Chapter 17. WMI over WSMAN

 

This chapter covers
  • WSMAN protocols
  • Using WMI through WSMAN
  • Using CredSSP
  • Comparing WSMAN and other remoting techniques

 

In the previous chapters, we’ve looked at using the capabilities built into the WMI cmdlets to provide access to remote systems. Using the -ComputerName parameter is a simple method of creating a connection to a remote machine, and this is the approach we’ve used in the majority of the techniques explored in previous chapters. But there are a number of scenarios where this approach isn’t enough:

  • WMI uses Distributed COM (DCOM) to connect to a remote machine. This may not be available or may be blocked by a firewall.
  • You may want to run multiple WMI commands against the same machine— ...

Get PowerShell and WMI now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.