Establishing a remote WMI connection can be tricky when the target computer is in a workgroup. This is because the default policies are designed for standalone computers. In this post, I’m sharing the fastest method to get remote WMI connection working in a workgroup. These settings are for lab use and should not be used in production without proper risk mitigation. These instructions work on all Windows operating systems except Home editions. Home editions of Windows operating systems require slightly different steps as Group Policy editor is not available for use. As of January 2018, the following operating systems are verified as working:
- Microsoft Windows XP Professional Version 2002 Service Pack 3 (32 bit)
- Microsoft Windows XP Professional x64 Edition Version 2003 Service Pack 2 (64 bit)
- Windows Vista Ultimate Service Pack 2 (32 bit)
- Windows Vista Ultimate Service Pack 2 (64 bit)
- Windows 7 Ultimate Service Pack 1 (32 bit)
- Windows 7 Ultimate Service Pack 1 (64 bit)
- Windows 8 Pro (32 bit)
- Windows 8 Pro (64 bit)
- Windows 8.1 Pro (32 bit)
- Windows 8.1 Pro (64 bit)
- Windows 10 Pro (32 bit)
- Windows 10 Pro (64 bit)
- Windows Server 2008 Standard Service Pack 2 (32 bit)
- Windows Server 2008 Standard Service Pack 2 (64 bit)
- Windows Server 2008 R2 Standard Service Pack 1 (64 bit)
- Windows Server 2012 Standard (64 bit)
- Windows Server 2012 R2 Standard (64 bit)
- Windows Server 2016 Standard (64 bit)
No DCOM or UAC changes are necessary as the default administrator group has the necessary permissions. The following changes are made to each system for successful remote WMI connection.
- Enabling the default Administrative user.
- Enabling network access for users to authenticate as themselves.
- Enabling firewall access to allow remote administration exception.
Setting up a Remote WMI Connection
Open Group Policy
From Start > Run… type gpedit.msc and click OK to open the Group Policy editor.
Open Security Options
Under Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies click on Security Options
Verify Administrator Account
Confirm the Accounts: Administrator account status is set to Enabled.
Be sure a password is set for the Administrator account.
Verify Security Model
Confirm Network access: Sharing and security model for local accounts is set to Classic.
Verify Firewall Access
Confirm Windows Firewall: Allow remote administration exception is set to Enabled.