Configuring the access list

This topic describes the access details that you require, depending on your configuration.

There are no specific access requirements. This sensor can be run using the ComputerSystem access credentials used to discover the client.