Email Print 01 November 2011 Authentication Authentication The best results you get when the plugin's security context has necessary rights to perform the probing. Most variations work anyway but are not guaranteed.