Trouble shooting WMI connectivity issues on target machines Contents WMI Connectivity Troubleshooting .............................................................................................................. 2 Troubleshooting Sequence ....................................................................................................................... 2 Pre Requisites............................................................................................................................................ 3 DCOM Impersonation and Authentication Settings ............................................................................. 3 COM Security Settings........................................................................................................................... 4 WMI Control Settings ............................................................................................................................ 4 Firewall Exceptions ............................................................................................................................... 5 Running WMI Diagnosis Utility ................................................................................................................. 5 Microsoft utilities to test WMI connectivity ............................................................................................. 6 Connecting to XP / Windows 2003 behind Windows Firewall ................................................................. 6 To configure Connection 1 .................................................................................................................... 6 Connecting to Vista / Windows 2008 and above behind Windows Firewall ............................................ 7 To enable or disable WMI traffic using firewall UI ............................................................................... 7 To enable or disable WMI traffic at command prompt using WMI rule group .................................... 7 Some common error scenarios ................................................................................................................. 8 Error message [0x80041003]: The current user does not have permission to perform the action ..... 8 Error message [0x80070005]: Access is denied .................................................................................... 9 Error message [0x800706BA]: The RPC server is unavailable............................................................. 12 Troubleshooting remote errors .......................................................................................................... 13 Enabling Account privileges in WMI ....................................................................................................... 14 Monitoring remote targets in local WORKGROUP (Vista / Windows 2008) ........................................... 14 Common errors encountered while connecting to WMI from a remote machine ................................ 15 Useful web links ...................................................................................................................................... 16 Links related to WMI Configuration.................................................................................................... 16 Links related to WMI troubleshooting ................................................................................................ 16 Test scenarios we need to test out ......................................................................................................... 16 Page 1 Trouble shooting WMI connectivity issues on target machines WMI Connectivity Troubleshooting Troubleshooting Sequence When an organization reports WMI connectivity issue through our application, the first thing to do is to test the connectivity issue outside our product environment thru’ the wbemtest (Windows Management Instrumentation Tester) utility. This is a utility that comes part of the operating system and has to be run from the DOS console on the machine from which WMI connection is being attempted. When WMI connectivity thru the wbemtest utility fails, the connectivity from the product would always fail. I am yet to see an instance when wbemtest succeeds and our application fails to connect. It would be safe to ignore this scenario. For our product to work correctly, we need access to the following namespaces. a. \\server_ip\root b. \\server_ip\root\default c. \\server_ip\root\cimv2 Replace server_ip with the ip address of the target host. Avoid using NETBIOS names. The user name in the ‘Connect’ dialog of ‘wbemtest’ should be in the format ‘Domain_Name\User_Name’. Give the appropriate password and leave the Authority & LOCALE fields as BLANK. Set the ‘Impersonation Level’ as ‘Impersonate’ and Authentication Level as ‘Packet’. Each namespace has to be connected independently. Note