Configuring the access list
This topic describes the access details that you require, depending on your configuration.
There are no specific access requirements. This sensor can be run using the ComputerSystem access credentials used to discover the client.