Configuring Windows Systems for Monitoring with WMI

Download this manual as a PDF file

Use the following menu options to navigate the SL1 user interface:

  • To view a pop-out list of menu options, click the menu icon ().
  • To view a page containing all of the menu options, click the Advanced menu icon ().

The following sections describe how to configure Windows Server 2012 and later and Windows desktop systems for monitoring by SL1 using SNMP:

Configuring WMI on Windows 2012 and Later Servers

Windows Management Instrumentation, or WMI, is the infrastructure that provides information about operations and management on Windows-based operating systems. WMI can be configured to respond to remote requests from SL1.

To configure a Windows device to respond to remote requests, you must perform the following steps:

Most remote requests can be performed by a standard (non-administrator) user account that has been granted specific privileges. However, some requests can be performed only by a user with elevated permissions. For requests performed by SL1 to a Windows server, the following users have elevated permissions:

  • The default "Administrator" user account.
  • A user account in the Administrators group on a Windows server that has User Account Control disabled.
  • A user account in the Administrators group on a Windows server where a registry entry has been added to disable remote User Account Control filtering.

For a list of WMI classes that require elevated permissions, see http://msdn.microsoft.com/en-us/library/windows/desktop/aa826699%28v=vs.85%29.aspx

For a list of default WMI Dynamic Applications that require elevated permissions, see the chapter on Dynamic Applications for Windows Devices.

Step 1: Configuring Services

The following services must be running for a Windows device to respond to remote WMI requests:

ScienceLogic recommends you set all these services to automatically start.

  • COM+ Event System

  • DCOM Server Process Launcher
  • Remote Procedure Call (RPC)
  • Remote Registry
  • Server
  • Windows Management Instrumentation

To ensure a service is running, perform the following steps:

  1. In the left pane of the Server Manager window, expand the Configuration section, and then select Services.

  1. For each required service, the Startup Type column should display Automatic. If a service does not have a Startup Type of Automatic, double-click on that service. The Properties window for that service is displayed:

  1. In the Startup Type field, select Automatic.
  2. Click the Apply button.
  3. If the service has not already started, click the Start button.

Step 2: Configuring the Windows Firewall

To configure Windows Firewall to accept remote WMI requests:

  1. Click the magnifying glass icon in the bottom-left corner and type "Command Prompt" in the Search Windows field.
  2. Execute the following two commands in the Command Prompt window:

netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes

netsh advfirewall firewall set rule group="remote administration" new enable=yes

  1. If the result of the second command is "No rules match the specified criteria", run the following two commands:

netsh firewall set service remoteadmin enable

netsh advfirewall firewall set rule group="remote administration" new enable=yes

Step 3: Configuring a User Account and Permissions

There are three ways to configure the user account that SL1 will use to perform WMI requests:

  1. To monitor the Windows server using WMI Dynamic Applications that require standard permissions, you can configure a standard user account for use by SL1. The user account for use by SL1 must be included in the Distributed COM Users and Performance Monitor Users groups. (For more information, consult Microsoft's documentation.)

  1. To monitor the Windows server using WMI Dynamic Applications that require elevated permissions, you can use the default "Administrator" user account. If you use the "Administrator" user account, you do not need to make changes to the User Account Control settings.

  1. To monitor the Windows server using WMI Dynamic Applications that require elevated permissions, you can also use a user account that is included in the Administrators group. However, you must perform one of the following additional steps to use this type of user account:

Configuring Namespace and DCOM Security Permissions

For each of these methods, you must ensure that the configured Namespace and DCOM security permissions allow that user to perform remote requests.

To configure the Namespace and DCOM security permissions:

  1. In the left pane of the Server Manager window, expand the Configuration section.
  2. Right-click on the WMI Control entry and then select Properties.

  1. In the WMI Control Properties window, click the Security tab:

  1. In the Security tab, select the Root entry from the navigation pane and then select the Security button. The  Security for Root window appears.

  1. In the Security for Root window, select the Advanced button. The Advanced Security Settings for Root window is displayed:

  1. In the Advanced Security Settings for Root window, click the Add button. The Select User, Computer, Service Account, or Group window appears.

  1. In the Select User, Computer, Service Account, or Group window :
  • In the Enter the object name to select field, enter the name of the user account that SL1 will use to perform WMI requests or the name of a group that includes that user account.
  • Click the Check Names button to verify the name and then click the OK button.

  1. The Permission Entry for Root window is displayed:
  • Select This namespace and subnamespaces in the Apply to field and select the Allow checkbox for all permissions.
  • Click the OK button.

  1. In the Advanced Security Settings for Root window, click the Apply button.
  2. Click the OK button in each open window to exit.
  3. Go to the Start menu and select Run.