down the error number (it would be a hexadecimal number) that wbemtest tool reports when connection attempts fail. Next, refer to the section ‘Pre Requisites’ in the ‘WMI Troubleshooting Tips.docx’. All the mention pre requisites have to be fulfilled for the connectivity to go through. Important links that would help us in understanding the configuration needs are as follows Description Connecting to WMI on a Remote Computer (Windows) WMI Service Log Files (Windows) Connecting thru Windows Firewall Connecting to WMI Remotely starting with Windows Vista Securing a remote WMI connection (has details on DCOM configuration entries. Very important link) Using Distributed COM with Firewalls URL http://msdn.microsoft.com/en-us/library/aa389290(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa827355(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa389286(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa822854(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa393266(VS.85).aspx http://msdn.microsoft.com/en-us/library/ms809327.aspx Next, refer to the section ‘Some common error scenarios’. If the error number falls in the list mentioned in the document, apply the fixes as mentioned and try connecting thru’ wbemtest again. If the mentioned fixes do not help solve the problem, the following steps should be tried out. a. Microsoft provides a script called WMIDiag.vbs that can be used to analyze the WMI readiness of a specific target to allow successful inbound WMI connections. Refer to the section ‘Running WMI Diagnosis Utility’. The organization should try out the suggestions mentioned in the Page 2 Trouble shooting WMI connectivity issues on target machines document to rectify the connectivity issue. Request the organization to pass on these output files to us as well for our analysis as well. b. If the diagnosis script does not help in solving the problem, we need to trace the wmi calls on the host and the target. Refer to the section ‘Troubleshooting Remote errors’. The organization has to send the files in the directory %windir%\system32\wbem\logs. Pre Requisites WMI works in conjunction with RPC and DCOM. TCP ports 135 and 445 must be available on the target machines to get WMI connection is being attempted. Services Remote Procedure Call (RPC), Windows Management Instrumentation (WMI) and DCOM Server Process Launcher (DcomLaunch) should be running. Preferably, the startup type of these services should be set as ‘Automatic’. DCOM should be enabled. Verify the following registry key “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\EnableDCOM” should have the value “Y” DCOM Impersonation and Authentication Settings WMI has default DCOM impersonation, authentication, and authentication service (NTLM or Kerberos) settings that the target computer (Computer B) in a remote connection requires. Computer B operating system Windows 2000 (WMI 1.5) Windows XP Professional Windows Server 2003 Windows Vista Impersonation level scripting string Authentication level scripting string Authentication service Impersonate Connect Kerberos Impersonate Pkt Kerberos Impersonate Impersonate Pkt Pkt Kerberos Kerberos The following GUI can be reached by typing ‘dcomcnfg’ in the Start Run command box Page 3 Trouble shooting WMI connectivity issues on target machines COM Security Settings Choose the ‘COM Security’ TAB as mentioned in the previous screenshot Click ‘Edit Limits’ button in the ‘Launch and Activate Permissions’ groupbox. Add the user name that would be used for WMI connection in the ‘Group or user names’ list box For this user, in the ‘Permissions for Everyone’ listbox, enable the Local Launch, Remote Launch, Local Activation and Remote Activation permissions. WMI Control Settings WMI Control can be reached from Computer Management -> Services and Applications -> WMI Control We need to set up the appropriate permissions for three namespaces viz. 1. root 2. root\DEFAULT Page 4 Trouble shooting WMI connectivity issues on target machines 3. root\cimv2 Right click WMI Control and navigate to the Properties menu. Choose the Security TAB. Highlight Root and click Security button. In the Groups or User Names listbox, add the user name that would be used to establish WMI connection to this machine. For this user, the following permissions should be set in the ‘Permissions for Authenticated Users’ groupbox in the Security tab. a. Enable Account b. Remote Enable c. Click the Advanced button. Choose the appropriate user and click Edit button. In the Apply To combo box, choose ‘This namespace and subnamespaces’. Click Ok and close Advanced Security settings. Expand Root and navigate to the DEFAULT namespace. Highlight DEFAULT and click Security button. As done for the root namespace, assign the ‘Enable Account’ and ‘Remote Enable’ permissions for root\DEFAULT namespace Expand Root and navigate to the cimv2 