|id||The standard ID of an auto-incrementing integer.|
|name||The standard 'name' of a collection item. Ideally should be unique.|
|org_id||The Org that owns this entry.|
|description||The standard description field.|
|options||Unused at present. Options fields within the Open-AudIT schema are generally designed to hold a stringified JSON object.|
|edited_by||The user that created or last edited this entry.|
|edited_date||The standard date/time this entry was created or last edited.|
Must Respond To Ping. If set, Nmap will fist attempt to send and listen for an ICMP response. If the device does not respond, no further scanning will occur.
Previously a device did not have to respond to a ping for Open-AudIT to continue scanning.
Use Service Version Detection. When a detected port is detected as open, if set to 'y', Nmap will query the target device in an attempt to determine the version of the service running on this port.
This can be useful when identifying unclassified devices. This was not previously used.
|open|filtered||Consider Open|Filtered Ports Open. An open|filtered port is considered open (and will trigger device detection).|
Previously, Open-AudIT considered an Nmap response of "open|filtered" as a device responding on this port.
This has caused some customers issues where firewalls respond on behalf of a non-existing device, and hence cause false positive device detection. We now have this attribute available to set per scan.
Consider Filtered Ports OpenA filtered port is considered open (and will trigger device detection).
|timing||The standard Nmap timing options. Previously set at T4 (aggressive).|
|nmap_tcp_ports||Top Nmap TCP Ports. The top 10, 100, 1000 ports to scan as per Nmaps "top ports" options. Previously we scanned the Top 1000 ports (the Nmap standard).|
|nmap_udp_ports||Top Nmap UDP Ports. The top 10, 100, 1000 ports to scan as per Nmaps "top ports" options. Previously we scanned UDP 161 (snmp) only.|
|tcp_ports||Custom TCP Ports. Any specific ports we would liuke scanned in addition to the Top TCP Ports. Comma seperated, no spaces.|
|udp_ports||Custom UDP Ports. Any specific ports we would liuke scanned in addition to the Top UDP Ports. Comma seperated, no spaces.|
|The below fields can be overwritten by an individual discovery, while still "using" a discovery_scan_options item for these if they're not set in the discovery.|
|timeout||Timeout per Target. Wait for X seconds for a target response.|
|exclude_tcp||Exclude any ports listed from being scanned. Comma seperated, no spaces.|
|exclude_udp||Exclude any ports listed from being scanned. Comma seperated, no spaces.|
|exclude_ip||Exclude IP Addresses (individual IP - 192.168.1.20, ranges - 192.168.1.30-40 or subnets - 192.168.1.100/30) listed from being scanned. Comma seperated, no spaces.|
|ssh_port||Scan for this port(s) and if detected open, use this port for SSH communication. This is added to the list of Custom TCP POrts above, so there is no need to include it in that listr as well. Comma seperated, no spaces.|