Skip to content

Commit cdae4f3

Browse files
authored
Merge pull request #901 from ritza-co/edit-1033-windows
1033: Proofread changes, windows-and-hyper-v-auto-discovery.mdx
2 parents 62ecaf0 + 82d815a commit cdae4f3

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/auto-discovery/windows-and-hyper-v-auto-discovery.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Device42 discovery uses multiple protocols to communicate with the target device
1010

1111
## Prerequisites
1212

13-
When using WMI, you need to install Windows Discovery Service (WDS) and connect to your Remote Collectors (RCs) before setting up your Windows discovery job. For WDS installation instructions and information, visit the [Windows Discovery Service Installation](/getstarted/installation/windows-discovery-service-installation.mdx) documentation.
13+
When using WMI, you need to install the Windows Discovery Service (WDS) and connect to your Remote Collectors (RCs) before setting up your Windows discovery job. For WDS installation instructions and information, visit the [Windows Discovery Service Installation](/getstarted/installation/windows-discovery-service-installation.mdx) documentation.
1414

1515
### WinRM Network Requirements
1616

@@ -402,9 +402,9 @@ While it's best to use an admin account for complete discovery, you can try the
402402

403403
Use the `sc.exe sdset scmanager` command to grant `SC_MANAGER_CONNECT` permission to the user:
404404

405-
- First, [find the SID](https://www.ninjaone.com/blog/how-to-find-user-security-identifier/) of the non-admin user account you want to grant permission to.
405+
- First, [find the SID](https://www.ninjaone.com/blog/how-to-find-user-security-identifier/) of the non-admin user account that you want to grant permission.
406406

407-
- Next, as an admin user, add the non-admin user account’s SID to the following command and execute it in PowerShell:
407+
- Next, as an admin user, add the non-admin user's SID to the following command and execute it in PowerShell:
408408

409409
```bash
410410
sc.exe sdset scmanager "D:(A;;CC;;;AU)(A;;CCLCRPRC;;;IU)(A;;CCLCRPRC;;;SU)(A;;CCLCRPWPRC;;;SY)(A;;KA;;;BA)(A;;CC;;;AC)(A;;CCLCRPRC;;;SID_OF_DISCOVERY_USER)"

0 commit comments

Comments
 (0)