Security
This page is from Microsoft
Updated: January 21, 2005
General information about the security model
Only users in the local Administrators group can start WMIC. The
WMI security access model is enforced on any call from WMIC to
WMI. The operating system enforces operating system-level
security for any operations executed through WMI. For example,
you cannot access files through WMI that you cannot access from
Windows Explorer.
WMIC is a client for WMI, so all security
checks are performed within WMI components. Before connecting to
a remote computer, the component uses PING functionality
to verify validity of the input (remote computer status).
When WMIC is used in a Telnet, Terminal Services, or similar
session, all commands are carried out in the context of the user
issuing the command.
WMIC allows extension of Aliases and XSLs. Security is
addressed by NTFS which enforces administrator-only credential
requirements for accessing WMIC's files.
Except for method parameters, WMIC allows input data only
through the /NODE switch. A list of computer nodes can be
provided as a text file using the @FileList option. The
file and its location should be secured by the Administrator,
and the input file should preferably be read from the WBEM
directory.
User permissions
No special user permissions are required to run WMIC.
Implicitly, to be able to use WMIC, a user needs to have full
write access to both the WMIC namespaces and a registry key
(HKLM\Software\Microsoft\WBEM).
Authentication and authorization
Authentication and authorization are provided by the system when
these resources are opened. They are stored in a secured
location and the Discretionary Access Control List (DACL) is
used to verify that client has access to them. They are wholly
dependent on Distributed Component Object Model (DCOM) security
as well as Windows Management (WINMGMT) for remote access in
providing it with user name, password, and requested levels. The
/AUTHLEVEL switch is used for securing WMIC network
traffic. In the Windows Server 2003 family operating systems,
the default level is set to PKTPRIVACY providing packet
privacy encryption level. You can modify the authentication
level using the /AUTHLEVEL switch.
Example:
WMIC /AUTHLEVEL:Pktprivacy /NODE:"testcomputer.microsoft.com" BIOS
Configuration data
The configuration information is stored in the registry and in
the WMI repository. The registry configuration holds timestamps
and validity of Managed Object Format(MOF)-compiled status for
schemas. At the start of each session of WMIC, this is evaluated
and WMIC will update the WMI repository when schemas are not
valid or were updated by a user.
Miscellaneous
WMIC is a powerful command-line tool that allows you to quickly
do any task for which you have permissions. If you are not
familiar with the WMI environment, you can use the
/INTERACTIVE switch to set a warning for delete operations.
For example:
WMI /INTERACTIVE:ON
For information about how WMI validates users, see
Managing WMI security
.
For more information, see
Windows Management Instrumentation Command-line
.
|
|