WMI log collection using a non-admin domain user

PI Mappings use Windows Integrated Security to authenticate users on the Data Archive. With this method, users and services connect directly to the Data Archive using their Windows account. A PI Mapping grants a Windows user or group specific rights on the Data Archive by assigning a PI Identity. This method of authentication has several ... ................
................