Setup Overview
The Deployment and Setup section outlines everything you need to get DMC running smoothly in your environment. It covers supported scan targets, system requirements, credential handling, and step-by-step guidance for executing the tool.
This section is designed to help both technical and non-technical users deploy DMC with confidence, ensuring a secure, efficient, and transparent setup process.
Getting Started
An overview of which platforms DMC can scan — including supported operating systems, environments, and what’s currently out of scope.
Detailed requirements for running DMC, prerequisites, user permission and network access.
Security and Data Collection
A breakdown of what data is collected from Windows and Linux targets — with clarity on the commands used and the purpose of each metric.
Explains how DMC handles credentials, stores output, enforces access controls, and adheres to best practices for in-memory and audit-safe execution.