refer here for the screenshot of field data.
Screenshot
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: Defining Rule Name
5. Click the edit icon under the Action column to modify Source and Priority in the default configuration template.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
A pop-up is displayed under Source and Priority with Priority, Source and Action.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
6. You can also edit the Priority and Source from the list and set the preference to get best data from the discovery sources. By default, Agent is selected as Priority 1 as it returns maximum data from the different sources.
7. Click the add icon
to add new rule to the list.
Note
Source and Priority mapping must be unique.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
8. Click the copy icon
to copy configuration to all the attributes.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: Source and Priority pop-up window
The list of configured Source and Priority is displayed under the Source and Priority table as shown below:
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: Configuration of Source and Priority table
9. Navigate to the edit icon under the Action for a specific Column Name column to modify Source and Priority in the default configuration template.
In addition to the default configuration rule, users can create rules in four different ways using the following icons under the Action column: Copy One Below, Copy All Below, Copy One Above, Copy All Above.
For example: Click the Delete icon under the Actions column to remove the Priority 3 and 4 from the Priority and Source. (The figure below displays the SOURCE & PRIORITY pop-up for COLUMN: SYSTEM NAME).
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: Source and Priority for COLUMN: SYSTEM NAME
You can perform following actions from the Actions column (Copy One Below, Copy All Below, Copy One Above, Copy All Above) under Source and Priority table of the IRE RULE page.
Actions
Icons | Description |
Copy One Below | Click first icon
|
Copy All Below | Click second icon
|
Copy One Above | Click third icon
|
Copy All Above | Click the fourth icon
|
Select Override to override the existing value for the null or empty value.

Click
to apply or
to cancel the IRE RULE.
Viewing the IRE RULE list
To view the configured IRE RULE list, perform the following steps to display the IRE RULE List:
Navigate to ACTIONS Panel and click SHOWLIST.

Figure: SHOW LIST tab on the ACTION Panel
Info
Tenant which is mapped with proxy will be displayed only in Tenant dropdown list.
Check Active to include all active source attributes.
The list of IRE RULES is displayed in the SHOWLIST page.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Click on any of these Rule Name to view the details of rule configuration.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
For example: If IRE RULE is selected under Rule Name, then a new page is displayed for IRE RULE as shown in the screenshot below:
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Screenshot
Click the FILTER icon on the ACTIONS under the IRE RULE page to filter the IRE Rule records based on the desired criteria. A FILTERS pop-up window is displayed.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: FILTERS
Enter the field details and on the FILTERS pop-up window, click SUBMIT.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Figure: Sample field details in FILTERS window
The filtered list of IRE RULE records page is displayed as below:
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)
Note
Select to
include all inactive source attributes.
.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)

to apply the same configuration to the attribute just below the COLUMN: SYSTEM NAME. Based on the configuration, the following fields are displayed for the Tenant:

to apply the same configuration to the attribute below the COLUMN: SYSTEM NAME. Based on the configuration, the following fields are displayed for the Tenant:

to apply the same configuration to the attribute just above the COLUMN: SYSTEM NAME. Based on the configuration, the following fields are displayed for the Tenant:

to apply the configuration to all attributes. You can apply same configuration to all source attributes above the configured of the Incident Management module for a Tenant. Based on the configuration, the following fields are displayed for the Tenant:.png?sv=2022-11-02&spr=https&st=2026-03-04T07%3A55%3A28Z&se=2026-03-04T08%3A09%3A28Z&sr=c&sp=r&sig=bmc1q%2BYTNCnrw8suonzVSPnejRCuG75zMd5G1w2puHE%3D)