For larger domain environments, we recommend that you configure the WinRM service via Group Policy.
Note: Using HTTP for WinRM is not recommended outside a domain environment where the NTLM protocol does not provide a sufficient level of protection for credentials. This also means that using HTTP is particularly inadequate when using scan nodes that are deployed on Linux computers.
-
- Create a new Group Policy object:
- Select Start > Administrative Tools > Group Policy Management.
- Right-click Domains and select Create a GPO in this domain, and link it here.
- Enter Elements Vulnerability Management as the required name and click OK.
- Right-click the GPO that you just created (Elements Vulnerability Management) and select Edit.
- Allow remote server management through WinRM:
- Select Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Remote Management (WinRM) > WinRM Service.
- Right-click Allow remote server management through WinRM, select Enabled, and enter suitable IPv4 and IPv6 filters.
- Switch on the WinRM service:
- Select Computer Configuration > Preferences > Control Panel Settings.
- Right-click Services and select New > Service.
- Select Automatic as the Startup type and WinRM as the ServiceName.
- Add a firewall rule to allow traffic:
- Select Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security.
- Right-click Inbound Rules and select New Rule.
- Select Windows Remote Management as the Predefined rule type and click Next.
- Select the appropriate rule for your network profile and click Next.
- Select Allow the connection and click Finish.
- On the scan node, run the following command to add the target host to the TrustedHosts list:
- Create a new Group Policy object:
Set-Item WSMan:\localhost\Client\TrustedHosts -Value ‘{IpAddress}’
Note: Use the IP address of the target computer. Use the wildcard character (*) instead of an IP address to add all computers.