Network Discovery Identity Conflict Settings
The system determines which operating system and applications are running on a host by matching fingerprints for operating systems and servers against patterns in traffic. To provide the most reliable operating system and server identity information, the system collates fingerprint information from several sources.
The system uses all passive data to derive operating system identities and assign a confidence value.
By default, unless there is an identity conflict, identity data added by a scanner or third-party application overrides identity data detected by the system. You can use the Identity Sources settings to rank scanner and third-party application fingerprint sources by priority. The system retains one identity for each source, but only data from the highest priority third-party application or scanner source is used as the current identity. Note, however, that user input data overrides scanner and third-party application data regardless of priority.
An identity conflict occurs when the system detects an identity that conflicts with an existing identity that came from either the active scanner or third-party application sources listed in the Identity Sources settings or from a system user. By default, identity conflicts are not automatically resolved and you must resolve them through the host profile or by rescanning the host or re-adding new identity data to override the passive identity. However, you can set your system to automatically resolve the conflict by keeping either the passive identity or the active identity.
Generate Identity Conflict Event
Specifies whether the system generates an event when an identity conflict occurs.
Automatically Resolve Conflicts
From the Automatically Resolve Conflicts drop-down list, choose one of the following:
-
Disabled if you want to force manual conflict resolution of identity conflicts
-
Identity if you want to the system to use the passive fingerprint when an identity conflict occurs
-
Keep Active if you want the system to use the current identity from the highest priority active source when an identity conflict occurs