Agentless Windows monitors

Subhendu Ghosh sghosh at sghosh.org
Thu Mar 24 22:11:13 CET 2005


On Thu, 24 Mar 2005, Glenn Meisenheimer wrote:

> Hi Anthony
>
>
>
>> Andreas message hits some key dangers to accessing WMI.


WMI access can be secured
http://support.microsoft.com/kb/325353/EN-US/

WMI respects existing MS authentication methods.
1. WMI obey Native OS access control
2. WMI obeys DCOM access control
3. WMI obeys access provided to user credentials.

The above KB talks about user credentials, but WMI can also be secured at 
the DCOM level and OS level.

For a decent articel on securing WMI:
http://redmondmag.com/columns/article.asp?EditorialsID=381

-- 
-sg


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. 
::: Messages without supporting info will risk being sent to /dev/null





More information about the Users mailing list