Configuring the access list

This topic describes the access details that you require, depending on your configuration.

This sensor can be run using the ComputerSystem access credentials used to discover the client.