namespace. Highlight cimv2 and click Security button. As done for the root namespace, assign the ‘Enable Account’ and ‘Remote Enable’ permissions for root\cimv2 namespace Firewall Exceptions Fire the following command to allow WMI connection requests to filter thru the firewall netsh firewall set service type=remoteadmin mode=enable If firewall is ON and if the above exception is not added, error 0x800706ba would pop up. Running WMI Diagnosis Utility The following steps should be implemented on the machine to which WMI connectivity has to be established Download the utility from the following URL o http://www.microsoft.com/downloads/details.aspx?familyid=D7BA3CD6-18D1-4D05B11E-4C64192AE97D&displaylang=en Extracting the download should generate a VB script file named WMIDiag.vbs Open a command prompt and run the command “cscript WMIDiag.vbs” The process should generate a report in .txt format and also generate additional log files as mentioned in the report document. Please inspect the document for inconsistencies in the WMI configuration and rectify the same. After rectifying the configuration, run the script WMIDiag.vbs again to confirm that the WMI settings are in order. Page 5 Trouble shooting WMI connectivity issues on target machines Microsoft utilities to test WMI connectivity Download WMI Tools from the following URL o http://www.microsoft.com/downloads/details.aspx?familyid=6430F853-1120-48DB8CC5-F2ABDC3ED314&displaylang=en Run WMI CIM Studio under WMI Tools to test connectivity to remote targets o Note: WMI CIM Studio can be run effectively only from within IE browser. It relies on ActiveX controls that work best under IE. Alternatively, we can use WBEMTest, that ships with the operating system and can be started from Start -> Run -> wbemtest If WMI connectivity cannot be established thru either of these tools, the infrastructure problem needs to be fixed using the log output obtained by running WMIDiag.vbs Connecting to XP / Windows 2003 behind Windows Firewall (http://msdn.microsoft.com/en-us/library/aa389286(VS.85).aspx) When obtaining data from a remote computer, WMI must establish a DCOM connection from Computer A (the local computer) to Computer B (the remote computer)—this is shown in the diagram as Connection 1. To establish this connection, both Windows Firewall and DCOM on Computer B must be configured appropriately. The configuration must be done locally on Computer B either by changing the Group Policy settings, by executing NETSH commands, or by executing a script locally. Windows Firewall does not support any remote configuration. The following diagram shows the relationship of WMI, the Windows Firewall, and DCOM when a script or another WMI client makes an asynchronous call to obtain data from WMI. Synchronous and semisynchronous calls only make Connection 1. Connection 2 occurs only with asynchronous calls. If the script or application made an asynchronous call, Connection 2 from Computer B to Computer A delivers the results. This delivery is the callback to the sink. When possible, semisynchronous calls should be made instead of asynchronous calls. The performance of semisynchronous calls is almost as good as asynchronous calls and semisynchronous calls are more secure. To configure Connection 1 1. Ensure that the user account that is on Computer A is a local administrator on Computer B. Page 6 Trouble shooting WMI connectivity issues on target machines 2. If the user account that is on Computer A is not an administrator on Computer B, but the user account has Remote Enable permission on Computer B, then the user must also be given DCOM Remote Launch and Remote Activation privileges on Computer B by running Dcomcnfg.exe at the command prompt. For more information, see the remote launch and activation permissions procedure in Securing a Remote WMI Connection. The 0x80070005 error occurs when this privilege is not set. For more information, see Access to WMI Namespaces. 3. Allow for remote administration on Computer B. 4. You can use either the Group Policy editor (Gpedit.msc) or a script to enable the Windows Firewall: Allow remote administration exception, or use a netsh firewall command at the command prompt to allow for remote administration on Computer B. 5. The following command enables this feature. 6. netsh firewall set service RemoteAdmin enable 7. If you would rather use the Group Policy editor than the NETSH commands above, use the following steps in the Group Policy editor (Gpedit.msc) to enable "Allow Remote Administration" on Computer B. 8. Under the Local Computer Policy heading, double-click Computer Configuration. 9. Double-click Administrative Templates, Network, Network Connections, and then Windows Firewall. 10. If the computer is in the domain, then double-click Domain Profile; otherwise, double-click Standard Profile. 11. Click Windows Firewall: Allow remote administration exception. 