Thank you for your feedback.
Form temporarily unavailable. Please try again or contact docfeedback@servicenow.com to submit your comments.

Discovery probe permissions

Log in to subscribe to topics and get notified when content changes.

Discovery probe permissions

Several probes require additional permissions to run.

Discovering Active Connections

Discovery uses the Windows - Active Connections probe to access active connection information. The application dependency mapping feature requires this probe to function.
Table 1. Discovering Active Connections
Probes Additional Permissions
Windows - Active Connections Ability to invoke the \root\CIMV2:Win32_Process object

Access to the $admin share

Access to the %SystemRoot%\temp directory

Discovering Application Profiles

Discovery uses these probes to access application profile information.
Table 2. Discovering Application Profiles
Probes Additional Permissions
Windows - Get APD Environment Files

Windows - Get APD Env File Content

Windows - Get APD Version File Content

Ability to invoke the \root\CIMV2:Win32_Process object

Access to the $admin share

Access to the %SystemRoot%\temp directory

Discovering VMware Workstation

Attention: The Discovery of VMware Workstation is not supported in releases after Kingston. The VMware workstation probe and sensor are not included in new instances of London. However, customers who upgrade from a release prior to Kingston can continue to use the probe and sensor to discover VMware Workstation.
Discovery uses the Windows - Get VMware Workstation probe to access information about VMware virtual machines installed on Windows.
Table 3. Discovering VMware Workstation
Probes Additional Permissions
Windows - Get VMware Workstation Ability to invoke the \root\CIMV2:Win32_Process object

Access to the $admin share

Access to the %SystemRoot%\temp directory

Configure the PATH variable to include the path to the vmrun.exe command. This command is typically found in the VMware Workstation install directory.

Discovering MSSQL

Discovery uses the Windows - MSSQL probe to access information about Microsoft SQL Server installed on Windows.
Table 4. Discovering MSSQL
Probes Additional Permissions
Windows - MSSQL
  • Access to the Win32_Process object
  • Access to the Win32_Service object
  • Access to the Win32_NetworkAdapterConfiguration object
  • Access to the Microsoft.SqlServer.Management.Smo object
  • Access to run the nbtstat command
  • Access to HKLM\SOFTWARE\Microsoft\Microsoft SQL Server\InstalledInstances
  • Access to HKLM\SOFTWARE\Microsoft\MSSQLServer\$instanceName\SuperSocketNetLib\Tcp\TcpPort where $instanceName is an array of possible values.
Feedback