In this section, we will explore what targets (scopes) you can define for each discovery.
If you provided alternate credentials when you created the discovery, those credentials are used to enumerate your scopes. For more information, see Node Credential and Alternate Credential Details for On-Premises Discoveries .
The following table describes how each discovery type works with tombstoning.
Note: All discovery types have a root object that is not tombstoned by Enterprise Reporter. For example, in Computer, File Storage Analysis, MS SQL, and Registry discoveries, the computer is the root object, so computers will never be tombstoned.
Your discovery should contain objects for which you want to collect similar data because:
© ALL RIGHTS RESERVED. 利用規約 プライバシー Cookie Preference Center