- About LogicMonitor
- Cloud Monitoring
- Dashboards and Widgets
- Getting Started
- Implementation Readiness
- I just signed up for LogicMonitor, now what?
- Advanced LogicMonitor Setup
- LogicMonitor Security Best Practices
- Defining Authentication Credentials
- Adding devices when they boot
- Network scanning for additional devices
- Credentials for Accessing Remote Windows Computers
- Why am I receiving account lock out alerts?
- Running without Administrator Privileges in Windows
- How do I get support resources?
- LM Service Insight
- Rest API Developers Guide
- RPC API Developers Guide - Deprecated
- Servicenow CMDB Integration
- Terminology and Syntax
If the Collector is running as an account with rights to connect to the remote computers, no further credential modification is needed.
If the account the credentials for the Collector service do not have access rights to remote computers you want to monitor, you can explicitly provide the credentials belonging to a user with administrative rights on the computers to be queried. To do this, specify the following properties at the appropriate level (i.e. global, group, or resource level):
- wmi.user – Assign the username of an account with administrative rights on the computers to be queried to this property.
- wmi.pass – Assign the password of an account with administrative rights on the computers to be queried to this property.
- wmi.authType – Optionally, this property can be used to indicate the NTLM protocol version that should be used to authenticate to a remote WMI host. If this property is not set, it defaults to a value of “NTLMv1”. Specify “NTLMv2” for authentication via NTLM version 2. A value of “Kerberos” is also supported; if “Kerberos” is assigned you should use the ServerName or FQDN to add device, and start your Collector services using AD account credentials instead of Local System.
For more information on assigning properties, see Resource and Instance Properties.
It is possible to use a local nondomain account on a remote computer that is a domain member. This is not recommended, even if the account is in the Administrators group. Doing so will subject the WMI access to UAC filtering in Vista and later OS’s, limiting the data that can be collected. You may also trigger account lockout alerts.
Please note that remote perfmon collection is not supported when using SYSTEM accounts, regardless of pdh.user/pdh.pass property usage.
In this Article: