1 of 1 people found this helpful
Take a look at this KB54752 which I think will answer all of your questions.
You can locate the KB system at this link. https://mysupport.mcafee.com/Eservice/templatepage.aspx?sURL=3#
Thanks for the response. As it turns out, this is the same response Support gave me when I logged a case for it. I'm looking for some more specific information for VMware ESX in particular.
What I guess I'm really after is details from someone who has actually set this up for ESX scanning and how they have created the login, etc, etc.
There isn't a specific way for us to assure you that you will identify as many vulns as MVM is capable of without providing root access. The more access the MVM system has the more likely it is to identify vulnerabilities. Even with ESX there is plenty of customization options, so the definitive way to be assured that you are providing the most accurate data is with root. But MVM is also meant to be flexible enough for administrators to mold it to their needs. That is why we provide the list of commands which MVM could run in any of our scripts which may be identified for that system. It is up to you to determine how much or how little access you would like to grant to the system, for the user account you have working with MVM. I hope this helps, there really is no exact answer, but hopefully we have provided you with the information necessary for you to be able to meet the needs of your particular environment.