The WMI collector in the MAP Toolkit is used to gather hardware, device, and software information from remote Windows based computers. This collector technology is used for these inventory scenarios and must be enabled on the remote target computers.
The Inventory and Assessment Wizard will not provide an option to enable WMI: You must enable it through Group Policy settings, logon scripts, or manually on each computer.
To connect remotely and perform the WMI inventory, you must provide accounts that are members of the local Administrators group on the computer being inventoried. For most networks, the network administrator will have a domain or local account that is a member of the local Administrators group on all the computers in the environment. These are the accounts you should enter on the Active Directory Credentials page in the Inventory and Assessment Wizard to perform the WMI inventory. By default, in Windows domain environments, the Domain Admins security group is added to the local Administrators group on a computer when it is joined to a domain.
Many host-based and software-based firewall products will block DCOM traffic across the network adapters on the computer. For example, remote WMI connections will likely fail when attempting to connect to a computer running the Microsoft Internet Security and Acceleration (ISA) Server firewall service. To enable remote WMI access, make sure that the appropriate TCP/UDP ports are open on the computer running the software firewall.
If your firewall doesn't accept listing a service like WMI or Remote Administration, you will also need to open ports 135 and 1024-65535. The reason for this has to do with the way RPC works. WMI uses DCOM to communicate with remote machines, and DCOM uses RPC extensively.
When a computer boots, WMI is assigned a dynamic port by the RPC service. When the MAP computer makes a WMI request, it first talks to the target computer’s RPC Endpoint Mapper which is listening on port 135 and asks it what port has WMI been assigned. The RPC Endpoint Mapper replies with the port for that machine and then MAP sends the WMI query to that port. The port can be different for each machine that MAP tries to connect to, which is why we can’t be more specific than 1024-65535; since many applications and services use RPC for remote communications, this is how they work as well.
See this MSDN topic to force WMI to use a static port. (http://msdn.microsoft.com/en-us/library/bb219447(VS.85).aspx)
Computers running Windows Firewall introduce some challenges to the inventory process. By default, Windows Firewall is configured to block remote requests to authenticate and connect to the computer via WMI. The following sections describe how to enable the required exceptions using Group Policy and scriptable commands.
Use the Group Policy Editor or the Group Policy Management Console to edit Group Policy for the organizational units (OUs) that contain the computers on which you will perform the assessment. For instructions, see the following resources:
You need to enable the Remote Administration exception for computers that have Windows Firewall enabled. This exception opens TCP port 135 used by RPC and DCOM. If you have another host firewall installed or a network firewall, you will need to consult that system's documentation on allowing the WMI service through the firewall.
After saving the policy changes, you need to wait for up to two hours for the Group Policy settings to be applied to the client computers.
For computers in a workgroup, you need to manually configure each computer. For computers in a Windows NT® 4.0–based domain, use logon scripts to configure the Windows Firewall exceptions.
If a computer is in a workgroup and the local account used for inventory does not have a password configured, logon is limited to the console by default. For a WMI inventory of the computer to be successful, the local account needs to be a member of the local Administrators group and must have a password defined.
If the computer is in a workgroup, you must manually change the “Network access: Sharing and security model for local accounts” policy setting from Guest only to Classic on the local computer.
For more information, see Network access: Sharing and security model for local accounts.
To successfully inventory computers in a workgroup that are running operating systems that support User Account Control (UAC):
Alternatively, you can use an account that is part of a local Administrators group and has UAC disabled for that account.
For more information about handling remote connections of this type, please check this link http://msdn.microsoft.com/en-us/library/aa826699(VS.85).aspx.
From a command prompt run the following command, or run it from logon script on each computer to enable the remote administration exception:
netsh firewall set service RemoteAdmin enable
netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes
Ed Price - MSFT edited Revision 13. Comment: Removing "(en-US)" from the title. Sorry. That community-driven practice came as a surprise to us, and we had to take time to get the Wiki Community Council to decide on it. Thanks!
Michael Board [MSFT CSG] edited Revision 15. Comment: Added anchor to WMI In AD
Michael Board [MSFT CSG] edited Revision 16. Comment: Added anchors to WMI in NT and Firewall considerations
Michael Board [MSFT CSG] edited Revision 17. Comment: Added scenarios to list of "wmi required for..."
Michael Switzer [MSFT CSG] edited Original. Comment: HTML edit
Michael Switzer [MSFT CSG] edited Revision 1. Comment: HTML Edit
Michael Switzer [MSFT CSG] edited Revision 5. Comment: modified title for consistancy
Michael Switzer [MSFT CSG] edited Revision 6. Comment: Updated with current version of WMI info
Michael Switzer [MSFT CSG] edited Revision 7. Comment: Added content index link
Michael Switzer [MSFT CSG] edited Revision 9. Comment: Removed workgroup firewall instructions that were incorrect
Fernando Lugão Veltem edited Revision 10. Comment: added toc
This is great stuff. It is exactly the explanation I was looking for.
This is really great stuff. Especially at the very bottom, that was really helpful.
Richard Mueller edited Revision 11. Comment: Fixed zeros in <a name> tags in HTML so TOC works