AnsweredAssumed Answered

What privilege(s) does everyone use for Trusted Scanning?

Question asked by QM_SSJ4 on Jul 6, 2011

I am in the beginning stages of enabling Trusted Scanning with Unix and Windows auth records (no CyberArk) and am very interested to hear from the Community how many are using the Administrator & Root Delegation that is recommended for detecting the most Vulnerabilities possible in your scans?


I've heard/participated in both sides of the argument so any thoughts, experiences, alternatives, etc. on doing this from those who have made the leap before me would be greatly appreciated...