From various documentation it appears that to change WMI access you need to use WMI to access the running service and modify specific parts of the tree.
Its kind of annoying changing 150,000 hosts using the UI.
And then having to include such changes in the process of adding new hosts.
Could write a script to do the same, but that needs to either connect to all those machines live, or be distributed for later update say in an startup/install script. And then you have to mess around with copying binary SD data from an example access control.
I've also found you can change the wbem/*.mof file to include an SDDL but I'm really vague on how that all works at the moment.
Am I just missing some point of simple administration?
Made some research on this and looks like the method below should work:
For Windows 2003 with Group Policy Management Console (GPMC), perform the following steps:
Start Menu
>Administrative Tools
>Group Policy Management
.Domain Name
->Domains
->Domain Name
, where Domain Name is the name of the domain you wish to modify.Domain Name
in the left-hand pane and selectCreate and Link a GPO Here
.WMI Permissions
.NOTE: Since WMI must establish a DCOM connection to remote host, this is enough to configure access permissions for DCOM.
Configuring Distributed Component Object Model (DCOM) Permissions:
WMI Permissions
group policy, either bythe Group Policy Management
plug-in or by theADUC
plug-in.WMI Permissions
policy is highlighted and click on theEdit
button.Computer Configuration
->Windows Settings
->Security Settings
->Local Policies
->Security Options
.DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax
.Define this policy setting
.Edit Security
button.Add
button; in the resulting pop-up window, specify the domain administrator account that will be used.Group or user names
field, select the domain administrator you specified in step #7.Permissions for Administrators
field, ensure that there is a checkmark in theAllow
column for theRemote Access
option.DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax
.Define this policy setting
.Edit Security
button.Add
button; in the resulting pop-up window, specify the domain administrator account that will be used.Permissions for Administrators
field, ensure that there is a checkmark under theAllow
column for bothRemote Launch
andRemote Activation
.Group Policy Object Editor
window.Active Directory Users and Computers
window.Referencing https://answers.splunk.com/answers/2703/how-to-enable-wmi-data-collection-on-a-domain-server.html
Here's the link to the blog post w/ method for the creating a script: https://blogs.msdn.microsoft.com/spatdsg/2007/11/21/set-wmi-namespace-security-via-gpo-script/
This approach gave me a usable method to enable WMI access for a non-Domain Admin service account using GPO.
Microsoft have another, more recent article demonstrating how to do this via Group Policy with a PowerShell script:
https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/delegate-wmi-access-to-domain-controllers/ba-p/259535
Not sure why they do it with a scheduled task. I believe Group Policy Startup Scripts now support PowerShell natively.
The original script is still available but I suggest using this copy which fixes a bug.