See the following for more information:
Discovering and Adding Host and Non-Host Targets
Discovering Fabrics
Using Incident Management
Monitoring and Managing Targets