Managing WMI security
Managing WMI security
Updated: January 21, 2005
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
Managing WMI security
Windows Management Instrumentation (WMI) supports a limited form of security that validates each user before the user is allowed to connect to WMI, on either the local computer or a remote computer. This security is layered on top of the operating system security. WMI does not override or circumvent security provided by the operating system.
By default, all members of the Administrators group have full control of the WMI services on the managed computer. All others have read/write/execute permissions on their local computer only.
Permissions can be changed by adding a user to the Administrators group on the managed computer or by authorizing users or groups in WMI and setting their permission level. Access is based on WMI namespaces.
On computers running Microsoft Windows 95, Windows 98, or Windows Millennium Edition (ME), all users have full control locally. However, permissions can be set for users managing a Windows 95, Windows 98, or Windows ME computer remotely.
Security is checked only when a user connects to the Windows Management service. Thus, any changes made to a user's permissions while the user is connected do not take effect until the next time the user starts a WMI service. For example, if a user's access is revoked, the changes do not take effect until the user exits from WMI and attempts to connect to the service again.
For more information, see Modify permissions or delete authorized users.
Community Additions
最新文章
- oracle 视图的创建,游标,left join
- javascript之一切皆为对象3
- GridView点击行触发SelectedIndexChanged事件
- leetcode题目清单
- 第 28 章 CSS3 多列布局
- nginx的主要用途
- 用 Fabric 实现自动化部署
- AndEngine
- vim1
- ylbtech-权限管理-数据库设计-功能权限管理技术
- batch 数字进制的问题
- 转:Google论文之三----MapReduce
- java笔记12之面向对象初始
- hdu 4869 Turn the pokers (2014多校联合第一场 I)
- [项目整理]Win32,MFC的可执行文件只能运行一次
- hdu_1286找新朋友(欧拉定理)
- C++编程音视频库ffmpeg的pts时间换算方法
- 遍历二叉树 traversing binary tree 线索二叉树 threaded binary tree 线索链表 线索化
- L1-061 新胖子公式
- 抖音圈圈乐 系统搭建H5微信小游戏圈圈乐系统介绍