Host enumeration is the process of gaining specific particulars regarding a defined host. It is not enough to know that a server or wireless access point is present; instead, we need to expand the attack surface by identifying open ports, the base operating system, services that are running, and supporting applications.
This is highly intrusive and, unless care is taken, the active reconnaissance will be detected and logged by the target organization.