  1. In the Run window, enter "dcomcnfg" and click OK. The Component Services window is displayed:

  1. In the left pane, expand Component Services > Computers. Right-click on My Computer and select Properties. The My Computer Properties window is displayed.

  1. In the My Computer Properties window, select the Default Properties tab:
  • Ensure that the Enable Distributed COM on this computer checkbox is selected.

  • Select Connect in the Default Authentication Level drop-down list.
  • Select Identify in the Default Impersonation Level drop-down list.
  • If you made changes in the Default Properties tab, click the Apply button.

  1. Select the COM Security tab:

  1. Select the Edit Limits... button in the Access Permissions pane.

  1. In the window that appears, click the Add... button. The Select Users, Computers, Service Accounts, or Groups window is displayed.
  • Enter the name of the user account that SL1 will use to perform WMI requests or the name of a group that includes that user account.
  • Click the Check Names button to verify the name and then click the OK button.

  1. Select the group or user you added in the Group or user names pane and then select the Allow checkbox for all permissions.
  2. Click the OK button.
  3. Click the Edit Default... button in the Access Permissions pane, then repeat steps 16 - 19.
  4. Click the Edit Limits... button in the Launch and Activation Permissions pane, then repeat steps 16 - 19.
  5. Click the Edit Default... button in the Launch and Activation Permissions pane, then repeat steps 16 - 19.
  6. Click the Apply button.
  7. Click Yes in the confirmation window.

Configuring User Account Control to Allow Elevated Permissions

If you want to use WMI Dynamic Applications that require elevated permissions to monitor a Windows server and you are using a user account other than the default "Administrator" user account, you must perform one of the following two tasks:

Option 1: Disabling User Account Control

To disable User Account Control:

  1. Open the Control Panel in Large Icon or Small Icon view.

  1. Select User Accounts.

  1. Select Change User Account Control Settings. The User Account Control Settings window is displayed:

  1. Move the slider to Never Notify.
  2. Click the OK button.
  3. Restart the Windows server.

Option 2: Adding a Registry Entry that Disables Remote User Account Control Filtering

To add a registry entry that disables remote User Account Control filtering:

  1. To disable the filter, open a text editor and add the following lines to a new file:
  2. Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]

    "LocalAccountTokenFilterPolicy"=dword:00000001

  1. Save the file with a ".reg" extension.
  2. In Windows Explorer, double click on the .reg file.
  3. Select Yes in the pop-up window.

Step 4: Configuring a Fixed Port for WMI

Specific ports must be opened to allow WMI monitoring when there is a separate firewall between the Data Collector and the device. This can occur when the default configuration of the Windows Firewall blocks incoming network traffic for the Windows Management Instrumentation (WMI) connection.

For the WMI connection to succeed, the remote machine must permit incoming network traffic on TCP ports 135, 445, and additional dynamically-assigned ports, typically in the range of 1025 to 5000 and 49152 to 65535.

To set up a fixed port for WMI, see the Microsoft documentation on Setting Up a Fixed Port for WMI.

Configuring WMI for Windows Desktop Systems

This section describes how to configure devices that are running a desktop version of the Windows operating system for monitoring by SL1 using WMI.

Before performing the tasks described in this section, you must know the IP address of each SL1 appliance in your network. If you have not installed a SL1 appliance, you must know the future IP address that will be used by each SL1 appliance.

To be monitored by SL1, a Windows device must be running the Windows 7 operating system or later.

TCP/IP must be installed and configured before you can install SNMP on a Windows device.

Windows Management Instrumentation (WMI) is the infrastructure that provides information about operations and management on Windows-based operating systems. WMI can be configured to respond to remote requests from SL1. To configure a device running a desktop version of the Windows operating system to respond to remote requests, you must perform the following steps:

The following instructions describe how to configure WMI on devices running a desktop version of the Windows 10 operating system. For instructions on how to configure WMI on earlier Windows versions, consult Microsoft's documentation.

Step 1: Configuring Services

The following services must be running for a Windows device to respond to remote WMI requests:

ScienceLogic recommends you set all these services to start automatically.

  • COM+ Event System

  • Remote Access Auto Connection Manager
  • Remote Access Connection Manager
  • Remote Procedure Call (RPC)
  • Remote Procedure Call (RPC) Locator
  • Remote Registry
  • Server
  • Windows Management Instrumentation
  • WMI Performance Adapter
  • Workstation

To ensure a service is running, perform the following steps:

  1. Click the magnifying glass icon in the bottom-left corner and type "Services" in the Search Windows field.

  1. Click the Services Desktop app.

  1. From the list of services in the right pane, perform the remaining steps for each of the services you want to check. This example uses Workstation. However, you should check each of the following services:

  • COM+ Event System

  • Remote Access Auto Connection Manager
  • Remote Access Connection Manager
  • Remote Procedure Call (RPC)
  • Remote Procedure Call (RPC) Locator
  • Remote Registry
  • Server
  • Windows Management Instrumentation
  • WMI Performance Adapter
  • Workstation

  1. Double-click the name of the service. In this example, we double-clicked Workstation.
  2. In the Workstation Properties dialog box, click the General tab and complete the following field:

  • Startup Type. Select Automatic.

