Configure wmi on windows 2008




















Open topic with navigation. Version: Latest 8. Windows Management Instrumentation, or WMI, is the infrastructure that provides information about operations and management on Windows-based operating systems. WMI can be configured to respond to remote requests from SL1. To configure a Windows device to respond to remote requests, you must perform the following steps:.

Most remote requests can be performed by a standard non-administrator user account that has been granted specific privileges. However, some requests can be performed only by a user with elevated permissions. For requests performed by SL1 to a Windows server, the following users have elevated permissions:. The following services must be running for a Windows device to respond to remote WMI requests:.

ScienceLogic recommends you set all these services to automatically start. To ensure a service is running, perform the following steps:. For each required service, the Startup Type column should display Automatic. If a service does not have a Startup Type of Automatic , double-click on that service. The Properties window for that service is displayed:. To configure Windows Firewall to accept remote WMI requests, execute the following two commands at the console:. To monitor the Windows server using WMI Dynamic Applications that require elevated permissions , you can also use a user account that is included in the Administrators group.

However, you must perform one of the following additional steps to use this type of user account: Option 1: Make the user a member of the Distributed COM Users and Performance Monitor Users groups, in addition to the Administrator group. For more information, consult Microsoft's documentation.

Option 2: Configure User Access Control to allow elevated permissions. For each of these methods, you must ensure that the configured Namespace and DCOM security permissions allow that user to perform remote requests.

In the Security for Root window, select the Advanced button. The Advanced Security Settings for Root window is displayed:. In the Select User, Computer, Service Account, or Group window : In the Enter the object name to select field, enter the name of the user account that SL1 will use to perform WMI requests or the name of a group that includes that user account. Click the Check Names button to verify the name and then click the OK button.

The Permission Entry for Root window is displayed: Select This namespace and subnamespaces in the Apply to field and select the Allow checkbox for all permissions. Click the OK button. In the Run window, enter "dcomcnfg" and click OK. The Component Services window is displayed:. Select the COM Security tab:. In the window that appears, click the Add Enter the name of the user account that SL1 will use to perform WMI requests or the name of a group that includes that user account.

Buy Now Download Free Trial. Expand 'Services and Applications' 3. Select the Security tab 5. Press the Security button 6. Are users deleting important files? Or accidentally moving folders? PA File Sight knows who did it, and what computer they used. Prevent information leaks. Protect against ransomware. Powerful and easy to use file access auditing. Free Trial No signup needed No obligation trial.

No credit card needed. Learn more Run the following on the target computer if it is running a Windows firewall: netsh firewall set service RemoteAdmin enable. Enable DCOM calls on the remote machine If the account you are using to monitor the target server is NOT an administrator on the target server, you need to enable the non-administrator to interact with DCOM by following the simple steps listed here.



0コメント

  • 1000 / 1000