- 01 Jul 2024
- 1 Minute to read
- Print
- PDF
Discovery
- Updated on 01 Jul 2024
- 1 Minute to read
- Print
- PDF
Discover the invisible, unleash the power - Agentless, yet extraordinary!
Discovery remotely accesses and pulls information from other devices and does not require the installation of any agent for Discovery purposes other than a proxy server.
Discovery is used to or in:
- Capture basic inventory details.
- Gain visibility of network assets.
- Manage and monitor networks.
- Applications or legacy systems with fewer staff and resources.
Refer to the illustrations for more details on the capabilities of Discovery.
In Discovery, information is gathered through various network protocols and techniques supported by the device network infrastructure.
This can include protocols like SNMP (Simple Network Management Protocol), ICMP (Internet Control Message Protocol), WMI (Windows Management Instrumentation), SSH (Secure Shell), and others.
Let us discover how the Discovery application empowers the IT landscape with comprehensive capabilities to explore, analyze, and seamlessly connect its entire technology infrastructure.
By leveraging these protocols, the Discovery system can query devices and collect relevant information such as device type, operating system, software applications, hardware details, network configurations, and other attributes. This information is typically used for asset management, network monitoring and auditing purposes.
List of Discovery capabilities available under Agentless Discovery along with associated links to related pages is summarized below:
Discovery Templates | Discovery Dashboard | Monitoring Accounts |
Discovery Jobs |