12. On the Action menu, select Properties. 13. Click Enable, and then click OK. Connecting to Vista / Windows 2008 and above behind Windows Firewall (http://msdn.microsoft.com/en-gb/library/aa822854(VS.85).aspx) To enable or disable WMI traffic using firewall UI 1. In the Control Panel, click Security and then click Windows Firewall. 2. Click Change Settings and then click the Exceptions tab. 3. In the Exceptions window, select the check box for Windows Management Instrumentation (WMI) to enable WMI traffic through the firewall. To disable WMI traffic, clear the check box. To enable or disable WMI traffic at command prompt using WMI rule group Use the following commands at a command prompt. Type the following to enable WMI traffic through the firewall. netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes Type the following command to disable WMI traffic through the firewall. netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=no Page 7 Trouble shooting WMI connectivity issues on target machines Some common error scenarios Error message [0x80041003]: The current user does not have permission to perform the action Error 0x80041003 implies WBEM_E_ACCESS_DENIED This typically results when the process trying to access the namespace does not have the required WMI privileges. The account attempting remote access should be an administrator on the target computer; in addition, the account might need to have a specific privilege enabled. To troubleshoot this error, check the namespace security on the remote namespace to see the privileges enabled for the account. Sample scenarios when this error can come about 'Access is denied' for \\root namespace when 'Remote Enable' permission is disabled for \\root namespace in WMI control properties under Computer Management\Services and Applications\WMI Control 'Access is denied' for \\root\DEFAULT namespace when 'Remote Enable' permission is disabled for \\root\DEFAULT namespace in WMI control properties under Computer Management\Services and Applications\WMI Control 'Access is denied' for \\root\cimv2 namespace when 'Remote Enable' permission is disabled for \\root\cimv2 namespace in WMI control properties under Computer Management\Services and Applications\WMI Control Security configuration to bypass 0x80041003 You can access the WMI Control and the Security tab in the Computer Management Console: Right-click on My Computer and click Manage. Double-click Services and Applications and then double-click WMI Control. Right-click WMI Control and then click Properties. In the WMI Control Properties dialog box click the Security tab. A folder named Root with a plus sign (+) next to it should now be visible. Expand this tree as necessary to locate the namespace CIMV2. Click the Security button. A list of users and their permissions appears. If the user is on that list modify the permissions as appropriate. Add "network service" account (from local computer accounts) and administrator account. If the user is not on the list, click the Add button, and add the user from the location (local machine, domain, etc.) where the account resides. In order to view and set namespace security, the user must have Read Security and Edit Security permissions. Administrators have these permissions by default, and can assign the permissions to other user accounts as required. If this user needs to access the namespace remotely, you must select the Remote Enable permission. By default, user permissions set on a namespace apply only to that namespace. If you want the user to have access to that namespace and all sub namespaces in the tree below it, or in sub namespaces only, click the Advanced button. Click Edit and specify the scope of access in the resulting dialog box. Page 8 Trouble shooting WMI connectivity issues on target machines Error message [0x80070005]: Access is denied Error 0x80070005 implies DCOM ACCESS_DENIED This error occurs when the connected user is not recognized or is restricted in some fashion by the remote server (for example, the user might be locked out). This happens most often when accounts are in different domains. Recent changes to WMI security can also cause this error to occur: • • Blank passwords, formerly permitted, are not allowed in Windows XP and Windows Server 2003. WMI does not allow asynchronous callbacks to a Windows 98 client. A call like SWbemServices.ExecNotificationQueryAsync from a Windows 98 computer to a Windows XP computer will result in an Access Denied error returned to the Windows 98 machine. • • The DCOM configuration access setting might have been changed. If the target computer is running Windows XP, the Forceguest value under the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa might be set to force the Guest account off (value is zero). This error would come when DCOM security is configured as mentioned below Page 9 