Oh.  Orion.  Yes, that response is somehow not a surprise to me.

On Tue, Aug 3, 2010 at 11:15 AM, Joseph Heaton <[email protected]> wrote:
> 1.  Yes, we are required to do this.  It's supposed to be for information 
> gathering only, but we're trying to cover our backsides, in case they mess 
> something up.
>     Yes, we can gain benefit, in that we can use this to get WMI access for 
> our Orion product.
> 2.  Documentation is a difficult thing.  The wording of their message is such 
> that they feel it's not a big deal for us to just give them a domain admin 
> account to play with.
>
>>>> Steven Peck <[email protected]> 8/3/2010 10:49 AM >>>
> To be honest the real questions are;
> 1.  Are you required to do this?  (Usually yes)
>  - if yes, can you gain benefit? (Usually you can)
> 2.  Do they have documentation on least privilege necessary for their
> tools to run?
>
>
>
> On Tue, Aug 3, 2010 at 10:26 AM, Free, Bob <[email protected]> wrote:
>> My experience with WMI and CMDB or security scanner products tells me
>> you are out of luck, at some point, the information they require is
>> situated such that they require admin privs just to be able to read it.
>>
>> -----Original Message-----
>> From: Joseph Heaton [mailto:[email protected]]
>> Sent: Tuesday, August 03, 2010 10:18 AM
>> To: NT System Admin Issues
>> Subject: Re: WMI information gathering
>>
>> Anyone have any idea on this one?
>>
>>>>> Joseph Heaton <[email protected]> 8/2/2010 3:42 PM >>>
>> We have a group that wants to come in, and "scan our servers" to gather
>> information.  We want to cooperate with this effort, but we don't want
>> to give them access to be able to write back to the servers.  Is this
>> possible?  Is there a tool that can be used without an admin account, in
>> order to gather information from within WMI?  Please contact offline for
>> further details, if needed.  As always, I sincerely appreciate any
>> assistance any of you may be able to provide.
>>
>> Thanks,
>>
>> Joe
>>
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>>
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to