This chapter provided an overview of some of the WMI providers that are distributed as part of the WMI SDK. Although there are many more providers available from Microsoft and third-party
Understand how the performance metrics are organized and structured on Windows platforms.
Write simple monitoring utilities using the Performance Monitoring provider.
Understand the difference between conventional and high-performance WMI providers.
Comprehend the basic methodology for calculating the meaningful performance metrics from the raw values, obtained through the Performance Counter provider.
Create simple, yet powerful, performance monitoring applications with the Cooked Counter provider on Windows XP.
Understand the fundamentals of the Simple Network Management Protocol (SNMP).
Comprehend the structure of a WMI SNMP provider and determine the configuration required to access specific SNMP devices from a WMI-based management console.
Develop code for retrieving SNMP objects.
Create simple programs to receive SNMP traps and notifications.
In addition to supplying the background information on some of the WMI providers, the goal of this chapter was also to whet your appetite so that you will want to explore other, poorly documented and
Windows Management Instrumentation (WMI), like any power tool, is a doubleedged sword. To system administrators, WMI is an
Thus, it should be clear to
Therefore, it will not surprise you to discover that
Unfortunately, flexibility and robustness often come at a price—high complexity—which is definitely the case with Windows and DCOM security. DCOM, for instance, has more security features than any other system known to man; however, it is often misunderstood and even more often misconfigured, thus creating security holes that naturally defeat its very purpose. But lowering the complexity is not an acceptable option either, since ensuring the proper degree of protection in a distributed environment is, by definition, very complex and cannot be achieved by simple means. In fact, industry experience shows that simplistic distributed security systems are either far too
Ignoring the security implications that result from using WMI as an enterprise-wide management solution is not a smart choice. Also, attempting to configure the system blindfolded without understanding its security features is not really a choice at all—it simply will not work. Thus, any system administrator searching for a successful management solution must be somewhat familiar with Windows and DCOM security and WMI's integration with these security models.
The purpose of this chapter is to expose you to the most important security features of WMI and to help you build a foundation on which to develop secure management applications. Although I will provide a basic overview of the Windows and DCOM security topics relevant to WMI, it is not my