Agentless Windows monitors
Subhendu Ghosh
sghosh at sghosh.org
Thu Mar 24 22:11:13 CET 2005
On Thu, 24 Mar 2005, Glenn Meisenheimer wrote:
> Hi Anthony
>
>
>
>> Andreas message hits some key dangers to accessing WMI.
WMI access can be secured
http://support.microsoft.com/kb/325353/EN-US/
WMI respects existing MS authentication methods.
1. WMI obey Native OS access control
2. WMI obeys DCOM access control
3. WMI obeys access provided to user credentials.
The above KB talks about user credentials, but WMI can also be secured at
the DCOM level and OS level.
For a decent articel on securing WMI:
http://redmondmag.com/columns/article.asp?EditorialsID=381
--
-sg
-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue.
::: Messages without supporting info will risk being sent to /dev/null
More information about the Users
mailing list