Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


15.2.3 Credentials used in discovery from IP address

When searching with IP addresses, devices are discovered with the use of ARP and ICMP, but detailed information about the devices is not collected. To collect the detailed device information during the search, you need to specify credentials for the discovered devices so that the devices can be connected by using SNMP or a Windows administrative share.

SNMP credentials

Community name

Credentials for Windows administrative share
  • User ID with administrator permissions

  • Password

For a device for which SNMP can be used, if community authentication is possible, the device type as well as part of the device information can be collected when it is discovered.

For a computer for which Windows administrative shares are enabled, if logon authentication with administrator permissions is possible, the device type as well as most of the device information can be collected when it is discovered. In addition, the agent can be delivered and installed.

Important

The device type of a computer with the following OSs: Windows Me, Windows 98, Windows 95, and Windows NT 4.0, might be classified as Unknown after discovery.

Important

If multiple network cards are used for a single device, when a search is performed using ICMP, the device is discovered as multiple devices.

Tip

Specify a user ID to be used in authentication for Windows administrative shares in the following format if the ID is to be authenticated as a domain user: User ID@FQDN (fully qualified domain name), or domain name\user ID. The fully qualified domain name is a format in which no host name or domain name are omitted. For example, specify an ID in the following format: User001@PC001.hitachi.com.

Tip

If Windows administrative share authentication is used, administrative share setting of a computer must be enabled in advance.

A search is performed by combining credentials for each discovery range. By default, all the specified credentials are used for discovery. If, however, SNMP community names differ among departments, or the Windows credentials differ among computers, you can perform a search by selecting the credentials necessary for each discovery range.

Note that the credentials used in discovery from IP addresses are also used when the agent is delivered. To deliver the agent after discovery, in the Settings module, select Discovery and then Configurations, and in the IP Address Range view, specify Windows administrative share credentials for the discovery range that includes the computer to which the agent is to be delivered.

Important

When you perform the network discovery using Windows authentication in the environment where the discovery target computers do not have a common account and the discovery needs to use different credential information for the discovery target computers, the account of a discovery target computer might get locked. This problem occurs when all of the following conditions are met:

  • Windows authentication is set for the discovery range.

  • The account lockout policy is enabled in a discovery target computer.

  • The authentication fails with the credential information in the discovery target computer in 2.

    This condition applies to the environment where a common account used by discovery target computers does not exist and the discovery needs to use different credentials for the discovery target computers.

  • The network discovery is performed.

When you perform the network discovery by using Windows authentication for a discovery target computer in which the account lockout policy is enabled, divide the discovery range or remove unnecessary credentials to make the number of credentials to be used for the authentication fewer than the account lockout threshold number.