Installation guide

Table Of Contents
Getting Started with VCM
1
Getting Started with VCM
When you use VCM, you must understand user access and how to start VCM from any physical or virtual
machine. You must also familiarize yourself with the VCM Web Console features.
n
"Understanding User Access" on page 11
User access determines who has access to VCM and with what roles.
n
"Log In to VCM" on page 12
Access VCM from any physical or virtual machine in your network.
n
"Getting Familiar with the Portal" on page 13
The VCM Web Console provides access to all VCM features to manage your environment.
Understanding User Access
User access determines who has access to VCM and with what roles. To manage your user access, create
rules that are assigned to roles. VCM assigns the roles to each user login you create. User access is
managed in the Administration User Manager node.
The user account that was used to install VCM is automatically granted access to VCM, placed in the roles
of ADMIN and USER, and placed into the Admin role. This user can log in to VCM using the Admin role.
The AD_Admin role allows full administration access to AD objects only.
When a user is added to the Admin role in VCM or granted access to the Administration User Manager
node, that user is placed in the fixed machine roles Security Administrators and Bulk Insert Administrators
Groups. They are also added to the database roles of public, ADMIN, and User in the VCM Database.
Users who will not have access to the Administration User Manager node will be assigned to public.
Depending on the functions granted to a user, they might need additional or fewer privileges for their role
to function properly.
VCM provides a Change Restricted role to limit users from making certain changes in your environment.
With this role, users can discover, collect data from machines, assess machines, display bulletin and
template details, check for updates, and view history. Users can add, edit, and delete reports, compliance
rules and rule groups, and compliance and patch assessment templates.They can also install the Agent,
upgrade VCM, and uninstall VCM.
When you apply the VCM Change Restricted role to a user’s VCM login, they cannot perform the
following actions.
VMware, Inc.
11