Submit a ticketCall us

Have You Auto Renewed? If not, you're missing out.
The SolarWinds Renewal Program comes with a host of benefits including the most recent product updates, 24/7 technical support, virtual instructor-led training and more. Experience all of this with the convenience of Auto Renewal, and never worry about missing any of these great benefits. Learn More.

Home > Success Center > ipMonitor > Verify WMI settings on the system being monitored

Verify WMI settings on the system being monitored

Table of contents

Updated March 11, 2016

Overview

This article describes how to verify WMI settings on a system being monitored.

Environment

All ipMonitor versions

Steps

WARNING: This procedure requires the modification or creation of a registry key. Changing the registry can have adverse effects on your computer and may result in an unbootable system. Consider backing up your registry before making these changes. 

 

  1. As remote WMI connections use RPC, the RPC Service must be enabled and started on the remote system.
    1. Log in to the remote system.
    2. Open the Windows Services list on that system.
    3. Verify that the Remote Procedure Call (RPC) service is enabled and started.
  2. As WMI also uses DCOM to communicate with the remote system, it must be enabled and configured correctly on the remote system.
    1. Log in to the target server with an administrator account.
    2. Verify that the user account you want to use to monitor resources over WMI has local access and remote access.
    3. Verify that the user account you want to use to Monitor resources over WMI has local launch, remote launch, local activation, and remote activation.
  3. Verify WMI Security to ensure that the account used by the ipMonitor credential can access the CIMV2 namespace. The user account you want to use to access this computer should be granted the following permissions:
    • Enable Account
    • Remote Enable
      Note: If you are monitoring a target in a workgroup, you need to disable remote User Account Control (UAC). This is not recommended, but it is necessary when monitoring a workgroup computer. Disabling remote user account control does not disable local user account control functionality.​ Refer to Disable Remote User Account Control for Workgroups.
  4. If the target computer has Windows Firewall enabled, it must have a Remote WMI exception to allow remote WMI traffic through (Connecting to WMI Remotely with VBScript (© 2017 Microsoft, available at https://msdn.microsoft.com/, obtained on February 15, 2017)) . To add this exception:
    1. At a command prompt, enter netsh firewall set service RemoteAdmin enable
    2. Enter exit

       
Last modified

Tags

Classifications

Public