What kind of account will I need to perform a full scan (intrusive) of AIX/Unix systems? We are using MVM 7.0
Most of our intrusive scripts don't require credentials - but will try the actual exploit against the targets. Not a good idea on production systems!
if you're asking about running with credentials, please see the following KB Article for a list of commands the User needs to be able to run:
I hope that helps!Cathy