- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
You may have heard this little saying:
"There's a right way, a wrong way, and a Microsoft way."
That applies to security credentials as much as it does to other areas. Microsoft chose to go their own way, not using the tried-and-true methods of the Unix world. If your enterprise has a heterogenous computing environment, you know what I'm talking about. Whether you love it or hate it, that's the way it is — and we all have to deal with that pesky real world.
Agentless discovery products like ours depend on two kinds of access to Windows system — the "administrative share" and Windows Management Instrumentation (WMI). The administrative share can only be accessed by Domain Administrators or Local Administrators. There's a lot of documentation on Microsoft's site about using WMI to probe remote computers — but unless you're operating in the context of a Domain Administrator or Local Administrator, it involves configuration changes that most enterprises would find difficult or impossible to roll out. Further, these configuration changes are dependent on the operating system and even the service pack level. So we have taken the path of least resistance (and least likely to run into future compatibility issues): to explore Windows systems, Discovery requires a MID server running on a Windows server in the context of a Domain Administrator or Local Administrator.How does one get something like a MID server to operate in the context of a user that is a Domain Administrator or Local Administrator? The simplest and most Microsoft-compliant way is to operate the MID server as a service (similar to a daemon on Unix or Linux systems), and that's what we do. One of the properties of a service is the "log on account", which you can see in the screenshot at right. The MID server will run in the context of the user whose credentials you enter here. So long as that user has sufficient rights to access the administrative share and to run remote WMI queries on the Windows system that this MID server explores, the MID server will be able to do its job. You do not need to enter any credentials for Windows into the Discovery → Credentials table.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.