In Chapter 12, we talked about the performance monitor classes. We discussed how we can use
them to obtain real-time data that can either form the basis of a reporting script or a monitoring
script. In this chapter, we examine WMI security. Everyone wants to talk about security—and
for good reason. It does not make sense to have something that enables administrators to make
changes to every workstation on the network if hackers can use the same tools to make changes
to every workstation on the network! There is a balancing act between security and function-
ality. Some of the recent security changes made ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.