Install and uninstall Nmap on a MID Server
- UpdatedJul 31, 2025
- 8 minutes to read
- Zurich
- MID Server
If you decide to use credential-less Discovery in your network, you must install Nmap on each Windows MID Server that you want to use for this purpose. Self-hosted customers whose network security does not permit downloads from install.service-now.com must use a specific manual process to install and configure Nmap.
Before you begin
![]() |
- Assign MID Server IP ranges to all deployed MID Servers. The quickest and most reliable way to do this is with the Using MID Server IP range auto-assignment feature available in the Discovery Quick Start wizard. This method ensures that the set of MID Servers configured to access an IP address range is comprehensive.
- Identify the IP ranges you want to explore with credential-less Discovery. Ensure that these ranges can only be accessed by MID Servers with Nmap installed, running on supported Windows hosts.
- Use the All option for selecting IP ranges and observe these
requirements:
- Restrict the use of this feature to Windows MID Servers only.
- Ensure that Nmap is installed on each of these MID Servers.
- Ensure that the MID Servers can access the entire customer network.
- When you create a Discovery schedule with Nmap enabled, observe these requirements
for the MID Server selection options:
- Specific MID Cluster: Verify that Nmap is installed on all MID Servers in the cluster, where each MID Server in the cluster is configured to access the same set of IP ranges.
- Auto-Select Mid Server: When running horizontal Discovery, verify that Nmap is installed on at least one of the MID Servers that can access the Discovery schedule’s configured MID Server IP ranges.
- Specific MID Server: Verify that Nmap is installed on
each MID Server that can access the schedule’s configured MID Server IP Ranges.
Note: To use credential-less Discovery for Service Mapping, install Nmap on all MID Servers that can access the Discovery schedule’s configured MID Server IP ranges.
Role required: agent_admin
About this task
The Discovery - IP Based [com.snc.discovery.ip_based] plugin provides connection to the installer for Nmap and the programming elements that allow a Windows MID Server to run approved scripts on target CIs for credential-less Discovery. MID Servers on which Nmap is installed can execute an Nmap command configured to perform reverse DNS name resolution, discover MAC addresses, or gather OS information on target CIs without using credentials. The Discovery - IP Based plugin is activated automatically when the Discovery [com.snc.discovery] or Event Management and Service Mapping Core [com.snc.service-watch] plugins are activated.
- Service Mapping and Nmap
- Service Mapping does not check for the presence
of the Nmap capability and selects the MID Server based on the IP
address only. To ensure that Service Mapping does not select a MID Server without the
Nmap capability, install Nmap on all MID Servers assigned to
the IP address ranges for which you want credential-less Discovery to be available. If
Service Mapping selects a MID Server for credential-less Discovery that does not have
Nmap capabilities, this error message appears in the map at the site of the CI being
discovered:
Nmap is not installed on MID Server. Verify all MIDs configured to handle selected IP Address have Nmap Capability. Nmap root directory path does not exist: <path> - Amazon Web Service AWS
- Running Nmap scans to or from any resource within the Amazon Web Service AWS environment is tightly regulated and requires the permission of AWS through the AWS Vulnerability/Penetration Testing Request form. AWS only permits testing of EC2 and RDS instances that you own. Tests against any other AWS services or AWS-owned resources are prohibited. In addition, any Nmap scan of a permitted instance must be performed within an approved time window. For these reasons, credential-less Discovery within an AWS environment is not appropriate, and if a violation of their policy occurs, could result in expulsion from the service.
- Supported operating systems
- Nmap is supported on all editions of these operating systems, including
virtual machines and 64 bit systems:
- Windows 2012
- Windows 2016
- MID Server requirements
- Nmap can be installed on MID Servers that meet these requirements:
- Status is Up.
- MID Server is validated.
- MID Server does not already have the Nmap capability.
- MID Server must be logged in as a local admin if Nmap is not already installed. Administrative privleges are only necessary for the installation process. Once Nmap is installed, non-admin users can use and run credential-less discovery.Note: If there are multiple MID Servers installed on the same host machine and one of them has already installed Nmap using an admin user, the other MID Servers can enable credential-less discovery using a non-admin user.
Warning: The MID Server installation path must not contain the following characters:- ( )
- { }
- [ ]
Procedure
Install Nmap on a self-hosted system
Use this procedure to install Nmap on MID Server host machines in a self-hosted environment that does not allow network access to the ServiceNow® install.service-now.com download site.
Before you begin
Role required: admin, maint
About this task
Procedure
Uninstall Nmap on a self-hosted system
Use this procedure to uninstall Nmap in a self-hosted environment that does not allow network access to the ServiceNow install.service-now.com download site.
Before you begin
About this task
Procedure
