How do I configure a non-administrative user for windows management instrumentation (WMI) access?
If you're a user with administrator privileges on the server to be monitored, then you'll be able to connect to windows management instrumentation (WMI) by default. However, if you're a user with standard privileges, you must configure the user for WMI access.
For this, complete the following steps -
- Create and add the user to the Performance Monitor user group
- Allow Windows firewall
- Add the user to the DCOM user group
- Create a non-administrative user on the server to be monitored.
- Next, add the user to the Performance Monitor group in Windows. For this, open the Control Panel and click Administrative Tools.
- After this, open the Computer Management console.
- Here, from the left pane, select Local Users and Groups.
Figure 1. Local Users and Groups. - Then double-click Groups in the center pane.
- Here, select the Performance Monitor Users group.
Figure 2. Performance Monitor Users group. - Click More Actions on the right pane and then select Properties.
- Click Add, then select the users you wish to add to the group or enter their details in the bottom field.
Figure 3. Enter user details in 'Select Users, Computers, Service Accounts, or Groups' pop-up. - Once you've added all the users that you want to add, click OK.
- Next, open the wmimgmt.msc window.
- In the left pane, select WMI Control (Local).

Figure 4. WMI Control(Local). - Click More Actions on the right pane, and select Properties.
- Then, select the Security tab in the WMI Control (Local) Properties window.
- Select Root, then click Security.

Figure 5. Selecting 'Security' in WMI Control(Local) Properties. - Select the group or username and then click Add.

Figure 6. Clicking 'Add' after selecting the group or username. - In the Enter the Object Names section, enter Performance Monitor Users and then, click Check Names. This will auto populate the group name according to the value that you've entered.

Figure 7. Enter 'Performance Monitor Users' and click Check Names. - Click OK. This will take you back to the Security for Root window.
- Select the Execute Methods, Remote Enable, and Enable Account checkboxes here.
- After this, click the Advanced button.
- Select the Performance Monitor Users group, and then click Edit.
Figure 8. Click Edit after selecting Performance Monitor Users Group.
- In the Applies to field, select This namespace and subnamespaces to provide read-only access to the WMI tree.

Figure 9. Select 'This namespace and subnamespace' in the 'Applies to' field. - Then, click OK till you go back to the WmiMgmt Console.
Allowing Windows Firewall
- Open Control Panel on Windows.
- Click Windows Defender Firewall.
- Then, on the left pane, select Allow an app or feature through Windows Defender Firewall.
Figure 10. Allow an app or feature through Windows Defender Firewall. - Click Change Settings and then scroll down to Windows Management Instrumentation (WMI).
- Here, click the Domain and Private checkboxes.

Figure 11. Selecting 'Domain' and 'Private' checkboxes for WMI. - Click OK.
Configuring DCOM Access
If any predefined DCOM user group is not being used, perform the following steps for DCOM access:
- Open Component Services from Administrative Tools in the Control Panel, or enter dcomcnfg in the Run command.
- Click Component Services in the left pane and navigate to Computers> My Computer.
- Click More Actions on the right pane and open Properties.

Figure 12. Component Services Properties. - Select the COM Security tab.
- Here, in the Launch and Activate Permissions section, click Edit Limits.

Figure 13. 'Edit Limits' on My Computer Properties. - Next, in the Launch and Activate Permission window, scroll in the Group or user names section, and click Distributed COM users.
- Following this, in the Permissions for Distributed COM Users section, ensure all the Allow checkboxes are ticked.
Figure 14. Launch and Activation Permission Window. - Click OK and close all the windows.
Following all these steps ensures you have the appropriate permissions to access WMI from the On-Premise Poller installed machine.
Related Articles
Validating sender email using DKIM authentication
What is DKIM? DomainKeys Identified Mail (DKIM) is an advanced authentication method used widely by email service providers to verify the email from the point of its origin by validating the email sender. It allows the email senders to authenticate ...
Accessing products via Site24x7
You can seamlessly access ManageEngine CloudSpend and Site24x7’s sub-products, like Digital Risk Analyzer, StatusIQ, and Toolset, from within your Site24x7 web client. The product switcher , available at the top-right corner of the interface, lets ...