<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://znil.net/index.php?action=history&amp;feed=atom&amp;title=Windows%3AWMI_Verbindung_%C3%BCber_das_Netzwerk_testen</id>
	<title>Windows:WMI Verbindung über das Netzwerk testen - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://znil.net/index.php?action=history&amp;feed=atom&amp;title=Windows%3AWMI_Verbindung_%C3%BCber_das_Netzwerk_testen"/>
	<link rel="alternate" type="text/html" href="https://znil.net/index.php?title=Windows:WMI_Verbindung_%C3%BCber_das_Netzwerk_testen&amp;action=history"/>
	<updated>2026-04-20T16:24:51Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in znilwiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://znil.net/index.php?title=Windows:WMI_Verbindung_%C3%BCber_das_Netzwerk_testen&amp;diff=3030&amp;oldid=prev</id>
		<title>BLinz am 24. Juni 2012 um 19:20 Uhr</title>
		<link rel="alternate" type="text/html" href="https://znil.net/index.php?title=Windows:WMI_Verbindung_%C3%BCber_das_Netzwerk_testen&amp;diff=3030&amp;oldid=prev"/>
		<updated>2012-06-24T19:20:53Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Kategorie:Windows]][[Kategorie:Windows_XP]][[Kategorie:Windows_Server_2008]][[Kategorie:Windows_Vista]][[Kategorie:Windows_7]]&lt;br /&gt;
Unter Windows XP, Windows Server 2003 / 2003 R2, Windows Vista, Windows 7, Windows Server 2008 / 2008 R2&amp;lt;br&amp;gt;&lt;br /&gt;
lässt sich die Funktion der WMI Schnittstelle eines entfernten Rechners schnell in einer Eingabeaufforderung testen:&amp;lt;br&amp;gt;&lt;br /&gt;
 WMIC /NODE:Rechnername /USER:Domäne\Benutzername /PASSWORD:Passwort CPU&lt;br /&gt;
&lt;br /&gt;
Klappte das nicht:&amp;lt;br&amp;gt;&lt;br /&gt;
* Firewall mal abschalten bzw. Ausnahme eintragen&lt;br /&gt;
* In Arbeitsgruppen unter Windows Vista / 7 : UAC Modus ausschalten&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Für Arbeitsgruppen unter Windows 7 gibt es auch ein Script um WMI zu ermöglichen:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Stammt von: http://community.spiceworks.com/scripts/show/866-enable-secure-work-group-scanning-in-windows-7-good-for-unknowns-and-issues-with-wmi-and-firewalls&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;DOS&amp;quot;&amp;gt;&lt;br /&gt;
REM Spiceworks &amp;quot;enable scanning&amp;quot; script for Windows 7, tailored to a workgroup. Changes firewall settings to allow remoteadmin to the spiceworks server only, opens WMI, DCOM to the server only and opens basic pinging. Preemptively deletes the WMI repository then rebuilds and re-registers the files in case of of WMI issues. Creates passworded admin account &amp;quot;SysAdmin&amp;quot;, clears windows update temp files and resets automatic updates. &lt;br /&gt;
&lt;br /&gt;
REM In the next line replace XXX.XXX.XXX.XXX with your server IP, and on line 73 replace p455w0rd with a secure password.&lt;br /&gt;
set AdmIP=XXX.XXX.XXX.XXX&lt;br /&gt;
&lt;br /&gt;
REM MUST be run from an ADMINISTRATOR COMMAND PROMPT&lt;br /&gt;
&lt;br /&gt;
REM Major sources are from the following posts:&lt;br /&gt;
REM http://community.spiceworks.com/scripts/show/181-resolving-spiceworks-unknowns-unofficial&lt;br /&gt;
REM http://community.spiceworks.com/how_to/show/377&lt;br /&gt;
REM http://community.spiceworks.com/education/projects/Windows_Firewall&lt;br /&gt;
REM http://community.spiceworks.com/how_to/show/317&lt;br /&gt;
REM http://community.spiceworks.com/topic/36751-spiceworks-script-for-unknowns-and-permission-or-firewall-issue-workgroup&lt;br /&gt;
REM Apologies to any I&amp;#039;ve missed&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REM disabling the Internet Connection Firewall (ICF)/Internet Connection Sharing (ICS) service&lt;br /&gt;
net stop sharedaccess &lt;br /&gt;
&lt;br /&gt;
REM disabling WMI&lt;br /&gt;
net stop winmgmt /y &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
REM clearing WBEM repository and rebuilding it&lt;br /&gt;
cd /d %windir%\system32\wbem&lt;br /&gt;
rd /S /Q repository &lt;br /&gt;
regsvr32 /s %systemroot%\system32\scecli.dll &lt;br /&gt;
regsvr32 /s %systemroot%\system32\userenv.dll &lt;br /&gt;
mofcomp cimwin32.mof &lt;br /&gt;
mofcomp en-us\cimwin32.mfl &lt;br /&gt;
mofcomp rsop.mof &lt;br /&gt;
mofcomp en-us\rsop.mfl &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REM Registering all items in wbem folder&lt;br /&gt;
for /f %%s in (&amp;#039;dir /b /s *.dll&amp;#039;) do regsvr32 /s %%s&lt;br /&gt;
REM for /f %%s in (&amp;#039;dir /b /s *.exe&amp;#039;) do call :FixSrv %%s &lt;br /&gt;
for /f %%s in (&amp;#039;dir /b *.mof&amp;#039;) do mofcomp %%s &lt;br /&gt;
REM note different directory for .mfl files&lt;br /&gt;
cd %windir%\system32\wbem\en-us&lt;br /&gt;
