Configuring the access list
This topic describes the access details that you require, depending on your configuration.
This sensor can be run using the ComputerSystem access credentials
used to discover the client.
This topic describes the access details that you require, depending on your configuration.