Discovery Scan Options
Performs a port scan before the discovery scan performs service version verification. Sends flags and commands to the Nmap executable. Discovery scan does not support the following Nmap options: Appends additional TCP ports to port scan. By default, the port scan covers a small, but wide range of ports. Use this option if you want to add more ports to the scan. Excludes certain TCP ports from service discovery. By default, the port scan covers a specific range of ports. Use this option to add a port that you want to exclude from the scan. Specifies a range of TCP ports for the discovery scan to use instead of the default ports. If you set a custom TCP port range, the discovery scan ignores all default ports and uses the range that you define instead. Specifies the TCP source port that the discovery scan uses instead of the default port. Use this option to test firewall rules. Fast detect: Common TCP ports only Performs a scan on the most common TCP ports, which reduces the number of ports that the discovery scan scans. Controls the Nmap timing option. Choose from the following timing templates:Insane (5) - Speeds up the scan. Assumes that you are on a fast network and sacrifices accuracy for speed. Scan delay is less than 5 ms.Aggressive (4) - Speeds up the scan. Assumes that you are on a fast and reliable network. Scan delay is less than 10 ms.Normal (3) - The default port scan speed. Does not affect the scan.Polite (2) - Uses less bandwidth and target resources to slow the scan.Sneaky (1) - Use this port scan speed for IDS evasion. Determines the amount of time Nmap spends on each host. The default value is 5 minutes. Scan SNMP community strings Launches a background task that scans for devices that respond to a variety of community strings. Sets the discovery scan to find all unknown services and applications on the network. Single scan: scan hosts individually Runs a scan on individual hosts. The discovery scan scans the first host entirely and stores the information in the database before it moves onto the next host. Dry run: only show scan information Prepares the Nmap command line, but does not execute the command line. Web scan: run the Pro Web Scanner Automatically runs a web scan, web audit, and web exploit along with a discovery scan. It is generally recommended that you do not enable this option unless you are running a scan against a very small set of hosts. If you are running a discovery scan against a large number of hosts, you should run the web scanner separately from the discovery scan. Defines the SMB user name that the discovery scan uses to attempt to login to SMB services. Defines the SMB password that the discovery scan uses to attempt to login to SMB services.
![]() |