Administer > Audit and compliance > Overview and prerequisites > ESXi servers > Minimum Windows and VMware Permissions for ESXi Audit Functions

Minimum Windows and VMware permissions for ESXi audit functions

ESXi audits use an integration user for listing ESXi targets and servers, and running the PowerCLI scripts. You might have already created this user if you use SA VMware virtualization. This section describes how to control access for the integration user.

Windows permissions

This section describes the user Windows account required to use ESXi servers.

  1. Create a non-administrator user account, for example, SAUser.
  2. Minimize this user’s access in accordance with your company’s security policies.

For more information about virtualization users, see "Virtualization management" in the SA 10.51 Use section.

VMware permissions

This section describes VMware roles required to use ESXi servers. These steps include: setup a VMware role with host-only access, create a permission with our integrated user, in that role, and apply it to all the hosts that you want to manage.

  1. Create a VMware role with all privileges and host-only access.


  2. Select the Hosts tab.
  3. Assign permissions:
    1. Right-click on the selected hosts to bring up the context menu.
    2. Click Add Permission…
    3. Select the role created in step 1.
    4. Add the integrated user.
    5. Uncheck the Propagate to Child Objects box (if permissions are propagated to the VMs, even host-only permissions, then those VMs will appear in SA as agentless devices).
    6. Add the vCenter to SA Virtualization. If the vCenter has already been added, run the Reload Data job.