As long as the credentials supplied give the appropriate authorization on the monitored machine then nothing else is required.
The two domains do NOT need a trust relationship. So when monitoring a machine in domain B from domain A the credentials used need to be a user in domain B if domain B doesn't trust A.
A user in domain A can be used if domain B trusts domain A.