1 |
In the Configure Credential wizard, do one of the followings actions: |
• |
b |
f |
• |
c |
1 |
Click Edit at the top of the table. |
• |
Hosts already included in the Scanning List. |
• |
Matching Method used for identifying the hosts in this list. |
• |
Processes running on the hosts included in this list, which are monitored for dependency data. |
• |
Ports opened on the hosts included in this list, which are monitored for dependency data. |
b |
• |
To define a new process, click New process. In the Regex Pattern field specify the regular expression based on which specific processes would be included in or excluded from the process pattern. Click OK. |
• |
To define a new port, click New port. Specify the Port Range that should be included or excluded from scanning. Click OK. |
1 |
Click Edit at the top of the table. |
• |
Hosts that should be scanned by this agent only when they are referenced by the hosts included in the scanning list. |
• |
Matching Method used for identifying the hosts in this list. |
• |
Processes running on the hosts included in this list. |
• |
Ports opened on the hosts included in this list. |
b |
• |
To define a new process, click New process. In the Regex Pattern field specify the regular expression based on which specific processes would be included in or excluded from the process pattern. Click OK. |
• |
To define a new port, click New port. Specify the Port Range that should be included or excluded from scanning. Click OK. |
1 |
Click Edit at the top of the table. |
• |
Hosts that should always be excluded from the scanning. |
• |
Matching Method used for identifying the hosts in this list. |
b |
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center