Yeah, at minimum, you should likely be getting the Domain Computers account.
In your ADSI path for your scanning target on the AD User/Group path, are you using the root of the domain being scanned (i.e. DC=subdomain,DC=sampledomain,DC=local) or are you mapping to a specific OU (i.e. OU=Network Users,DC=subdomain,DC=sampledomain,DC=local)?
If you're mapping to a specific OU, you may need to add more OUs to make sure the scanning captures all the data needed. So in the example below, Groups and Users are in separate OUs
DC=subdomain,DC=sampledomain,DC=local
├── Network Computers
│ └── # OUs for computer types
├── Network Groups
│ └── # OUs for type of groups
├── Network Users
│ └── # OUs for user types
├── Users
│ └── # Default AD location with built-in AD Groups
...
In this case, if I don't go to the root level and want to capture all of my OUs, I'll have to add 4 different User/group paths to make sure that everything can be scanned and associated together
- OU=Network Computers,DC=subdomain,DC=sampledomain,DC=local
- OU=Network Groups,DC=subdomain,DC=sampledomain,DC=local
- OU=Network Users,DC=subdomain,DC=sampledomain,DC=local
- OU=Users,DC=subdomain,DC=sampledomain,DC=local
The "easy" way would be to use the root of the domain (DC=subdomain,DC=sampledomain,DC=local), but as admins, we should err toward giving scanners the least amount of privileges needed to accomplish what we're trying to do.