O'Reilly logo

PowerShell and WMI by Foreword by Ed Wilson, Richard Siddaway

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. WMI over WSMAN

 

This chapter covers
  • WSMAN protocols
  • Using WMI through WSMAN
  • Using CredSSP
  • Comparing WSMAN and other remoting techniques

 

In the previous chapters, we’ve looked at using the capabilities built into the WMI cmdlets to provide access to remote systems. Using the -ComputerName parameter is a simple method of creating a connection to a remote machine, and this is the approach we’ve used in the majority of the techniques explored in previous chapters. But there are a number of scenarios where this approach isn’t enough:

  • WMI uses Distributed COM (DCOM) to connect to a remote machine. This may not be available or may be blocked by a firewall.
  • You may want to run multiple WMI commands against the same machine— ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required