Trouble shooting WMI connectivity issues on target machines 'Access is denied' for \\root namespace or \\root\default namespace or \\root\cimv2 namespace when 'Remote Activation' permission in DCOM Config --> COM Security --> Launch Activation Permissions --> Edit Limits is unchecked Security configuration to bypass 0x80070005 Click Start, click Run, type DCOMCNFG, and then click OK. In the Component Services dialog box, expand Component Services, expand Computers, and then expand My Computer. On the toolbar, click the Configure My Computer button. The My Computer dialog box appears. In the My Computer dialog box, click the COM Security tab. Under Launch and Activate Permissions, click Edit Limits. In the Launch Permission dialog box, follow these steps if your name or your group does not appear in the Groups or user names list: In the Launch Permission dialog box, click Add. In the Select Users, Computers, or Groups dialog box, add your name and the group in the Enter the object names to select box and then click OK. In the Launch Permission dialog box, select your user and group in the Group or user names box. In the Allow column under Permissions for User, select Remote Launch, and then click OK. Page 10 Trouble shooting WMI connectivity issues on target machines Miscellaneous checklist for ACCESS_DENIED error 1. The user account used to connect to the remote machine must have administrative rights. The password for that user account should be non NULL 2. Verify whether wbemtest utility allows to connect to the remote target with appropriate credentials. If connectivity thru wbemtest fails, the connectivity configuration has to be fixed and ensured that wbemtest works without errors. If not able to connect thru wbemtest, the NMS software also would also not be able to connect to remote target thru WMI. 3. Verify whether WMI permissions have been set appropriately. The account used for reading must have full read rights on the root WMI namespace. 4. If the target system is running Vista / Windows 2008, the machine is part of a local WORKGROUP and if UAC is enabled ON on the Vista / Windows 2008 system, wbemtest would report (‘Access is denied’ with error number 0x80070005). The solution for this scenario would be disable UAC when the machine is part of a local WORKGROUP. 1. For Windows XP Professional operating system, verify that remote logins are not being coerced to the GUEST account - by having the ForceGuest option enabled (this is the default on systems, which are not connected to a domain). Page 11 Trouble shooting WMI connectivity issues on target machines The steps you have to complete to verify this are: a. Open the Local Security Policy editor. b. Expand Local Policies and select Security Options. c. Find the setting named Network access: Sharing and security model for local accounts and verify that the value is not Guest Only. If this is the case, chance the value to Classic - and restart the computer. If system is behind a firewall, to verify DCOM settings to work behind firewall, refer the following URL http://msdn.microsoft.com/en-us/library/ms809327.aspx (Using Distributed COM with Firewalls) http://support.microsoft.com/default.aspx?scid=kb;en-us;154596 (How to configure RPC dynamic port allocation to work with firewalls) 2. Tweak the DCOM configuration for WMI through the following steps Launch dcomcnfg Expand Component Services Expand Computers Expand My Computer Expand DCOM Config Navigate to Windows Management and Instrumentation Right click and choose properties o Configure the Authentication level in the General TAB. (Preferably PACKET level authentication) o In the Location TAB, the option ‘Run application on this computer’ should be checked o In the Security TAB, under the ‘Launch and Activation permission’ group box, enable the Customize option. Click the edit button and ensure that the login used for WMI connection is listed in the user names list. Also ensure that the relevant user has all the options checked (Local Launch, Remote Launch, Local Activation, Remote Activation. Start with enabling Remote Launch and Remote Activation and if the connectivity works, leave it there) o In the Security TAB, under the ‘Access permissions’ group box, enable the Customize option. Click the edit button and ensure that the login used for WMI connection is listed in the users list. Also ensure that the user has all the options checked (Local Access, Remote Access) If DCOM settings are modified, restart the machine for the settings to take effect Verify WMI connectivity thru wbemtest. Error message [0x800706BA]: The RPC server is unavailable Error numbers in the range 0x800706xx implies DCOM RPC error. Page 12 Trouble shooting WMI connectivity issues on target machines This often occurs when a firewall is configured on the remote computer. You will need to open the appropriate ports on the firewall to permit remote administration using DCOM. Alternatively, the computer might be having problems mapping the IP and the Hostname. To test that possibility, try using the IP address instead of the Hostname in your connection string: 1. Please check the DCOM & firewall configuration on XP or Windows 2003 or Vista as described earlier. 