|
• |
Check the existing configuration. Open a command prompt as administrator. Type: |
|
• |
|
• |
Type: winrm set winrm/config/service @{AllowUnencrypted="true"} |
|
• |
Type: winrm create winrm/config/listener?Address=*+Transport=HTTPS @{CertificateThumbprint="PASTE_CERTIFICATE_THUMBPRINT_HERE"} |
|
• |
From a command prompt, type: winrm enumerate winrm/config/listener |
|
• |
|
• |
|
• |
Some restrictions on the Windows Server® limit the access to certain areas of the registry that prohibit the Connection Server Agent from collecting data. For more information, see Enable DCOM on a Windows Server. Alternatively, use WinRM to collect process data from these hosts. |
|
1 |
|
a |
Create a rule that allows all incoming traffic for the file: %systemroot%\system32\dllhost.exe |
|
b |
64-bit systems only. Create a rule that allows all incoming traffic for the file: %systemroot%\SysWOW64\dllhost.exe |
|
2 |
Start the Windows Registry Editor (regedit.exe). |
|
b |
In the Permissions dialog box, click Advanced. |
|
e |
Click OK to close the Advanced Security Settings dialog box. |
|
f |
In the Permissions dialog box, click OK to close it. |
|
g |
|
h |
In the Permissions dialog box that appears, select the Administrators group. |
|
i |
Grant the Full Control permissions to this group by selecting the Allow check box. |
|
j |
In the Permissions dialog box, click OK to close it. |
|
1 |
On the target machine create the file firewall-config.ps1 containing the following script. |
|
• |
The certificate should issue to the FQDN of the server name. |
|
• |
The certificate should contain the Server Authentication purpose. |
|
• |
The certificate should contain the Private Key. |
|
• |
If the certificate is shared with other services on the server, install the certificate to the computer’s personal store. |
|
• |
If the certificate is used for AD LDS only, install the certificate to the AD LDS instance’s personal store. |
|
a |
|
b |
Type mmc to open Microsoft® Management Console (MMC). |
|
c |
Click File, click Add/Remove Snap-in, select the Certificates snap-in in Available snap-ins, and then click Add. |
|
d |
|
e |
|
f |
In Add or Remove Snap-ins, click OK. |
|
g |
In the console tree, expand Certificates(Local Computer), expand Personal, and then expand Certificates. |
|
h |
|
i |
Add the permission to the service account. Ensure that it has Read permission of the private key. |
|
• |
|
b |
Select and expand the target AD server, right click Reverse Lookup Zones, and select New Zone from the menu. |
|
• |
|
• |