Skip to main content

Discovery Logs

What Are Discovery Logs?

Discovery Logs provide a complete record of every scan executed by your discovery agents. Each log entry captures what was scanned, which protocol was used, whether it succeeded or failed, and detailed diagnostic information to help troubleshoot issues.

Why Use Discovery Logs?

  • Troubleshooting — Quickly identify why a scan failed (credentials, network, firewall, timeout)
  • Agent Monitoring — Track agent health with success rates and performance metrics
  • Audit Trail — Full history of all discovery activity with timestamps and results
  • Network Diagnostics — Per-protocol results show exactly which ports are open and which protocols succeeded
  • Export — Download logs as CSV for reporting and documentation

How to Access

Navigate to DiscoveryDiscovery Logs in the main menu.

Dashboard Overview

Summary Statistics

At the top of the page, summary cards display metrics for the selected time period:

CardDescription
Total ScansTotal number of scans executed
Success RatePercentage of successful scans
Status BreakdownCount per status with average duration

Understanding Scan Statuses

Each scan results in one of seven statuses:

StatusMeaningCommon Cause
SuccessScan completed with valid data collectedCredentials and network access working correctly
FailedScan encountered an error during executionCredential issues, permission problems, or system errors
TimeoutScan exceeded the time limitLarge system with many services, slow network, or overloaded target
UnauthorizedTarget ports are open but credentials were rejectedWrong username/password, expired credentials, or insufficient permissions
UnreachableHost is down or not responding to network requestsServer powered off, wrong IP, or network routing issue
No AccessHost is up but service ports are closed or filteredFirewall blocking required ports, service not running
RPC ErrorRPC or firewall blocking (Windows-specific)Windows Firewall blocking WMI/RPC ports, DCOM not configured

Log Table

The main table shows one row per scan attempt with the following columns:

ColumnDescription
ExpandClick to reveal full diagnostic details
TimestampWhen the scan was executed
AgentWhich discovery agent ran the scan
Target IPIP address that was scanned
Scan TypeProtocol used (WMI, SSH, SNMP, vCenter, Kubernetes, AWS, Azure)
StatusColor-coded result status
Discovery StatusMessage from the agent describing the outcome
DurationHow long the scan took
Quick SummaryHostname, host status, protocol results, and port count

Expanded Row Details

Click the expand arrow on any row to reveal three detailed sections:

General Information:

  • Scan ID (unique identifier)
  • Discovered hostname (if available)
  • Operating system detected
  • Agent version
  • Error message (if scan failed)

Network Reachability:

  • Host status (up, down, or unknown)
  • ICMP ping response (responds or no response)
  • Open TCP ports (listed individually)
  • Open UDP ports (listed individually)

Protocol Scan Results: For each protocol attempted (WMI, SSH, SNMP, vCenter, etc.):

  • Protocol status (success, failed, or skipped)
  • Port reachability
  • Probe method used
  • Error details or reason for skipping

Scan Statistics:

  • Services discovered count
  • Applications found count
  • Data size collected
  • Open ports count

Time Range

Quick presets for common time windows:

PresetRange
1hLast hour
6hLast 6 hours
24hLast 24 hours (default)
48hLast 48 hours
1wLast week
CustomSelect specific start and end dates

Filter Options

FilterDescription
Agent IDSearch for a specific agent
Target IPSearch for a specific IP address
Scan TypeFilter by protocol: WMI, SSH, SNMP, vCenter, Kubernetes, AWS, Azure
StatusFilter by result: Success, Failed, Timeout, Unauthorized, Unreachable, No Access, RPC Error

All filters work together (AND logic). Active filter count is shown on the filter toggle button.

Export

Click the Export button to download all visible logs as a CSV file. The export includes: timestamp, agent, target IP, scan type, status, discovery status, duration, error message, hostname, and operating system.

Common Use Cases

Why Did a Scan Fail?

  1. Filter by Target IP and set status to Failed
  2. Expand the failed log entry
  3. Check the Error Message for the specific failure reason
  4. Review Network Reachability — is the host up? Are the required ports open?
  5. Check Protocol Results — which protocol failed and why?

Is My Agent Working?

  1. Filter by Agent ID
  2. Review the success rate in the summary cards
  3. Look for patterns — are failures concentrated at specific times or IPs?
  4. Check agent version to ensure it's up to date

Which Hosts Are Unreachable?

  1. Set the status filter to Unreachable
  2. Review the list of hosts that didn't respond
  3. Export the list for network team investigation
  4. Cross-reference with your CMDB to identify impacted CIs

Diagnosing Credential Issues

  1. Filter by status Unauthorized
  2. Group results by scan type (WMI vs SSH vs SNMP)
  3. Check if the issue affects all targets or specific ones
  4. Verify credentials in the credential management settings

Firewall and RPC Issues (Windows)

  1. Filter by status RPC Error or No Access
  2. Expand the log entry and check Network Reachability
  3. Look for specific ports that are closed or filtered:
    • Port 135 (RPC Endpoint Mapper)
    • Port 445 (SMB)
    • Dynamic RPC range (49152-65535)
  4. Coordinate with your network team to open required ports

Relationship to Other Features

vs. Scan Data

FeaturePurpose
Discovery LogsMetadata and diagnostics about scan execution (did it work? why did it fail?)
Scan DataFull detailed information collected during successful scans (devices, apps, services)

Discovery Logs tell you what happened during a scan. Scan Data contains what was found.

Discovery Schedules and Agents

Every scan triggered by a discovery schedule automatically generates a log entry. You don't need to create logs manually — they're a byproduct of agent activity.

Log Retention

Discovery logs are retained for 30 days by default. Older logs are automatically cleaned up to manage storage. Administrators can adjust the retention period or trigger manual cleanup if needed.

Best Practices

Regular Monitoring

  • Check the success rate daily to catch agent or network issues early
  • Investigate any sudden drop in success rate — it often indicates credential expiry or network changes
  • Review timeout logs to identify systems that may need longer scan windows

Troubleshooting Approach

  • Start with the status filter to focus on the type of failure
  • Use the expanded details to get protocol-level diagnostics
  • Check network reachability before investigating credential issues — the host must be reachable first
  • Compare with recent successful scans of the same target to identify what changed

Audit and Compliance

  • Export logs periodically for compliance documentation
  • Use the timestamp and agent fields to verify that scheduled scans are running as expected
  • Keep the log retention period aligned with your audit requirements