for /f %%s in (&amp;#039;dir /b *.mfl&amp;#039;) do mofcomp %%s &lt;br /&gt;
&lt;br /&gt;
cd %windir%\system32\wbem&lt;br /&gt;
&lt;br /&gt;
net stop winmgmt &lt;br /&gt;
&lt;br /&gt;
net start winmgmt &lt;br /&gt;
&lt;br /&gt;
gpupdate /force &lt;br /&gt;
&lt;br /&gt;
REM Enable Ping &lt;br /&gt;
REM old version: netsh firewall set icmpsetting 8 &lt;br /&gt;
netsh advfirewall firewall set  rule name=&amp;quot;File and Printer Sharing (Echo Request - ICMPv4-In)&amp;quot; new enable=yes &lt;br /&gt;
&lt;br /&gt;
REM Instead of opening 1000 ports, enable remoteadmin to the spiceworks server only&lt;br /&gt;
netsh advfirewall firewall add rule name=&amp;quot;Allow RemoteAdmin to Spiceworks&amp;quot; dir=in protocol=tcp remoteip=%AdmIP% action=allow enable=yes&lt;br /&gt;
&lt;br /&gt;
REM Dcom setup &lt;br /&gt;
reg add HKLM\SOFTWARE\Microsoft\Ole /v LegacyAuthenticationLevel /t REG_DWORD /d &amp;quot;2&amp;quot; /f &lt;br /&gt;
reg add HKLM\SOFTWARE\Microsoft\Ole /v LegacyImpersonationLevel /t REG_DWORD /d &amp;quot;3&amp;quot; /f &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
REM Setting up remote account access &lt;br /&gt;
&lt;br /&gt;
REM Disabling Forceguest - Unless this is disabled, all remote logins are guest only&lt;br /&gt;
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v forceguest /t REG_DWORD /d &amp;quot;0&amp;quot; /f&lt;br /&gt;
&lt;br /&gt;
REM Disable UAC for remote logins - safe as long as remoteadmin rules are set to server IP or subnet ONLY&lt;br /&gt;
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d &amp;quot;1&amp;quot; /f&lt;br /&gt;
&lt;br /&gt;
REM Enabling &amp;quot;SysAdmin&amp;quot; Account. Move along. Nothing to see here.&lt;br /&gt;
REM Per http://community.spiceworks.com/topic/36751-spiceworks-script-for-unknowns-and-permission-or-firewall-issue-workgroup&lt;br /&gt;
net user SysAdmin p455w0rd /ADD&lt;br /&gt;
net localgroup Administrators SysAdmin /ADD&lt;br /&gt;
REM hides account from login screen&lt;br /&gt;
REM Thanks cyberbill for the correction&lt;br /&gt;
reg add &amp;quot;HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList&amp;quot; /v SysAdmin /t REG_DWORD /d &amp;quot;0&amp;quot; /f&lt;br /&gt;
&lt;br /&gt;
REM Win7 Firewall setup &lt;br /&gt;
&lt;br /&gt;
REM Setting up WMI components individually to limit services access to  Spiceworks server only&lt;br /&gt;
&lt;br /&gt;
netsh advfirewall firewall add rule dir=in name=&amp;quot;DCOM&amp;quot; program=%systemroot%\system32\svchost.exe service=rpcss action=allow protocol=TCP remoteip=%AdmIP% localport=135&lt;br /&gt;
&lt;br /&gt;
netsh advfirewall firewall add rule dir=in name =&amp;quot;WMI&amp;quot; program=%systemroot%\system32\svchost.exe service=winmgmt action = allow protocol=TCP remoteip=%AdmIP% localport=any&lt;br /&gt;
&lt;br /&gt;
netsh advfirewall firewall add rule dir=in name =&amp;quot;UnsecApp&amp;quot; program=%systemroot%\system32\wbem\unsecapp.exe action=allow remoteip=%AdmIP%&lt;br /&gt;
&lt;br /&gt;
netsh advfirewall firewall add rule dir=out name =&amp;quot;WMI_OUT&amp;quot; program=%systemroot%\system32\svchost.exe service=winmgmt action=allow protocol=TCP remoteip=%AdmIP% localport=any&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REM To undo WMI firewall changes using separate rules for DCOM, WMI, callback sink and outgoing connections&lt;br /&gt;
REM   1. To disable the DCOM exception.&lt;br /&gt;
REM      netsh advfirewall firewall delete rule name=&amp;quot;DCOM&amp;quot;&lt;br /&gt;
REM    2. To disable the WMI service exception.&lt;br /&gt;
REM      netsh advfirewall firewall delete rule name=&amp;quot;WMI&amp;quot;&lt;br /&gt;
REM    3. To disable the sink exception.&lt;br /&gt;
REM      netsh advfirewall firewall delete rule name=&amp;quot;UnsecApp&amp;quot;&lt;br /&gt;
REM    4. To disable the outgoing exception.&lt;br /&gt;
REM      netsh advfirewall firewall delete rule name=&amp;quot;WMI_OUT&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REM Check winmgmt is started, there are occasionally problems with it not starting on win7 &lt;br /&gt;
net start winmgmt &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
REM Resetting Automatic Updates &lt;br /&gt;
&lt;br /&gt;
net stop bits&lt;br /&gt;
net stop wuauserv&lt;br /&gt;
del /f /s /q %windir%\SoftwareDistribution\*.*&lt;br /&gt;
net start bits&lt;br /&gt;
net start wuauserv&lt;br /&gt;
&lt;br /&gt;
REM Forcing AU detection and resetting authorization tokens... &lt;br /&gt;
wuauclt.exe /resetauthorization /detectnow &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
echo Please reboot&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;comments /&amp;gt;&lt;/div&gt;</summary>
		<author><name>BLinz</name></author>
	</entry>
</feed>