{"id":302,"date":"2022-03-01T18:46:04","date_gmt":"2022-03-01T18:46:04","guid":{"rendered":"https:\/\/ouritsource.com\/blog\/?p=302"},"modified":"2025-05-29T22:07:24","modified_gmt":"2025-05-29T22:07:24","slug":"servicenow-discovery","status":"publish","type":"post","link":"https:\/\/ouritsource.com\/blog\/servicenow-discovery\/","title":{"rendered":"ServiceNow Discovery"},"content":{"rendered":"<body>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>The ServiceNow Discovery application finds computers and other devices connected to an enterprise\u2019s network. When Discovery finds a computer or device, it explores the device\u2019s configuration, provisioning, and current status and updates the CMDB accordingly.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>On computer systems, Discovery also identifies the software that is running and any TCP connections between computer systems. Discovery creates all the relationships between computer systems (such as an application on one server that uses a database on another server).<\/p><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">GAINING CREDENTIALS<\/h3>\n\n\n\n<p>#1 step in a ServiceNow Discovery implementation is gaining the credentials to run discovery on your network. \u00a0Discovery applications are invasive and powerful, they do scan and obtain information all about your company infrastructure. \u00a0This requires a lot of rights and access.<\/p>\n\n\n\n<p>There is large ServiceNow Wiki article on this subject:\u00a0<a target=\"_blank\" href=\"http:\/\/wiki.servicenow.com\/index.php?title=Credentials#gsc.tab=0\" rel=\"noreferrer noopener\">Discovery Credentials<\/a>\u00a0I suggest reading that article and being very familiar with it before asking security for credentials. \u00a0Going into those meetings without the proper information and stakeholder backing, will cause \u201cdifficulty\u201d in obtaining the proper rights. \u00a0<\/p>\n\n\n\n<p>Security expects you know what you are doing in order to turn over that level of access. \u00a0I suggest being prepared for those discussions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SETTING UP INITIAL DISCOVERY<\/h3>\n\n\n\n<p>I do not recommend just \u201cturning on\u201d ServiceNow Discovery when you get the credentials. Plan out what you want to discovery and test small range sets.<\/p>\n\n\n\n<p><strong>Some Setup Tasks I recommend<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Buy Discovery<\/li><li>Activate Discovery Plugin<\/li><li>Setup Credentials<\/li><li>Setup Port Probes<\/li><li>Deploy Midservers to access network<\/li><li>Setup Discovery Schedule and Range Sets<\/li><li>Try small range set for testing<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">UNDERSTANDING THE DISCOVERY PROCESS<\/h3>\n\n\n\n<figure class=\"wp-block-image\" id=\"yui_3_17_2_1_1646159855381_87\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/images.squarespace-cdn.com\/content\/v1\/527e1ef4e4b0910bac781301\/1435608332146-0GCOTUWUPNDMZ7PJX3HH\/image-asset.png?w=640&#038;ssl=1\" alt=\"\" loading=\"lazy\"><\/figure>\n\n\n\n<p>Understanding the discovery lifecycle is important to understanding how it works and what to do if it doesn\u2019t or if you want to change it.<\/p>\n\n\n\n<p><strong>Port Scan Phase<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Discovery Schedule or Discover Now Runs<\/li><li>Shazzam (Port Probes) Run. \u00a0Checks for open ports for configured probes. \u00a0If no ports are open for configured probes, discovery stops.<\/li><\/ol>\n\n\n\n<p><strong>Classification Phase<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Depending on what ports were open on Port Scan Phase, Probes will run. For example: WMI. \u00a0If Windows WMI port was open, WMI Probe, Windows \u2013 Classify will run<\/li><li>Sensor will return results. \u00a0If there are bad credentials for for the Probe, discovery fails for this CI.<\/li><li>CI is given a class and classified. \u00a0<\/li><\/ol>\n\n\n\n<p><strong>Identification Phase<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>If CI is Classified, Identify probes runs<\/li><li>It is determined to update or insert a new CI<\/li><\/ol>\n\n\n\n<p><strong>Exploration Phase<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>All remaining probes run and sensors return results and update CI, related lists, and relationships.<\/li><li>\u00a0A\u00a0<em>business rule<\/em>\u00a0is a server-side script that runs when a record is displayed, inserted, updated, or deleted, or when a table is queried.\u00a0It is event driven.<\/li><\/ol>\n\n\n\n<p><strong>Note: <\/strong>Patterns are used in the Identification and Exploration phases of horizontal discovery. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">VALIDATE RESULTS<\/h3>\n\n\n\n<p>Running a CMDB unchecked is not a good idea. \u00a0If you are using ServiceNow Discovery, you should run reports to determine if the CMDB is accurate. \u00a0Are you discovering the anticipated number of CIs? \u00a0Many factors can decide whether you are discovering too much or too little.<\/p>\n\n\n\n<p>I suggest setting periodic meetings to check CMDB data for accuracy and eliminate duplicates. \u00a0One idea is to generate a monthly incident to make sure maintenance is completed.<\/p>\n\n\n\n<p>Here is an article about how to build duplicate record reports:\u00a0<a target=\"_blank\" href=\"http:\/\/www.servicenowelite.com\/blog\/2013\/11\/22\/duplicate-record-scripts\" rel=\"noreferrer noopener\">Duplicate Record Scripts<\/a><\/p>\n\n\n\n<p>Here are some examples of other reports you can build (Some are included in the base system)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Blank IP<\/li><li>CIs Not Discovered<\/li><li>Duplicate CI by IP Address<\/li><li>Duplicate CI by Serial Number<\/li><li>Not Classified<\/li><li>Not Responding<\/li><li>Connection Errors<\/li><\/ul>\n\n\n\n<p>Tags\u00a0<a href=\"https:\/\/www.servicenowelite.com\/blog?tag=IT+Operations+Management\">IT Operations Management<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Patterns are used in the Identification and Exploration phases of horizontal discovery. <\/p>\n\n\n\n<p><\/p>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>The ServiceNow Discovery application finds computers and other devices connected to an enterprise\u2019s network. When Discovery finds a computer or device, it explores the device\u2019s configuration, provisioning, and current status and updates&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-302","post","type-post","status-publish","format-standard","hentry","category-servicenow","no-thumbnail"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/posts\/302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":2,"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/posts\/302\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/posts\/302\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/media?parent=302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/categories?post=302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ouritsource.com\/blog\/wp-json\/wp\/v2\/tags?post=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}