mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live)
This commit is contained in:
commit
66526bcfc4
@ -4,14 +4,14 @@ description: Configure Client Computers
|
|||||||
ms.assetid: a48176c9-b05c-4dd5-a9ef-83073e2370fc
|
ms.assetid: a48176c9-b05c-4dd5-a9ef-83073e2370fc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
author: greg-lindsay
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: activation
|
ms.pagetype: activation
|
||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
ms.date: 04/30/2020
|
||||||
ms.date: 04/25/2017
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -24,12 +24,13 @@ To enable the Volume Activation Management Tool (VAMT) to function correctly, ce
|
|||||||
|
|
||||||
Organizations where the VAMT will be widely used may benefit from making these changes inside the master image for Windows.
|
Organizations where the VAMT will be widely used may benefit from making these changes inside the master image for Windows.
|
||||||
|
|
||||||
**Important**
|
> [IMPORTANT]
|
||||||
This procedure only applies to clients running Windows Vista or later. For clients running Windows XP Service Pack 1, see [Connecting Through Windows Firewall](https://go.microsoft.com/fwlink/p/?LinkId=182933).
|
> This procedure only applies to clients running Windows Vista or later. For clients running Windows XP Service Pack 1, see [Connecting Through Windows Firewall](https://docs.microsoft.com/windows/win32/wmisdk/connecting-to-wmi-remotely-with-vbscript).
|
||||||
|
|
||||||
## Configuring the Windows Firewall to allow VAMT access
|
## Configuring the Windows Firewall to allow VAMT access
|
||||||
|
|
||||||
Enable the VAMT to access client computers using the **Windows Firewall** Control Panel:
|
Enable the VAMT to access client computers using the **Windows Firewall** Control Panel:
|
||||||
|
|
||||||
1. Open Control Panel and double-click **System and Security**.
|
1. Open Control Panel and double-click **System and Security**.
|
||||||
2. Click **Windows Firewall**.
|
2. Click **Windows Firewall**.
|
||||||
3. Click **Allow a program or feature through Windows Firewall**.
|
3. Click **Allow a program or feature through Windows Firewall**.
|
||||||
@ -49,6 +50,7 @@ Enable the VAMT to access client computers across multiple subnets using the **W
|
|||||||
1. Open the Control Panel and double-click **Administrative Tools**.
|
1. Open the Control Panel and double-click **Administrative Tools**.
|
||||||
2. Click **Windows Firewall with Advanced Security**.
|
2. Click **Windows Firewall with Advanced Security**.
|
||||||
3. Make your changes for each of the following three WMI items, for the applicable Network Profile (Domain, Public, Private):
|
3. Make your changes for each of the following three WMI items, for the applicable Network Profile (Domain, Public, Private):
|
||||||
|
|
||||||
- Windows Management Instrumentation (ASync-In)
|
- Windows Management Instrumentation (ASync-In)
|
||||||
- Windows Management Instrumentation (DCOM-In)
|
- Windows Management Instrumentation (DCOM-In)
|
||||||
- Windows Management Instrumentation (WMI-In)
|
- Windows Management Instrumentation (WMI-In)
|
||||||
@ -62,34 +64,37 @@ Enable the VAMT to access client computers across multiple subnets using the **W
|
|||||||
- On the **Advanced** tab, verify selection of all profiles that are applicable to the network (Domain or Private/Public).
|
- On the **Advanced** tab, verify selection of all profiles that are applicable to the network (Domain or Private/Public).
|
||||||
|
|
||||||
In certain scenarios, only a limited set of TCP/IP ports are allowed through a hardware firewall. Administrators must ensure that WMI (which relies on RPC over TCP/IP) is allowed through these types of firewalls. By default, the WMI port is a dynamically allocated random port above 1024. The following Microsoft knowledge article discusses how administrators can limit the range of dynamically-allocated ports. This is useful if, for example, the hardware firewall only allows traffic in a certain range of ports.
|
In certain scenarios, only a limited set of TCP/IP ports are allowed through a hardware firewall. Administrators must ensure that WMI (which relies on RPC over TCP/IP) is allowed through these types of firewalls. By default, the WMI port is a dynamically allocated random port above 1024. The following Microsoft knowledge article discusses how administrators can limit the range of dynamically-allocated ports. This is useful if, for example, the hardware firewall only allows traffic in a certain range of ports.
