Menu Close Using Discovery I. About discovery Expand section "I. About discovery" Collapse section "I. About discovery" 1. What is discovery? 2. What products does discovery find? 3. Is discovery right for me? II. Accessing the discovery user interface Expand section "II. Accessing the discovery user interface" Collapse section "II. Accessing the discovery user interface" 4. Logging in to the discovery user interface 5. Logging out of the discovery user interface III. Adding sources and credentials Expand section "III. Adding sources and credentials" Collapse section "III. Adding sources and credentials" 6. Adding network sources and credentials Expand section "6. Adding network sources and credentials" Collapse section "6. Adding network sources and credentials" 6.1. Adding network sources 6.2. Adding network credentials 6.3. About sources and credentials 6.4. Network authentication Expand section "6.4. Network authentication" Collapse section "6.4. Network authentication" 6.4.1. Commands that are used in scans of remote network assets Expand section "6.4.1. Commands that are used in scans of remote network assets" Collapse section "6.4.1. Commands that are used in scans of remote network assets" 6.4.1.1. Basic commands that do not need elevated privileges 6.4.1.2. Commands that need elevated privileges 7. Adding satellite sources and credentials Expand section "7. Adding satellite sources and credentials" Collapse section "7. Adding satellite sources and credentials" 7.1. Adding satellite sources 7.2. Adding satellite credentials 7.3. About sources and credentials 7.4. Satellite Server authentication 8. Adding vcenter sources and credentials Expand section "8. Adding vcenter sources and credentials" Collapse section "8. Adding vcenter sources and credentials" 8.1. Adding vcenter sources 8.2. Adding vcenter credentials 8.3. About sources and credentials 8.4. vCenter Server authentication IV. Running and managing scans Expand section "IV. Running and managing scans" Collapse section "IV. Running and managing scans" 9. Running and managing standard scans Expand section "9. Running and managing standard scans" Collapse section "9. Running and managing standard scans" 9.1. Running standard scans 9.2. Running a new scan job 9.3. Pausing, resuming, and canceling scans 9.4. About scans and scan jobs 9.5. Scan job processing Expand section "9.5. Scan job processing" Collapse section "9.5. Scan job processing" 9.5.1. Scan job connection and inspection tasks 9.5.2. How these tasks are processed 9.6. Scan job life cycle 10. Running and managing deep scans Expand section "10. Running and managing deep scans" Collapse section "10. Running and managing deep scans" 10.1. Running scans with deep scanning 10.2. Running a new scan job 10.3. Pausing, resuming, and canceling scans 10.4. About scans and scan jobs 10.5. Scan job processing Expand section "10.5. Scan job processing" Collapse section "10.5. Scan job processing" 10.5.1. Scan job connection and inspection tasks 10.5.2. How these tasks are processed 10.6. Scan job life cycle V. Merging and downloading reports Expand section "V. Merging and downloading reports" Collapse section "V. Merging and downloading reports" 11. Downloading reports Expand section "11. Downloading reports" Collapse section "11. Downloading reports" 11.1. Downloading reports 11.2. How reports are created Expand section "11.2. How reports are created" Collapse section "11.2. How reports are created" 11.2.1. Facts and fingerprints 11.2.2. System deduplication and merging Expand section "11.2.2. System deduplication and merging" Collapse section "11.2.2. System deduplication and merging" 11.2.2.1. System deduplication 11.2.2.2. System merging 11.2.3. System post-processing 11.2.4. Report creation 11.2.5. A fingerprint example 12. Merging reports Expand section "12. Merging reports" Collapse section "12. Merging reports" 12.1. Merging reports 12.2. How reports are created Expand section "12.2. How reports are created" Collapse section "12.2. How reports are created" 12.2.1. Facts and fingerprints 12.2.2. System deduplication and merging Expand section "12.2.2. System deduplication and merging" Collapse section "12.2.2. System deduplication and merging" 12.2.2.1. System deduplication 12.2.2.2. System merging 12.2.3. System post-processing 12.2.4. Report creation 12.2.5. A fingerprint example Legal Notice Document options Language: 日本語 English Format: Single-page HTML PDF ePub Using Discovery Red Hat Subscription Management 1Understanding DiscoveryRed Hat Customer Content Services Legal NoticeAbstract Next