Rule description | Protocol | Port | Traffic direction (inbound or outbound) |
WMI, DCOM, and RPC | TCP | 135, 445, and 139 | Incoming (for host) |
WMI, DCOM, and RPC | TCP | 49152 to 65534 | Outgoing (for host) |
WMI, DCOM, and RPC | TCP | 135, 445, and 139 | Outgoing (for server) |
WMI, DCOM, and RPC | TCP | 49152 to 65534 | Ingoing (for server) |
3. Check if the following rules are enabled in Windows Firewall.
- COM+ Network Access (DCOM-In)
- Remote Event Log Management (NP-In)
- Remote Event Log Management (RPC)
- Remote Event Log Management (RPC-EPMAP)
- Windows Management Instrumentation (ASync-In)
- Windows Management Instrumentation (DCOM-In)
- Windows Management Instrumentation (WMI-In)
4. In the EventLog Analyzer server, click Start. Open Run, type wbemtest, then select OK.
- In the Windows Management Instrumentation Tester window, click Connect.
- In the Connect window, enter the following:
- In the Namespace textbox, enter \\<machine_name>\root\cimv2, where machine_name is the hostname of the source machine.
- In the User and Password textboxes, enter the credentials that will be used to collect the logs, and click Connect.
- If the connection is successful, that implies there are no issues with the credentials. If you encounter an error message, proceed further based on the error code displayed.
- 800706BA: RPC server is unavailable
- 80070005: Access denied
- 800706BE: RPC has failed
- 8007203a: The server is not operational