Abstract
Windows management instrumentation (WMI), like any power tool, is a double-edged sword. To system administrators, WMI is an indispensable part of the system management arsenal that allows them to oversee and alter all aspects of the entire management domain from a single, centralized management console. However, if misconfigured, such a system may just as easily enable a malicious hacker not only to sniff out the valuable and sensitive system configuration and operational data, but also severely disrupt the operations of the entire enterprise, and even damage or destroy some of its components. The ability to rename and delete files, start and stop services, manage processes, and reboot computers from a centralized remote location is the dream of any system manager, and although WMI certainly turns this dream into a reality, there is a clear and present danger if all this power falls into the wrong hands.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2003 Alexander Golomshtok
About this chapter
Cite this chapter
Golomshtok, A. (2003). WMI Security. In: .NET System Management Services. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0757-3_8
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0757-3_8
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-058-4
Online ISBN: 978-1-4302-0757-3
eBook Packages: Springer Book Archive