  1. Click the Apply button.
  2. If the service has not already started, click the Start button.
  3. Repeat steps 4-7 for each service.

Step 2: Configuring Windows Firewall

To configure Windows Firewall to accept remote WMI requests:

  1. Click the magnifying glass icon in the bottom-left corner and type "Command Prompt" in the Search Windows field.
  2. Execute the following two commands in the Command Prompt window:

netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes

netsh advfirewall firewall set rule group="remote administration" new enable=yes

  1. If the result of the second command is "No rules match the specified criteria", run the following two commands:

netsh firewall set service remoteadmin enable

netsh advfirewall firewall set rule group="remote administration" new enable=yes

Step 3: Setting the Default Namespace Security

To set the default namespace security, perform the following steps:

  1. Click the magnifying glass icon in the bottom-left corner and type "Services" in the Search Windows field.

  1. Click the wmimgmt.msc Microsoft Common Console Document.

  1. In the WmiMgmt window, right click WMI Control (Local) and select Properties.

  1. In the WMI Control (Local) Properties window, click the Security tab, click Root, and then click the Security button.

  1. In the Security for Root window, click Administrators, and then click the Advanced button.

  1. In the Advanced Security Settings for Root window, click Administrators, and then click the Edit... button.

  1. In the Permission Entry for Root window, enter the following:

  • Type. Select Allow.

  • Applies to. Select This namespace and subnamespaces.
  • Permissions. Select the Execute Methods, Full Write, Partial Write, Provider Write, Enable Account, Remote Enable, Read Security, and Edit Security checkboxes.
  1. Click OK in this window and the following windows, and then close the WmiMgmt window.

Step 4: Setting the DCOM Security Level

To set the DCOM Security Level, perform the following steps:

  1. Click the magnifying glass icon in the bottom-left corner and type "dcomcnfg.exe" in the Search Windows field.

  1. Click the dcomcnfg.exe command.

  1. In the Component Services window, expand Component Services > Computers, right-click My Computer, and then select Properties.

  1. In the My Computer Properties window, click the Default Properties tab and then complete the following fields:

  • Enable Distributed COM on this computer. Select this checkbox.

  • Default Authentication Level. Select Connect.
  • Default Impersonation Level. Select Identify.

  1. In the My Computer Properties window, click the COM Security tab. Under Launch and Activation Permissions, click the Edit: Default... button.

  1. In the Launch and Activation Permission window, select the following:

  • Group or user names. Select Administrators.
  • Permissions for Administrators. Set Local Launch, Remote Launch, Local Activation, and Remote Activationto Allow.

  1. Click OK .

  1. In the My Computer Properties window, in the Launch and Activation Permissions pane, click the Edit Limits... button.

  1. In the Launch Permission window, select the following:

  • Group or user names. Select Administrators.

  • Permissions for Administrators. Set Local Launch, Remote Launch, Local Activation, and Remote Activationto Allow.
  1. Click OK in this window and the following windows, and then close the Component Services window.
  2. Restart the computer to save the settings.

Step 5: Disabling User Account Control

To monitor a device running Windows 7, 8, or 10, you must perform the following additional steps to disable the User Account Control (UAC) filter for remote logins:

  1. Use a text editor such as Notepad to create a new file.

  1. Include the following in the file.:
  2. Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]

    "LocalAccountTokenFilterPolicy"=dword:00000001

  1. Save the file with a name of your choice, like disableUAC.reg, to the directory of your choice. Make sure to save the new file with the .reg suffix.
  2. In Windows Explorer, double click on the .reg file to execute it.

Step 6: Configuring a fixed port for WMI

Specific ports must be opened to allow WMI monitoring when there is a separate firewall between the Data Collector and the device. This can occur when the default configuration of the Windows Firewall blocks incoming network traffic for the Windows Management Instrumentation (WMI) connection.

For the WMI connection to succeed, the remote machine must permit incoming network traffic on TCP ports 135, 445, and additional dynamically-assigned ports, typically in the range of 1025 to 5000 and 49152 to 65535.

To set up a fixed port for WMI, see the Microsoft documentation on Setting Up a Fixed Port for WMI.