Before being able to scan and detect devices, we need to provide credentials which will be used to correctly authenticate on different hosts to collect data and other needed parameters. This page let you define credentials used to monitor Windows machines. We use WMI protocol for this purpose in order to be agentless.
Click the « Add » button to add a new entry and repeat the step for any additional WMI credential that you may have. Once completed, click the « Next » button to continue.