2. If firewall is ON, the error ‘The RPC Server is unavailable’ with the error number 0x800706ba may pop up. Fire the following command at the DOS prompt to allow connection requests bypass firewall netsh firewall set service type=remoteadmin mode=enable and test the connectivity again with wbemtest utility. Troubleshooting remote errors 1. Check whether the user has access to the remote computer. From the command prompt, execute the following command: net user \\<remotecomputer>\\C$ /u:<domain\username> * 2. Enable the verbose logging level on the remote computer and try connecting thru wbemtest. After running wbemtest, examine the logs on the remote machine (%windir%\system32\wbem\Logs\). Refer the following links for more details on enabling WMI logging http://msdn.microsoft.com/en-us/library/aa392285(VS.85).aspx http://technet.microsoft.com/en-us/library/cc739847(WS.10).aspx http://blogs.technet.com/askperf/archive/2008/03/04/wmi-debug-logging.aspx 3. Enable audit events (thru Control Panel Administrative Tools Local Security Policy) to determine which account is responsible for the failed connection. After auditing has been enabled, you will see events similar to this in the event log: Event Type: Failure Audit Event Source: Event Category: Event ID: Security Logon/Logoff 529 Date: 6/14/2004 Time: 10:52:35 AM User: NT AUTHORITY\SYSTEM Computer: <remote machine> Description: Page 13 Trouble shooting WMI connectivity issues on target machines Logon Failure: Reason: Unknown user name or bad password User Name: xuser Domain: NTDEV Logon Type: Logon Process: 3 NtLmSsp Authentication Package: Workstation Name: 4. MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 <console Machine > Check the DCOM configuration for the Access\Launch permission; the user running the script must have this permission. 5. If all the previous checks are OK, if the user is recognized by the remote computer, and if the connection still fails with a DCOM Access Denied error, provide the following details • The operating system each computer is running. • The installation history • The user credentials used to make the WMI connection, including the authentication and • A zip file of %windir%\system32\wbem\logs from both client computer and the target computer impersonation levels. Enabling Account privileges in WMI 1. Log on to the computer you want to monitor with an administrator account. 2. Navigate to Start > Control Panel > Administrative Tools > Computer Management > Services and Applications. You need to switch to the Classic View of the Control Panel to use this navigation path. 3. Click WMI Control, and then right-click and select Properties. 4. Select the Security tab, and then expand Root and click CIMV2. 5. Click Security and then select the user account used to access this computer and ensure you grant the following permissions: Enable Account Remote Enable 6. Click Advanced, and then select the user account used to access this computer. 7. Click Edit, select This namespace and subnamespaces in the Apply to field, and then click OK. 8. Click OK on the Advanced Security Settings for CIMV2 window. 9. Click OK on the Security for Root\CIMV2 window. 10. Repeat steps 4 thru 9, but choose the namespace ‘DEFAULT’ under Root. Similarly, repeat steps 4 thru 9 for the ‘Root’ namespace. 11. Click Services in the left navigation pane of Computer Management. 12. Select Windows Management Instrumentation in the Services result pane, and then click Restart. Monitoring remote targets in local WORKGROUP (Vista / Windows 2008) Page 14 Trouble shooting WMI connectivity issues on target machines If you are monitoring a target in a workgroup, you need to disable remote User Account Control (UAC). This is not recommended, but it is necessary when monitoring a workgroup computer. Disabling remote user account control does not disable local user account control functionality. Warning: The following procedure requires the modification or creation of a registry key. Changing the registry can have adverse effects on your computer and may result in an unbootable system. Consider backing up your registry before making these changes. To disable remote UAC for a workgroup computer: 1. Log on to the computer you want to monitor with an administrator account. 2. Click Start > Accessories > Command Prompt. 3. Enter regedit. 4. Expand HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. 