Account Permissions for Discovery
Entra ID
The Application Registration (mapped to an Azure Application Registration Secret) used for Entra ID Discovery must be assigned to the following roles:
-
EntitlementManagement.Read.All
-
RoleManagement.Read.Directory
-
User.Read.All
Unix
Local Accounts
The scanning account needs to be able to connect over SSH and read the contents of /etc/passwd
. If Discovery needs to take over an account then the scanning account will also need the ability to run sudo passwd <username>
passwd
command is also used and the default local settings will apply.SSH Public Keys
The scanning account needs the ability to login and execute sudo
without a password prompt.
ESXi
The scanning account needs Shell Access and the Query VRM Policy permission.
Local Windows Accounts
The scanning account needs the Access this computer from the network permission (and possibly one more) on the endpoint:
-
Access the windows command line and run
gpedit.msc
. The Local Group Policy Editor window will open. -
Go to Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment.
-
Double-click the Access this computer from the network policy. The properties for the policy appear.
-
Ensure the scanning account is one of the listed users. If not, click the Add User or Group button to add it.
Modifying this policy may overwrite or remove access to the device for remote processes. This policy is not usually configured by default, so any existing inherited permissions could be overwritten. -
Look at the following list of operating systems and updates to determine if any of them match your system:
- Windows 10, version 1607 and later
- Windows 10, version 1511 with KB 4103198 installed
- Windows 10, version 1507 with KB 4012606 installed
- Windows 8.1 with KB 4102219 installed
- Windows 7 with KB 4012218 installed
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012 R2 with KB 4012219 installed
- Windows Server 2012 with KB 4012220 installed
- Windows Server 2008 R2 with KB 4012218 installed
For more information on this security issue, see Network access: Restrict clients allowed to make remote calls to SAM. -
If you found a match, do the following:
-
Go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options.
-
Double-click the Network access: Restrict clients allowed to make remote calls to SAM policy. The policy properties appear.
-
Click the Edit Security button to select an account for the Security descriptor text box. The Security Setting for Remote Access to SAM dialog box appears.
-
Ensure the scanning account is present (if not add it).
-
Click the account in the Group or user names list. The permissions for that account appear.
-
Ensure the Allow checkbox next to the Remote Access permission is selected.
-
Click the OK button.
-
Windows Services, Scheduled Tasks, App Pools, and COM+ Applications
To scan for service accounts, the account entered must be a domain account that is in the Administrators group on the target machine(s). Follow the instructions below in either case to ensure your account has the appropriate privileges to run a successful scan:
-
Access the windows command line and run
gpedit.msc
. The Local Group Policy Editor window will open. -
Go to Computer Configuration > Preferences > Control Panel Settings.
-
Right-click Local Users and groups and select New > Local Group.
-
Leave the Action dropdown list set to Update.
-
Click to select Administrators (Built-in) in the Group Members drop-down list.
-
Click the Add… button.
-
Search for the account you will use for Discovery scanning.
-
Click the OK button to save your changes.
The next time the group policy updates across your environment, the discovery account will be a part of the local administrators group.
-
For stronger security, we suggest configuring the group policy to limit the login privileges of the Discovery account:
This will also require you to use a different account (separate from the discovery account) to rotate dependencies.-
Access the windows command line and run
gpedit.msc
. The Local Group Policy Editor window will open. -
For your domain policy, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment.
-
Add your discovery account to the Deny log on locally policy.
-
Add your discovery account to the Deny log on through Remote Desktop Services policy.
-
(Optional) Ensure the account is not part of the remote desktop users group.
-
-
Do not put dependency changers in these policies:
-
Deny access to this computer from the network.
-
Deny log on Locally.
-
-
We recommend putting dependency changers in these policies:
-
Deny log on as a batch job.
-
Deny log on as a service.
-
Deny log on through Remote Desktop Services.
-