Discovery Troubleshooting
Important:The product name for this user guide has changed from Foundation and Cloudscape to Business Service Discovery and Migration Planning.
As you work with the customer on scope setting you will undoubtedly spend time reviewing inaccessible devices. Devices end up in this category because at least one set of applicable credentials were attempted and were unable to gain access to the device(s). During the inventory phase we look to see what ports are open on a specific host. If we see ports for WMI or SNMP open then we will attempt to use the corresponding credential.
Generally, it is best to focus on those devices that are identified in the MAC manufacturer as common server or VM manufacturers (VM Ware, HP, Dell, etc.). We will uncover any device in the environment that responds to ICMP ping, so there can be many devices in this tab that are not in scope or useful to your objective.
Lastly, in many cases customers may not be sure the scope is correct. That’s okay, this is an iterative process and is designed such that we can always come back and rescan. You may find, after you have collected performance data on the scope and started working on grouping applications, traffic going to IPs that are out of scope. This is covered in our Application Grouping Workflow document, but know that discovery can be an iterative process. You will get further data to help you disposition the environment as you continue in the assessment process. Think of it as you are illuminating a dark room; it is not possible to fully light the room without understanding how big it is. Start with what you have so you can use it to illuminate other dark corners of a customer’s environment.
For detailed troubleshooting instructions and error messages please refer to the Troubleshooting subsections of the following collection modules:
• | Windows Collection Module |
• | SSH Collection Module |