Chat now with support
Chat with Support

Foglight Agent Manager 5.8.5.2 - Guide

Configuring the Embedded Agent Manager Installing External Agent Managers
Understanding How the Agent Manager Communicates with the Management Server Deploying the Agent Manager Cartridge Downloading the Agent Manager Installer Installing the Agent Manager Starting or Stopping the Agent Manager Process Frequently Asked Questions
Configuring the Agent Manager Advanced System Configuration and Troubleshooting
Configuring Windows Management Instrumentation (WMI) Configuring Windows Remote Management (WinRM) UNIX- and Linux-Specific Configuration
Monitoring the Agent Manager Performance Deploying the Agent Manager to Large-Scale Environments

Windows Firewall Interference

Since the agent connects remotely (that is, from an external source) the Windows® Firewall can interfere with operations. In such cases, it is recommended that you initially try disabling the firewall to determine if that allows the agent to connect. When the agent can connect with the firewall disabled, re-enable it and open the following ports:

Minimum Requirements for Windows Management Instrumentation

Promoting remote users to administrators on local machines through the Domain Controller

1
Choose Control Panel > Administrative Tools > Active Directory Users and Computers.
2
In the Active Directory Users and Computers window that appears, in the left pane, under the domain node, click Computers.
4
In the Computer Management window that appears, choose System Tools > Local Users and Groups.
Using the Users node in the right pane, make an existing or a new user an Administrator.
Using the Groups node, add an existing user to the Administrators group.

Granting required permissions to individual remote users

a
On the monitored host machine, at the Windows® Run prompt, type DCOMCNFG and press Enter.
b
In the Component Services window that appears, navigate to Component Services > Computers > My Computer.
c
Right-click My Computer and click Properties.
d
In the My Computer Properties dialog box that appears, open the COM Security tab.
e
In the Access Permissions area, click Edit Defaults.
f
In the Access Permission dialog box that appears, add the Distributed COM Users group to the list and grant it all permissions.
g
Click OK to save your changes and close the Access Permission dialog box.
h
In the Launch and Activation Permissions area, click Edit Defaults.
i
In the Launch and Activation Permissions dialog box that appears, add the Distributed COM Users group to the list and grant it all permissions
j
Click OK to save your changes and close the Launch and Activation Permissions dialog box.
k
In the My Computer Properties dialog box, click OK to close it.
l
Close the Component Services window.
1
On the monitored host machine, right-click My Computer, and navigate to Manage > Services and Applications > WMI Control.
2
Right-click WMI Control and click Properties.
3
In the WMI Control Properties dialog box, open the Security tab.
4
Expand the Root node and select CIMV2, then click Security.
5
In the Security for ROOT\CIMV2 dialog box, add the Distributed COM Users group
7
Click Apply and then click OK.
To add subsequent users, they only need to be added to the two groups, Distributed COM Users and Performance Monitor Users, since these groups are already granted the required permissions.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating