Deployment and Setup
The Deployment and Setup section outlines everything you need to get DMC running smoothly in your environment. It covers supported scan targets, system requirements, credential handling, and step-by-step guidance for executing the tool.
This section is designed to help both technical and non-technical users deploy DMC with confidence, ensuring a secure, efficient, and transparent setup process.
Getting Started
An overview of which platforms DMC can scan — including supported operating systems, environments, and what’s currently out of scope.
Detailed requirements for running DMC, prerequisites, user permission and network access.
Security and Data Collection
A breakdown of what data is collected from Windows and Linux targets — with clarity on the commands used and the purpose of each metric.
Explains how DMC handles credentials, stores output, enforces access controls, and adheres to best practices for in-memory and audit-safe execution.