5. Locate or create a DWORD entry named LocalAccountTokenFilterPolicy and provide a DWORD value of 1. Note: To re-enable remote UAC, change this value to 0 Common errors encountered while connecting to WMI from a remote machine Return Code: Meaning: 0x80070005 DCOM Access Denied During Connecting to a WMI namespace The Username/Password does not exist The user does not have the remote launch or remote activation options set. Check dcomcnfg.exe During Operation 0x800706ba RPC Server Unavailable The Machine does not exist The Machine cannot respond because the appropriate firewall exceptions have not been made. Check the firewall settings. The specific user does not have the DCOM permissions. Minimum authentication level needed for the namespace is more than what is used. Page 15 The client machine doesn’t have correct firewall settings for asynchronous callbacks. Connecting to a machine which doesn’t exist. 0x080041003 WMI Access Denied The user does not have the appropriate WMI permission on a namespace. Specific user doesn’t have WMI access permission. Trouble shooting WMI connectivity issues on target machines Useful web links Links related to WMI Configuration Description Connecting to WMI on a Remote Computer (Windows) WMI Service Log Files (Windows) Connecting thru Windows Firewall Connecting to WMI Remotely starting with Windows Vista Securing a remote WMI connection (has details on DCOM configuration entries) Connecting Between Different Operating Systems Using Distributed COM with Firewalls How to configure RPC dynamic port allocation to work with firewalls URL http://msdn.microsoft.com/en-us/library/aa389290(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa827355(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa389286(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa822854(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa393266(VS.85).aspx http://msdn.microsoft.com/en-us/library/aa389284(VS.85).aspx http://msdn.microsoft.com/en-us/library/ms809327.aspx http://support.microsoft.com/default.aspx?scid=kb;en-us;154596 Links related to WMI troubleshooting Description Windows Management Instrumentation (WMI): Frequently Asked Questions WMI Diagnosis Utility – Version 2.0 WMI Administrative Tools (includes WMI CIM Studio) Logging WMI Activity Turn WMI error logging on or off Ask the Performance Team: WMI Debug Logging URL http://www.microsoft.com/technet/scriptcenter/resources/wmifaq.mspx http://www.microsoft.com/downloads/details.aspx?familyid=D7BA3CD618D1-4D05-B11E-4C64192AE97D&displaylang=en http://www.microsoft.com/downloads/details.aspx?familyid=6430F8531120-48DB-8CC5-F2ABDC3ED314&displaylang=en http://msdn.microsoft.com/en-us/library/aa392285(VS.85).aspx http://technet.microsoft.com/en-us/library/cc739847(WS.10).aspx http://blogs.technet.com/askperf/archive/2008/03/04/wmi-debuglogging.aspx Test scenarios we need to test out Host refers to machine from which we are initiating WMI connection. Target refers to the machine to which we are attempting WMI connection. The login account used to reach the target should be an account belonging to an administrator group on the target. Create a separate account (part of Administrator group) instead of the Administrator login itself. The host machine and the target machine have to be in the local WORKGROUP. Ideally, testing the following combinations would help us out. o Host on local WORKGROUP, target on local WORKGROUP o Host on local WORKGROUP, target joined to a DOMAIN o Host joined to a DOMAIN, target on local WORKGROUP o Host joined to a DOMAIN, target joined to a DOMAIN o But the HOST and TARGET on their local WORKGROUPS would be the most troublesome scenario and we can focus our test activities on this combination. o Windows Firewall ENABLED on both ends would be the most important test case that needs to pass o If we have a third party firewall software, we can put the machines behind the third party firewall and check to see how the behavior works out. Page 16 Trouble shooting WMI connectivity issues on target machines Page 17 Trouble shooting WMI connectivity issues on target machines # Test Case Host OS Target OS 1 Connecting from pre Vista hosts to pre Vista targets One of Windows 2000, Windows XP, Windows 2003 One of Windows 2000, Windows XP, Windows 2003 2 Connecting from pre Vista hosts to Vista & above targets One of Windows 2000, Windows XP, Windows 2003 One of Vista, Windows 2008, Windows 7 3 Connecting from Vista hosts to pre Vista targets One of Vista, Windows 2008, Windows 7 One of Windows 2000, Windows XP, Windows 2003 4 Connecting from Vista hosts to Vista targets One of Vista, Windows 2008, Windows 7 One of Vista, Windows 2008, Windows 7 Page 18 Windows Firewall Configuration Host Target DISABLED DISABLED ENABLED ENABLED DISABLED DISABLED ENABLED ENABLED DISABLED DISABLED ENABLED ENABLED DISABLED DISABLED ENABLED ENABLED DISABLED ENABLED DISABLED ENABLED DISABLED ENABLED DISABLED ENABLED DISABLED ENABLED DISABLED ENABLED DISABLED ENABLED DISABLED ENABLED