Agentless Windows monitors

Anthony Montibello amontibello at gmail.com
Thu Mar 24 14:01:32 CET 2005


hi 

Andreas message hits some key dangers to accessing WMI.

With access to WMI one can literally do anything, to a system,
inclusive of rebooting the system.

A second problem with WMI is that a user would still have to create
there own performance counters for checking things like CPU load over
time.  for instance just checking the Counter for CPU % is an
instantaneous result of current load at that test instance.  The only
way to check for average load over time is to collect these test
values, store them into some structure ; then calculate the average.
this is one of the reasons to use an agent,  NC_Net polls the CPU
usage ~12 times a minute. Using WMI one can setup a counter that saves
samples and then crunches the numbers but I think it is easier to just
run an agent or accept just the instantaneous time without the agent.

NOTE: NC_Net also has access to WMI however NC_Net parses the commands
sent to it and then it will only allow a select query to be passed
directly to WMI.

Several months ago there was a plug-in called "genma" that supposedly
can also run without an agent loaded via ASP ???
However I never tried this plugin because it requires Dot Net V2 (This
is still in beta)

once again thanks Andreas for a nice summary overview of what this WMI
stuff is as well as some of its advantages/disadvantages

Thanks 
Tony

On Thu, 24 Mar 2005 10:05:54 +0100, Andreas Ericsson <ae at op5.se> wrote:
> Glenn Meisenheimer wrote:
> > Hi Andreas
> >
> >
> >
> > I can tell you that when you use these scripts you don't need to
> >  install ANYTHING on the remote hosts - providing that you are using
> >  Win2k or something more recent.
> 
> The OS provides the communications interface, I'm with you. More down
> below for my concerns.
> 
> >  This is because WMI is an integral
> >  part of Windows these days, and these scripts query WMI for the
> >  same classes of information that are used to populate perfmon.
> >
> >
> >
> > Authentication?  We don't need no stinking authentication as long
> >  as the proxy server (the server running nrpe-nt and hosting these
> >  scripts)
> 
> So you need to set up a windows proxy that hosts nrpe-nt and handles all
> checks for all windows servers? Will it work with 200 servers? 2000?
> 
> > has the same Administrator login as the remote hosts.
> 
> Repeated admin logins over the network. Yay...
> Same admin username/password for all hosts. Yay...
> Please tell me the protocol at least uses strong encryption (like
> blowfish, rijndael or dsa) so that culprits can't pick the credentials
> off the wire with zero effort.
> 
> >   If that isn't the case, you need to call the scripts using the
> >  -user and -pass command line options in order to authenticate on
> >  the remote machine.  These can be handled the same as any other
> >  password in nagios - using resources.cfg and the $USERn$ macros.
> >
> 
> Authentication credentials stored on a single machine, doing intense
> networking. Yay...
> 
> >
> >
> > Also, it is possible to set up a user account on a remote machine
> >  which permits nagios to access WMI but does not permit an actual
> >  login to the remote windows server.
> >
> 
> This is good news. So what can be done with the WMI? Anything, but only
> one command at a time? Getting performance counters? A quick search for
> WMI (Windows Management Instrumentation, the name alone is horrifying in
> a wide setup) classes at msdn shows the following classes and their
> alarming descriptions (non-alarmin descriptions cut out);
> 
> * WMI registry classes - Classes that *manipulate* registry keys and values.
> 
> * WMI system classes - Predefined classes based on the Common
> Information Model (CIM) and included in every namespace in the WMI core.
> (this is alarming because CIM is decidedly broken in several places. See
> bugtraq archives for indepth analysis).
> 
> * MSFT classes - Classes that offer a means to *manipulate* and describe
> a system event. These classes are included in the operating system.
> 
> * Consumer classes - A set of WMI event consumers which *trigger an
> action* upon receipt of an arbitrary event.
> 
> I don't know much about them, but it sounds pretty much like I'd be able
> to do whatever I want (or enable myself to do whatever I want) given a 5
> minute google and the authentication credentials.
> 
> >
> >
> > Andreas, I don't expect these scripts to be the be-all and end-all,
> >  but they do demonstrate a method for using scripts to perform agentless
> >  monitoring of one's Windows infrastructure.
> 
> Not counting the proxy server running nrpe-nt, ofcourse.
> 
> >  I am hoping that they
> >  will serve as a starting place for further script development.
> >   I already have need for more of these, and the fact that they
> >  are scripted makes it easy to roll your own.
> >
> 
> Naturally. Sorry for my acrimonius response, but this has the distinct
> smell of the 1984 rsh/rexec/rlogin vuln. When it comes to microsoft and
> networking security, I trust them about as far as I can spit up-wind.
> 
> >
> >
> > Now to procede?  Here is documentation on the WMI classes available:
> >
> >
> >
> >
> >
> > http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmisdk
> > /wmi/wmi_reference.asp
> >
> >
> >
> > And here is a primer on WMI scripting:
> >
> >
> >
> > http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnanch
> > or/html/anch_wmi.asp
> >
> 
> The About WMI sports the following disturbing text.
> 
> Windows Management Instrumentation (WMI) is a component of the Windows
> operating system that provides management information and control in an
> enterprise environment. By using industry standards, managers can use
> WMI to query and set information on desktop systems, applications,
> networks, and other enterprise components. Developers can use WMI to
> create event monitoring applications that alert users when important
> incidents occur.
> 
> Note "management information and control", "query and set [everywhere]".
> It's rsh re-invented (with root-access to boot *shudder*). Those who
> know a damn have moved to ssh using pre-shared keys, strict host key
> checking and pseudo-users for doing actual work.
> 
> >
> >
> > And, of course... You could always contact Pham Van Hung in Vietnam
> >  who wrote these.  He is credited in the header, and is an affordable
> >  resource, and great guy.
> >
> 
> Considering the poorly researched but highly possible security
> implications, I'm not surprised I haven't heard the name.
> 
> --
> Andreas Ericsson                   andreas.ericsson at op5.se
> OP5 AB                             www.op5.se
> Lead Developer
> 
> -------------------------------------------------------
> This SF.net email is sponsored by Microsoft Mobile & Embedded DevCon 2005
> Attend MEDC 2005 May 9-12 in Vegas. Learn more about the latest Windows
> Embedded(r) & Windows Mobile(tm) platforms, applications & content.  Register
> by 3/29 & save $300 http://ads.osdn.com/?ad_id=6883&alloc_id=15149&op=click
> _______________________________________________
> Nagios-users mailing list
> Nagios-users at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/nagios-users
> ::: Please include Nagios version, plugin version (-v) and OS when reporting any issue.
> ::: Messages without supporting info will risk being sent to /dev/null
>


-------------------------------------------------------
This SF.net email is sponsored by Microsoft Mobile & Embedded DevCon 2005
Attend MEDC 2005 May 9-12 in Vegas. Learn more about the latest Windows
Embedded(r) & Windows Mobile(tm) platforms, applications & content.  Register
by 3/29 & save $300 http://ads.osdn.com/?ad_id=6883&alloc_id=15149&op=click
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. 
::: Messages without supporting info will risk being sent to /dev/null





More information about the Users mailing list