A new Flexera Community experience is coming on November 25th. Click here for more information.
MgsIPScan is a customized version of Nmap that uses raw IP packets to discover inventory in your environment. During FlexNet Manager Suite’s discovery and inventory process:
If your devices aren’t discovered as you expected, you can manually trigger the MgsIPScan executable to identify any issues that have occurred. MgsIPScan utilizes the same command-line parameters as NMAP. For full details on the parameters in use, refer to the NMAP Reference Guide.
Before running MgsIPScan manually, confirm that your devices to be discovered are:
The MgsIPScan executable is separate from the main BeaconEngine executable file.
When the discovery process is run, MgsIPScan is triggered with command-line parameters like the example below.
20xx-01-02 16:00:00,000 [iscovery.NMapDiscovery|IPScan] [INFO ] Command line for mgsipScan: -p T:22,139,443,445,U:443 -oX "C:\Windows\TEMP\ManageSoft\discovery\mgsipscan-t-20xx11_16000-xxxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.xml" -PI -sS -sU <target IPs>
NOTE: You can amend your command-line for MgsIPScan output similarly to run MgsIPScan manually for your own discovered devices.
Program Files (x86)\Flexera Software\Inventory Beacon\RemoteExecution\MgsIPScan\MGSIpScan.exe -p T:22,139,443,445,U:443 -oX "C:\Windows\TEMP\ManageSoft\test.xml" -PI -sS -sU <target IPs>
After receiving the output results from running MgsIPScan, answer the following questions to further troubleshoot.
If the relevant port(s) are reported as CLOSED or FILTERED, contact your network or firewall teams.
You can also manually test TCP port accessibility using the below PowerShell command:
Test-NetConnection -ComputerName <Enter target name or IP here> -Port <Port number>
on Feb 09, 2023 12:43 PM - edited on Apr 21, 2023 01:23 PM by HollyM