Documentation forSolarWinds Service Desk

Scanners

The All Scanners Index page displays scanners installed on your company’s network in all locations.

Once installation is complete, and you have run an initial scan, scanners will automatically populate in the Index page. 

To View Your Scanners

Navigate to setup by hovering over the menu icon and select Setup.

On the setup screen scroll down to Discovery Scanners.

Look at the example below to view All Scanners.

The table below describes the columns on the All Scanners index page and how you can acquire the maximum data based on information entered:

COLUMN

DESCRIPTION

NAME

By default, the scanner name is set to the name of the server on which it was installed.

Note: Name and description are for your ease and convenience. This information does not affect the scanning process.

STATE

There are 3 possible states:

  1. Active - The scanner and the SolarWinds instance are connected. This does not mean the scanner is actively scanning right now.

  2. Pending Update - The scanner configuration has just been updated and the changes were sent to the server on which it is installed.

  3. No Connection - There is no connection between the discovery scanner and the SolarWinds instance.

CONNECTIONS

The number of connections associated with each scanner.

FREQUENCY

Frequency of scan - this can be configured separately for each scanner.

Recommended scan frequency: every 24 hours.

LAST REPORT

Provides date and time of the last update from the scanner.

ACTIONS

When hovering over the row, a trash icon appears. You may delete the device by clicking on the icon.
Please note: You may only delete a device that is not currently active. 

: In all tabs of the Discovery Scanner, you are encouraged to select a name for your network/subnet and provide a meaningful description. As a best practice, we recommend purposeful input since this information does not affect the scan. This better defines your environment and supplies useful data to agents analyzing the feedback.

Scheduling your Scan

Now that you have become familiar with the scanners in your organization and understand the relevance of each column, select a scanner by clicking on the scanner name.

In the Scanner details page, you will find the:

  • Name
  • Description
  • and Scanner Properties

The default scanning frequencies can be set for a fixed time interval, or you can choose to assign a shorter or longer scan interval.

You can select the frequency by:

  • Days
  • Hours
  • or Minutes

Or you can select to run the scan on specific day and time.

In addition, you have the ability to Download Logs for the most recent log of any active scanner.

Credentials

To derive the maximum benefits, we recommend scanning with credentials. 

  • SSH (Secure Shell) is used to access information on machines with SSH server installed.
  • SNMP (Simple Network Management Protocol) is used to access information on network equipment such as routers, switches, printers, etc.
  • WMI (Windows Management Instrumentation) is used to connect to your windows machine. If the account is a domain admin account, the username should follow the format: domain\account name.

This tab is provided for your benefit. It does not self populate, therefore you must manually enter the information you would like used for discovery. 

Credentials are used in two different ways:

  1. When a credential is associated with a router it can enable scanning remote subnets that are connected to this router. This saves you time as it does not require deployment of multiple scanners in your network.

  2. When a credential is associated with a subnet, it is used to fetch additional information from devices that support this credential type, as mentioned above. Therefore you will obtain a more significant amount of data regarding your networked devices.

    Use the icon to select the Credential type from the dropdown menu and create a new entry.

Defining the columns on the Credentials screen:

COLUMN

DESCRIPTION

NAME

It is important to select a meaningful name that assists you in defining your environment. 

Click on the name to modify and add a description. You can also update the credentials here. The required details are dependent on the Credential Type. 

  • SNMPv3 requires a Username, Authentication Protocol, Authentication Key, Privacy Protoco,l and Privacy Key

  • SSH Password only requires a Username and Password. 

USED BY

Describes the # of Subnets and the # of Network Devices associated to each subnet.

TYPE

The selected type of the created credential. 

LAST UPDATE

Provides the date and time of the last change.

ACTIONS

When hovering over the row, a trash bin appears. You may delete the credential as long as it is not currently in use. 

Scanning without Credentials

The amount of information gathered without the use of credentials is limited.
The information gathered without credentials includes:

  • IP Address

  • MAC Address

  • Operating System

  • Host Name

  • Open ports (services)

Scanning with Credentials

To obtain additional information, you must include credentials to allow the scanner access to the connected devices.   

Below is a detailed description of what is supported along with the network information you need to provide for maximum asset information:

  • SNMP Credentials V3

    • When you select V2, you must include the Name and Community string. 
      SNMPv3 requires further details. With this selection you will provide a Name*, Description, Username*, Authentication Protocol, Authentication Key*, Privacy Protocol and Privacy Key*.

  • SSH Credentials Key

    • When you select this credential you must provide Name*, Description, Username* and SSH Private Key* to receive greater visibility into the subnet. 

  • SSH Credentials (username and password)

    • When you select this credential you must provide Name*, Description, Username* and Password*

* Reflect required fields

  • Although it is not mandatory, we highly recommend providing a description for a better understanding of your network.

    To add credentials click the icon on the upper right corner of the pane. 

    If you elect to delete a Credential, note that Credentials can only be deleted when not in use. 

  • Credentials are not used unless they are associated with a connection.

  • Once a discovery scanner is installed, it detects the subnet on which it is deployed, and automatically creates a new connection with subnet type. In addition, it detects the default router and automatically creates a new connection with router type. All additional SCCM, Router, vCenters and Subnets on the network can be manually entered to the Connections screen.