Enabling Windows Management Instrumentation Guide



Similar documents
Patch Assessment Content Update Release Notes for CCS Version: Update

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Backup Exec Management Plug-in for VMware User's Guide

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Norton Small Business. Getting Started Guide

Symantec Enterprise Security Manager Agent for Linux PPC 64 Release Notes

Policy Based Encryption Essentials. Administrator Guide

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Client Firewall Policy Migration Guide

Backup Exec 15. Quick Installation Guide

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Mobile Management for Configuration Manager

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec ESM Agent For IBM iseries AS/400

Symantec Enterprise Vault

Symantec Mail Security for Microsoft Exchange

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT

Symantec Enterprise Vault

Symantec Enterprise Vault

Symantec Enterprise Vault

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Backup Exec 2010 R2. Quick Installation Guide

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide

Symantec Enterprise Vault

Symantec Security Information Manager 4.8 Release Notes

Symantec Enterprise Vault

Symantec Enterprise Vault

Symantec Enterprise Vault.cloud Compatibility List. March 13, 2015

Symantec Mobile Management 7.2 MR1Quick-start Guide

Using Backup Exec System Recovery's Offsite Copy for disaster recovery

Symantec Endpoint Protection Shared Insight Cache User Guide

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Symantec Endpoint Encryption Device Control Release Notes

Symantec Enterprise Vault

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Symantec Protection Center Enterprise 3.0. Release Notes

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Veritas Cluster Server Getting Started Guide

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec NetBackup Vault Operator's Guide

Encryption. Administrator Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec Virtual Machine Management 7.1 User Guide

Web Security Firewall Setup. Administrator Guide

Getting Started with Symantec Endpoint Protection

Symantec Critical System Protection Agent Event Viewer Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Critical System Protection Agent Guide

Boundary Encryption.cloud Deployment Process Overview

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec Enterprise Vault Technical Note

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

PGP CAPS Activation Package

Symantec NetBackup OpenStorage Solutions Guide for Disk

Configuring WMI on Windows Vista and Windows Server 2008 for Application Performance Monitor

Symantec ESM agent for IBM AS/400

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Drive Encryption for Windows

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Configuring Symantec AntiVirus for NetApp Storage system

Symantec Secure Proxy Administration Guide

Symantec Mail Security for Microsoft Exchange

Host OS Compatibility Guide

Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

IBM Lotus Protector for Mail Encryption

Symantec Enterprise Vault

Portal Administration. Administrator Guide

Symantec Enterprise Vault Technical Note. Backing up Enterprise Vault in a clustered environment. Windows

Symantec Protection for SharePoint Servers Getting Started Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Control Compliance Suite : Reporting and Analytics ReadMe Update

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Quick Reference. Administrator Guide

Symantec AntiVirus Corporate Edition Patch Update

Symantec Response Assessment module Installation Guide. Version 9.0

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Transcription:

Enabling Windows Management Instrumentation Guide

Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, ActiveAdmin, BindView, bv-control, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Enable Windows Management Instrumentation This document includes the following topics: Enable remote access to Windows Management Instrumentation (WMI) Further Investigation User Account Control (UAC) Enable remote access to Windows Management Instrumentation (WMI) WMI gets installed with all modern operating systems of Microsoft (Windows 2000, Windows XP, Windows 2003, Windows Vista and Windows 20081). This document describes the procedure to enable remote access to WMI. The following steps should take only a minute or two of your time. 1 Enable remote WMI requests Usually, you need to change this setting to get WMI working. (Steps 2 and 3 are typically not needed, but you may need them in some circumstances) On the target server, go to Administrative Tools -> Computer Management. Expand Services and Applications Right click WMI Control and select Properties.

6 Enable Windows Management Instrumentation Enable remote access to Windows Management Instrumentation (WMI) Select the Security tab. Click Security.

Enable Windows Management Instrumentation Enable remote access to Windows Management Instrumentation (WMI) 7 Add the monitoring user (if needed), and make sure you check Remote Enable for the user/group that is requesting WMI data.

8 Enable Windows Management Instrumentation Further Investigation At this point you can go back and check if this fixes the problem. It might take a couple of minutes to re-generate the reports. 2 Allow WMI through Windows firewall All users (including non-administrators) are able to query/read WMI data on the local computer. For reading WMI data on a remote server, you must onnect your management computer (where monitoring software is installed) to the server you are monitoring (the target server). If the target server is running Windows Firewall (Internet Connection Firewall) that is shipped with Windows XP and Windows 2003, then you must make sure it accepts remote WMI requests. Add the WMI service in the exception list. 3 Enable DCOM calls on the remote machine If the account you are using to monitor the target server is NOT an administrator on the target server, you need to enable the non-administrator to interact with DCOM by following simple steps listed on the Microsoft website.you can perform the following tasks: To grant DCOM remote launch and activation permissions for a user or group To grant DCOM remote access permissions Further Investigation If the above steps are do not help, Symantec recommends to install the WMI Administrative Tools from Microsoft website. This includes a WMI browser that lets you connect to a remote machine and browse through the WMI information. This helps to isolate any connectivity/rights issues in a more direct and simple environment. Once the WMI browser can access a remote machine, our products should be able to as well. Download the WMI administrative tools from the Microsoft website. http://www.microsoft.com/downloads/details.aspx? FamilyId=6430F853-1120-48DB-8CC5-F2ABDC3ED314&displaylang=en User Account Control (UAC) The reports we receive from the field let us know that UAC needs to be disabled for remote WMI queries to work. With UAC running, an administrator account actually has two security tokens, a normal user token, and an administrator token (which is only activated when you pass the UAC prompt). Unfortunately, remote

Enable Windows Management Instrumentation User Account Control (UAC) 9 requests that come in over the network get the normal user token for the administrator, and since there is no way to handle a UAC prompt remotely, the token cannot be elevated to the true-administrator security token.

10 Enable Windows Management Instrumentation User Account Control (UAC)