Submit a ticketCall us

AnnouncementsWeb Help Desk Integrations eCourse

Looking to reduce response times? Sign up for our eCourse to learn how integrating Web Help Desk with Dameware Remote Support, Network Configuration Manager, Network Performance Monitor, and Server & Application Monitor can improve communication efficiencies.

Register here.

Home > Success Center > ipMonitor > ipMonitor - Knowledgebase Articles > Verify WMI settings on the system being monitored

Verify WMI settings on the system being monitored

Table of contents

Updated March 11, 2016


This article describes how to verify WMI settings on a system being monitored.


All ipMonitor versions


WARNING: This procedure requires the modification or creation of a registry key. Changing the registry can have adverse effects on your computer and may result in an unbootable system. Consider backing up your registry before making these changes. 


  1. As remote WMI connections use RPC, the RPC Service must be enabled and started on the remote system.
    1. Log in to the remote system.
    2. Open the Windows Services list on that system.
    3. Verify that the Remote Procedure Call (RPC) service is enabled and started.
  2. As WMI also uses DCOM to communicate with the remote system, it must be enabled and configured correctly on the remote system.
    1. Log in to the target server with an administrator account.
    2. Verify that the user account you want to use to monitor resources over WMI has local access and remote access.
    3. Verify that the user account you want to use to Monitor resources over WMI has local launch, remote launch, local activation, and remote activation.
  3. Verify WMI Security to ensure that the account used by the ipMonitor credential can access the CIMV2 namespace. The user account you want to use to access this computer should be granted the following permissions:
    • Enable Account
    • Remote Enable
      Note: If you are monitoring a target in a workgroup, you need to disable remote User Account Control (UAC). This is not recommended, but it is necessary when monitoring a workgroup computer. Disabling remote user account control does not disable local user account control functionality.​ Refer to Disable Remote User Account Control for Workgroups.
  4. If the target computer has Windows Firewall enabled, it must have a Remote WMI exception to allow remote WMI traffic through (Connecting to WMI Remotely with VBScript (© 2017 Microsoft, available at, obtained on February 15, 2017)) . To add this exception:
    1. At a command prompt, enter netsh firewall set service RemoteAdmin enable
    2. Enter exit

Last modified