NetworkDetective and Allowing Remote WMI Access in a WORKGROUP
Notes
- The “netsh firewall” command on the newer versions of Windows will say it is depreciated and to use “netsh advfirewall” instead. Even though it says this, it did execute the command.
- Network Detective will only attempt queries verse PINGABLE IP Addresses. Therefore, make sure the computers in the WORKGROUP are pingable. The following command can be used if Windows Firewall is enabled:
netsh firewall set icmpsetting type=ALL mode=enable
Steps to Enable Remote WMI Access
- Make sure you are using a username and password which matches between the client and the server.
- Allow RemoteAdmin access through Windows Firewall (if enabled): netsh firewall set service RemoteAdmin enable
- Enable DCOM (Distributed COM) permissions. This might not be needed if the user is in the local computer’s Administrator group on the computer. The Administrator group already has these settings by default (although, they could have been changed).
- dcomcnfg
- Component Services > Computers > My Computer
- Right click My Computer
- Click on Properties
- Click COM Security tab
- Click Edit Limits under Launch and Activation Permissions (NOTE: Not under Access Permissions)
- Click Add
- Locate the windows user or user group you want to add exclusive rights to and click OK
- Select the user you just added
- Allow all checkboxes
- Click OK
- Click Apply
- Close dcomcnfg
4. Enable WMI namespace access rights. This might not be needed if the user is in the local computer’s Administrator group on the computer. The Administrator group already has these settings by default (although, they could have been changed).
- wmimgmt.msc
- Right click WMI Control
- Click on Properties
- Click on Security tab
- Click Security at the bottom
- Click on Advanced
- Click Add
- Locate the windows user or user group you want to add exclusive rights to and click OK
- Change the Apply to: drop down menu to This namespace and subnamespaces
- Click box to check Execute Methods, Enable Account, and Remote Enable permissions
- Click OK
- Click Apply
- Click OK
- Close wmimgmt
5. Verify Windows Management Instrumentation service is Running
- services.msc
- Scroll to Windows Management Instrumentation
- Make sure it is running and set to Automatic
Extra Steps for Windows XP
Change ForceGuest setting in registry
- regedit.exe
- Expand HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control.
- Select Lsa.
- Change the value for the forceguest DWORD to 0:
Extra Steps for Windows 7 and Up
UAC blocks some (not all) WMI counters, resulting in error 80041003: The current user does not have permission to perform the action. . You can add the following registry key to disable this feature of UAC.
- regedit.exe
- Expand HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
- 3. Add a new DWORD value:
Name: LocalAccountTokenFilterPolicy
Value: 1
Testing Remote WMI Access
wmic /user:”user” /password:”yourpwd” /node:”hostname-or-ip” computersystem get name