Setting up WMI/WinRM Without Local Admin
vScope can use the WMI protocol to inventory Windows OS machines, including Hyper-V machines and the VMM. By following these steps, WMI and WinRM access will be configured for a non-administrator domain user, allowing vScope to inventory the machine remotely.
Create User in Active Directory
- Create a user called, e.g., “svc_vscope” in Active Directory.
Add User to Local Group Distributed COM Users
- Open lusrmgr.msc.
- Go to Groups.
- Open “Distributed COM Users” and add the user “svc_vscope.”
- Click apply.
This step grants necessary local access permissions.
Set WMI Permissions
- Run
wmimgmt.msc
in Command Prompt. - Right-click “WMI Control” and select Properties.
- Go to the Security tab, select “Root” in the tree, and click Security.
- Click Advanced and Add the user “svc_vscope.”
- Set Applies to: “This namespace and subnamespaces” and check Execute Methods, Enable Account, Remote Enable, and Read Security.
This configures WMI permissions for the user.
Configure DCOM Permissions
- Open dcomcnfg.
- Expand Component Services > Computers > My Computer, right-click and select Properties.
- Under COM Security, edit Access Permissions and Launch and Activation Permissions.
- Add “svc_vscope” with full permissions for both.
This enables necessary DCOM permissions for the user.
Enable WinRM
- In Command Prompt, enter:
- Add “svc_vscope” to the permissions list, allowing Read(Get, Enumerate, Subscribe) and Execute(Invoke) actions.
The domain user now has remote WMI/WinRM access to the target machine.
Optional Configurations for Additional Access
If WMI does not work after the previous setup, try the following configurations:
Open Firewall for WMI Traffic
Run the following command in Command Prompt:
Disable User Account Control (UAC) for Remote Access
- Open regedit.
- Set the following registry key from
0
to1
:
0
= Remote UAC access token filtering is enabled.1
= Remote UAC is disabled.
Reference: Microsoft documentation on User Account Control and Remote Restriction
Enable RPC Permissions on a Single Target Machine
- Open Microsoft Management Console (mmc) on the target machine.
- Add the “Group Policy Object Editor” snap-in.
- Navigate to Computer Configuration > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile (or Standard Profile for a Workgroup network).
- Edit Windows Firewall: Allow Remote Administration Exception.
- Set to Enabled and allow unsolicited incoming messages from “localsubnet” (no quotes).
- Apply settings and run
gpupdate /force
if immediate application is required.