Using the Windows Powershell Script for Remote WMI Access
The Windows Powershell script configures a Windows Server 2008 machine for Remote WMI/DCOM Communication with CloudTest. This script adds exceptions in the Windows Firewall for the following services:
CloudTest uses the default RFC port range of 49157-49256. Additionally, a Windows registry key is changed by this script. To change this port range, or to learn more about the Windows Registry key, refer to Customizing the Powershell Scriptbelow. If the changes above are acceptable, use the instructions in the following section to get started. |
|
Running the Powershell Script
|
Set-ExecutionPolicy unrestricted |
|
.\configureRemoteDCOM.ps1 <username> |
Customizing the Powershell Script
$rpcPorts = "49157-49256" $portStart = 49157 $portEnd = 49256 This range must be higher than 5000 as ports below 5000 might already be in use by some other application.
Note: In Windows Server 2008 R2, the default owner of the registry key:
HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6} is "Trusted Installer". Subsequently, the script sets up the registry key: HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6} to allow access to the Root/CIMV2 namespace of WMI.
|