You implement impersonation for agents on Windows the same way you do for agents on UNIX or Linux: when you configure a process step, you specify the local user credentials that are used when the step is processed. For impersonation purposes, a local user is a user whose user name and password are stored on the target computer and who is part of the administration group and has, at a minimum, the following privileges:
You can also impersonate the Windows LocalSystem account. The LocalSystem account is installed on every Windows system and is the equivalent of the root user on UNIX and Linux. It always has the privileges that are listed above.