Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
How to Discover Host Connection by Shell
This task includes the following steps:
-
Prerequisites - Set up protocol credentials
This discovery uses the following protocols:
-
NTCMD protocol
-
SSH protocol
-
Telnet protocol
- Universal Discovery protocol
Note To discover Windows machines running an SSH server, set the Shell Command Separator attribute of the protocol to AutoDetect.
For credential information, see Supported Protocols.
-
-
Prerequisites - Host Connection by Shell job
When running the Host Connection by Shell job to discover Windows machines on which an SSH server running the F-Secure application is installed, you must make the following modifications to F-Secure:
-
Stop the F-Secure service completely.
-
Verify that there are no F-Secure leftover processes still running (fssh* processes).
-
Alter the following lines in the sshd2_config file. This is an F-Secure configuration file that resides in the F-Secure installation directory.
-
The DoubleBackspace setting should contain a no value, that is,
DoubleBackspace no
. -
The EmulationType setting should contain a raw value, that is,
EmulationType raw
. -
The EmulationTypeForCommands setting should contain a raw value, that is,
EmulationTypeForCommands raw
.
-
-
Save the altered sshd2_config file.
-
Restart the F-Secure service.
Note The Data Flow Probe enables an SSH-based connection to remote Windows machines only if the remote SSH server providers are Open-SSH or F-Secure.
For Open-SSH (that provides SSH servers for the Windows, UNIX, and Linux operating systems), DFM supports connections to Open-SSH only if the Open-SSH version is later than, or equal to, 3.7.1 (for any operating system).
-
-
Run the discovery
Run the Host Connection by Shell job.
For details on running jobs, refer to "Module/Job-Based Discovery" in the HPE Universal CMDB Data Flow Management Guide.
Note The Data Flow Probe enables an SSH-based connection to remote Windows machines only if the remote SSH server providers are Open-SSH or F-Secure.
For Open-SSH (that provides SSH servers for the Windows, UNIX, and Linux operating systems), DFM supports connections to Open-SSH only if the Open-SSH version is later than, or equal to, 3.7.1 (for any operating system).