User`s guide

Table Of Contents
Getting Started with VCM Components
and Tools
6
Getting Started with VCM Components and
Tools
When you use VCM, you must understand user access, how to start VCM from any physical or virtual
machine, and familiarize yourself with the VCM portal features.
n
"Understanding User Access" on page 71
User access determines who has access to VCM and with what roles.
n
"Log In to VCM" on page 72
Access VCM from any physical or virtual machine in your network.
n
"Getting Familiar with the Portal" on page 73
The VCM portal provides access to all VCM features to manage your environment.
Understanding User Access
User access determines who has access to VCM and with what roles. To manage your user access, you
create rules that are assigned to roles. The roles are then assigned to each user login you create in VCM.
User access is managed in the Administration User Manager node.
The user account that was used to install VCM is automatically granted access to VCM, placed in the roles
of ADMIN and USER, and placed into the Admin role. This user can log in to VCM using the Admin role.
The AD_Admin role allows full administration access to AD objects only.
When a user is added to the Admin role in VCM or granted access to the Administration User Manager
node, that user is placed in the fixed machine roles Security Administrators and Bulk Insert Administrators
Groups. They are also added to the database roles of public, ADMIN, and User in the VCM Database.
Users who will not have access to the Administration User Manager node will be assigned to public.
Depending on the functions granted to a user, they might need additional or fewer privileges for their role
to function properly.
VCM provides a Change Restricted role to limit users from making certain changes in your environment.
With this role, users can discover, collect data from machines, assess machines, display bulletin and
template details, check for updates, and view history. Users can add, edit, and delete reports, compliance
rules and rule groups, and compliance and patch assessment templates.They can also install the Agent,
upgrade VCM, and uninstall VCM.
When you apply the VCM Change Restricted role to a user’s VCM login, they cannot perform the
following actions.
VMware, Inc. 71