|
||||||
For more info, see [How to configure RPC dynamic port allocation to work with firewalls](https://go.microsoft.com/fwlink/p/?LinkId=182911).
|
|
||||||
|
For more info, see [How to configure RPC dynamic port allocation to work with firewalls](https://support.microsoft.com/help/929851).
|
||||||
|
|
||||||
## Create a registry value for the VAMT to access workgroup-joined computer
|
## Create a registry value for the VAMT to access workgroup-joined computer
|
||||||
|
|
||||||
**Caution**
|
> [WARNING]
|
||||||
This section contains information about how to modify the registry. Make sure to back up the registry before you modify it; in addition, ensure that you know how to restore the registry, if a problem occurs. For more information about how to back up, restore, and modify the registry, see [Windows registry information for advanced users](https://go.microsoft.com/fwlink/p/?LinkId=182912).
|
> This section contains information about how to modify the registry. Make sure to back up the registry before you modify it; in addition, ensure that you know how to restore the registry, if a problem occurs. For more information about how to back up, restore, and modify the registry, see [Windows registry information for advanced users](https://support.microsoft.com/help/256986).
|
||||||
|
|
||||||
On the client computer, create the following registry key using regedit.exe.
|
On the client computer, create the following registry key using regedit.exe.
|
||||||
|
|
||||||
1. Navigate to `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system`
|
1. Navigate to `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system`
|
||||||
2. Enter the following details:
|
2. Enter the following details:
|
||||||
**Value Name: LocalAccountTokenFilterPolicy**
|
|
||||||
**Type: DWORD**
|
- **Value Name: LocalAccountTokenFilterPolicy**
|
||||||
**Value Data: 1**
|
- **Type: DWORD**
|
||||||
**Note**
|
- **Value Data: 1**
|
||||||
To discover VAMT-manageable Windows computers in workgroups, you must enable network discovery on each client.
|
|
||||||
|
> [NOTE]
|
||||||
|
> To discover VAMT-manageable Windows computers in workgroups, you must enable network discovery on each client.
|
||||||
|
|
||||||
## Deployment options
|
## Deployment options
|
||||||
|
|
||||||
There are several options for organizations to configure the WMI firewall exception for computers:
|
There are several options for organizations to configure the WMI firewall exception for computers:
|
||||||
|
|
||||||
- **Image.** Add the configurations to the master Windows image deployed to all clients.
|
- **Image.** Add the configurations to the master Windows image deployed to all clients.
|
||||||
- **Group Policy.** If the clients are part of a domain, then all clients can be configured using Group Policy. The Group Policy setting for the WMI firewall exception is found in GPMC.MSC at: **Computer Configuration\\Windows Settings\\Security Settings\\Windows Firewall with Advanced Security\\Windows Firewall with Advanced Security\\Inbound Rules**.
|
- **Group Policy.** If the clients are part of a domain, then all clients can be configured using Group Policy. The Group Policy setting for the WMI firewall exception is found in GPMC.MSC at: **Computer Configuration\\Windows Settings\\Security Settings\\Windows Firewall with Advanced Security\\Windows Firewall with Advanced Security\\Inbound Rules**.
|
||||||
- **Script.** Execute a script using Microsoft Endpoint Configuration Manager or a third-party remote script execution facility.
|
- **Script.** Execute a script using Microsoft Endpoint Configuration Manager or a third-party remote script execution facility.
|
||||||
- **Manual.** Configure the WMI firewall exception individually on each client.
|
- **Manual.** Configure the WMI firewall exception individually on each client.
|
||||||
|
|
||||||
The above configurations will open an additional port through the Windows Firewall on target computers and should be performed on computers that are protected by a network firewall. In order to allow VAMT to query the up-to-date licensing status, the WMI exception must be maintained. We recommend administrators consult their network security policies and make clear decisions when creating the WMI exception.
|
The above configurations will open an additional port through the Windows Firewall on target computers and should be performed on computers that are protected by a network firewall. In order to allow VAMT to query the up-to-date licensing status, the WMI exception must be maintained. We recommend administrators consult their network security policies and make clear decisions when creating the WMI exception.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Install and Configure VAMT](install-configure-vamt.md)
|
- [Install and Configure VAMT](install-configure-vamt.md)
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user