1.4 Security Considerations

No integrity protection is provided for inventory data because it is collected from agents. Because access to inventory data could provide information on how to attack a machine in the Management Zone, Asset Inventory should only be used in a secure environment. In addition, the database where the inventory data is stored should also be protected.

To avoid security threats, Windows managed devices have restricted permissions when accessing network drives for the processes which run in System context. The ZENworks Adaptive Agent can detect Network drives only with administrator privilege access.