i wrote a little Tool to deploy Software to about 600 Servers and start an
silent Installation Process with the win32_Process Class. My Problem, about
50 Server (Win2003 Std & EE) are returning Error 3:Insufficient Privilege the
rest is running fine. So I tried to fix the issue on this Servers, but i
didn't find any differences between them and other Servers. All Servers
applying the same Group Policies and the same Local Policy Settings. The WMI
Security is the same on all Servers. So I tried to find some hints with the
WMI Verbose Logging.....nothing. I also tried to find some erros with the
ProcessMonitor from Sysinternals (aka MS-Sysinternals)...nothing. I checked
all File-Security-Settings...nothing.
Does anybody know which setting on the Servers preventing the execution of a
.cmd File started from a WMI Process or where i can find some information
about the nessesary requirements for execution? The useraccount i'm using is
a local admin on all servers.
cu markus
hth
Marcin
I specify both impersonationLevel and authenticationLevel when I connect
with WMI. For example:
strComputer = "TestComputer"
Set objWMIService = GetObject("winmgmts:" _
& "{impersonationLevel=impersonate,authenticationLevel=Pkt}!\\" _
& strComputer & "\root\cimv2")
--
Richard Mueller
Microsoft MVP Scripting and ADSI
Hilltop Lab - http://www.rlmueller.net
--
I have the same problem here. I tried to run the script on the local
computer and still the error code for the create method of
Win32_Proccess is 3 (Insufficient Privilege).
This is the test script
strComputer = "."
Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root
\cimv2")
Set objProcess = GetObject("winmgmts:root\cimv2:Win32_Process")
errReturn = objProcess.Create("Notepad.exe", null, null, intProcessID)
wscript.echo errReturn
Note: that the script is running on other 4 machines (all XP SP2 with
latest pathes and hotfixes applied). Also, I checked the security of
WMI Control and it looks fine.
Please advice
Regards,
Milosh
--
Richard Mueller
Microsoft MVP Scripting and ADSI
Hilltop Lab - http://www.rlmueller.net
--
<markovi...@gmail.com> wrote in message
news:385ca9c2-34f2-46a7...@q33g2000hsh.googlegroups.com...
I still have varying degrees of success using Win32_Process.Create.
On most it works fine using an Administrator account. On others the
process is successfuly created when run under the Local System
Account. On a few it doesn't work at all. I tried specifying both
impersonationLevel and authenticationLevel as Mr Mueller suggested but
to no avail.
Any other thoughts on this problem?