View a markdown version of this page

Required permissions for the discovery tool - AWS Transform

Required permissions for the discovery tool

The discovery tool connects to your infrastructure using several protocols. Each protocol and collection module requires specific account permissions. This section describes the minimum permissions needed for complete data collection, and what data you lose if certain permissions are unavailable.

VMware vCenter

The discovery tool connects to VMware vCenter Server on port 443 (HTTPS) and performs read-only operations. No changes are made to your vCenter environment.

Minimum required role: Read-Only, assigned at the vCenter root level.

The Read-Only role provides all the access the discovery tool needs to collect VM inventory (name, UUID, CPU, memory, disk, network, power state, guest OS) and performance metrics (CPU utilization, memory utilization, disk IOPS and throughput).

Recommendation: Create a dedicated vCenter user with the built-in Read-Only role at the root datacenter level.

Hyper-V hosts (Windows)

The discovery tool connects to Hyper-V hosts over WinRM (port 5985 for HTTP, port 5986 for HTTPS) and runs PowerShell commands to collect VM inventory, host metadata, and storage performance.

Minimum required group memberships on each Hyper-V host:

Windows group Why it's needed
Remote Management Users Baseline WinRM remote access
Hyper-V Administrators VM inventory collection (VM list, disk, network, memory, guest OS)
Performance Monitor Users Storage I/O performance counters (read/write IOPS and throughput per VM)

The account also needs WMI read access to the root\cimv2 namespace for host OS version and hardware UUID. This access is granted by default for local administrators but must be configured explicitly for non-administrator accounts.

Recommendation: Create a dedicated domain service account and add it to the Remote Management Users, Hyper-V Administrators, and Performance Monitor Users groups on each Hyper-V host. Avoid using domain administrator accounts.

Linux servers (SSH)

The discovery tool connects to Linux servers over SSH (port 22) to collect OS metrics, network connections, and server inventory. Most data collection runs as a regular user. A small number of commands attempt sudo and automatically fall back if sudo is unavailable.

Minimum required access: An SSH user account that can log in to the target server.

Recommended access: The same SSH user configured with passwordless sudo for complete data collection.

What requires sudo and what happens without it:

Data collected Sudo needed? What you lose without sudo
Server name, OS, CPU, memory, IP, disk count No Nothing — collected as regular user
CPU, memory, and network utilization No Nothing — collected as regular user
Disk IOPS, throughput, and space No Nothing — collected as regular user
Network interface configuration No Nothing — collected as regular user
Running processes (name, PID, command) No Nothing — collected as regular user
Server UUID and SMBIOS UUID Yes UUID fields are empty in the export
Hardware manufacturer (physical vs. virtual detection) Yes Resource type detection is less accurate on older distributions
LVM logical volume detection Yes LVM volumes not detected; volume type may show as "Unknown"
Network connections with process name and PID Yes Connections are still collected, but without process attribution (PID and process name columns are empty)
Note

The discovery tool never fails entirely due to lack of sudo. It collects what it can and reports partial results. However, for the most complete data — especially network dependency mapping with process names — we recommend passwordless sudo.

Required utilities on target servers: The following commands should be available (installed by default on most Linux distributions): ss or netstat, lsblk, top, ps, free, ip, df, hostname, cat, nproc, and grep. Optional for additional data: iostat (disk I/O detail), dmidecode (hardware UUID), smartctl (disk interface type), lvdisplay (LVM detection).

Windows servers (WinRM) — OS metrics

The discovery tool connects to Windows servers over WinRM to collect OS metrics (server inventory, performance, storage, network interfaces, and running processes).

Minimum required access: A WinRM-enabled user account with remote access to the target server.

Recommended access: A user in the local Administrators group for complete data collection.

Permission level What it enables What you lose without it
Remote Management Users (WinRM access) All Windows data collection No data collected from the server
WMI read access to root\cimv2 Server name, OS version, memory, UUID, BIOS serial, disk space Server inventory fields are empty
Performance Monitor Users CPU utilization, network throughput, disk IOPS and throughput Performance metrics not collected
Local Administrator Running process owner names Process list collected but the user/owner column is empty
Note

Local Administrator membership implicitly grants Performance Monitor Users access and WMI read access, so it satisfies all requirements above.

Windows servers (WinRM) — Database collection (SQL Server)

Database collection discovers SQL Server instances, Reporting Services (SSRS), and Integration Services (SSIS) on Windows servers.

Recommended access: A user in the local Administrators group on each target Windows server.

Local Administrator is recommended because database discovery queries multiple WMI namespaces and requires elevated access for some operations:

What is discovered Permission needed What you lose without it
SQL Server Database Engine instances (version, edition, status) WMI read access to root\Microsoft\SqlServer\ComputerManagement* namespaces SQL Server instances not discovered
SQL Server Reporting Services (SSRS) WMI read access to root\Microsoft\SqlServer\ReportServer namespaces SSRS components not discovered
SSRS URL and port configuration Elevated privileges (Local Admin) SSRS URL reservation details missing
SQL Server Integration Services (SSIS) Registry read access (HKLM) SSIS version and edition missing
Port-to-service association Access to TCP listener enumeration Cannot associate listening ports with database services
Note

Database collection is Windows-only. The discovery tool skips Linux servers for database discovery.

Network collection

Network collection uses different protocols depending on the server's operating system:

Server OS Protocol Permissions needed
Linux SSH Regular user for connection data. Passwordless sudo recommended for process-level details (PID and process name).
Linux SNMPv2 A read-only community string with access to the TCP MIB (tcpConnState, tcpConnectionProcess) and Host Resources MIB (hrSWRunName).
Linux SNMPv3 A USM user with read access to the same MIBs as SNMPv2. Supports noAuthNoPriv, authNoPriv, and authPriv security levels.
Windows WinRM WMI read access to the root\StandardCIMV2 namespace (MSFT_NetTCPConnection class).

Quick reference: Minimum permissions by use case

Use case Account type Minimum permissions
VMware VM discovery vCenter user Read-Only role at root datacenter level
Hyper-V VM discovery Windows domain or local account Remote Management Users + Hyper-V Administrators + Performance Monitor Users on each host
Linux OS metrics — full data SSH user Passwordless sudo
Linux OS metrics — partial data SSH user Regular user (no sudo). UUID, manufacturer, LVM, and network process info will be missing.
Windows OS metrics — full data WinRM user Local Administrator
Windows OS metrics — basic data WinRM user Remote Management Users + WMI read access to root\cimv2
SQL Server database discovery WinRM user Local Administrator
Network collection — Linux (SSH) SSH user Passwordless sudo for process-level data; regular user for connection data only
Network collection — Linux (SNMP) SNMP community string or USM user Read access to TCP and Host Resources MIBs
Network collection — Windows WinRM user WMI read access to root\StandardCIMV2