Jump To Close Expand all Collapse all Table of contents Using Discovery 1. About Discovery Expand section "1. About Discovery" Collapse section "1. About Discovery" 1.1. What is Discovery? 1.2. What products does Discovery find? 1.3. Is Discovery right for me? 2. Accessing the Discovery user interface Expand section "2. Accessing the Discovery user interface" Collapse section "2. Accessing the Discovery user interface" 2.1. Logging in to the Discovery user interface 2.2. Logging out of the Discovery user interface 3. Adding sources and credentials Expand section "3. Adding sources and credentials" Collapse section "3. Adding sources and credentials" 3.1. Adding network sources and credentials Expand section "3.1. Adding network sources and credentials" Collapse section "3.1. Adding network sources and credentials" 3.1.1. Adding network sources 3.1.2. Adding network credentials 3.1.3. About sources and credentials 3.1.4. Network authentication Expand section "3.1.4. Network authentication" Collapse section "3.1.4. Network authentication" 3.1.4.1. Commands that are used in scans of remote network assets Expand section "3.1.4.1. Commands that are used in scans of remote network assets" Collapse section "3.1.4.1. Commands that are used in scans of remote network assets" 3.1.4.1.1. Basic commands that do not need elevated privileges 3.1.4.1.2. Commands that need elevated privileges 3.2. Adding satellite sources and credentials Expand section "3.2. Adding satellite sources and credentials" Collapse section "3.2. Adding satellite sources and credentials" 3.2.1. Adding satellite sources 3.2.2. Adding satellite credentials 3.2.3. About sources and credentials 3.2.4. Satellite Server authentication 3.3. Adding vcenter sources and credentials Expand section "3.3. Adding vcenter sources and credentials" Collapse section "3.3. Adding vcenter sources and credentials" 3.3.1. Adding vcenter sources 3.3.2. Adding vcenter credentials 3.3.3. About sources and credentials 3.3.4. vCenter Server authentication 3.4. Adding OpenShift sources and credentials Expand section "3.4. Adding OpenShift sources and credentials" Collapse section "3.4. Adding OpenShift sources and credentials" 3.4.1. Adding Red Hat OpenShift Container Platform sources 3.4.2. Adding Red Hat OpenShift Container Platform credentials 3.4.3. About sources and credentials 3.4.4. Red Hat OpenShift Container Platform authentication 3.5. Adding Ansible sources and credentials Expand section "3.5. Adding Ansible sources and credentials" Collapse section "3.5. Adding Ansible sources and credentials" 3.5.1. Adding Red Hat Ansible Automation Platform sources 3.5.2. Adding Red Hat Ansible Automation Platform credentials 3.5.3. About sources and credentials 3.5.4. Ansible authentication 3.6. Adding Red Hat Advanced Cluster Security for Kubernetes sources and credentials Expand section "3.6. Adding Red Hat Advanced Cluster Security for Kubernetes sources and credentials" Collapse section "3.6. Adding Red Hat Advanced Cluster Security for Kubernetes sources and credentials" 3.6.1. Adding Red Hat Advanced Cluster Security for Kubernetes sources 3.6.2. Adding RHACS credentials 3.6.3. About sources and credentials 3.6.4. Red Hat Advanced Cluster Security for Kubernetes authentication 4. Running and managing scans Expand section "4. Running and managing scans" Collapse section "4. Running and managing scans" 4.1. Running and managing standard scans Expand section "4.1. Running and managing standard scans" Collapse section "4.1. Running and managing standard scans" 4.1.1. Running standard scans 4.1.2. Running a new scan job 4.1.3. Pausing, resuming, and canceling scans 4.1.4. Deleting scans 4.1.5. About scans and scan jobs 4.1.6. Scan job processing Expand section "4.1.6. Scan job processing" Collapse section "4.1.6. Scan job processing" 4.1.6.1. Scan job connection and inspection tasks 4.1.6.2. How these tasks are processed 4.1.7. Scan job life cycle 4.2. Running and managing deep scans Expand section "4.2. Running and managing deep scans" Collapse section "4.2. Running and managing deep scans" 4.2.1. Running scans with deep scanning 4.2.2. Running a new scan job 4.2.3. Pausing, resuming, and canceling scans 4.2.4. Deleting scans 4.2.5. About scans and scan jobs 4.2.6. Scan job processing Expand section "4.2.6. Scan job processing" Collapse section "4.2.6. Scan job processing" 4.2.6.1. Scan job connection and inspection tasks 4.2.6.2. How these tasks are processed 4.2.7. Scan job life cycle 5. Downloading reports Expand section "5. Downloading reports" Collapse section "5. Downloading reports" 5.1. Downloading reports Expand section "5.1. Downloading reports" Collapse section "5.1. Downloading reports" 5.1.1. Downloading reports 5.1.2. How reports are created Expand section "5.1.2. How reports are created" Collapse section "5.1.2. How reports are created" 5.1.2.1. Facts and fingerprints 5.1.2.2. System deduplication and system merging Expand section "5.1.2.2. System deduplication and system merging" Collapse section "5.1.2.2. System deduplication and system merging" 5.1.2.2.1. System merging 5.1.2.3. System post-processing 5.1.2.4. Report creation 5.1.2.5. A fingerprint example 6. Sending reports to the Hybrid Cloud Console Expand section "6. Sending reports to the Hybrid Cloud Console" Collapse section "6. Sending reports to the Hybrid Cloud Console" 6.1. Downloading and sending insights reports to the Hybrid Cloud Console 6.2. What is an insights report? Expand section "6.2. What is an insights report?" Collapse section "6.2. What is an insights report?" 6.2.1. Frequency of reporting 6.2.2. Avoiding system duplication Legal Notice Settings Close Language: English 日本語 简体中文 Language: English 日本語 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English 日本語 简体中文 Language: English 日本語 简体中文 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Using Discovery Subscription Central 1-latestUnderstanding DiscoveryRed Hat Customer Content Services Legal NoticeAbstract Next