Freigeben über


Scripting WMI Namespace Security (part 3 of 3)

In the second part of this series, we discussed how to
retrieve the current security settings for a WMI namespace.   For
this blog post, I’ll show a Powershell script for modifying the current
security descriptor of a WMI namespace. 
Note that everything I’m doing in the Powershell script can be done in
vbscript, but I’ll leave that as an exercise to the reader.  Here’s the entire script.  I’ll discuss the various sections to explain
why I did something.  Note that this is
not intended to be a discussion about Powershell, so I’m focusing on the WMI
specific parts.

# Copyright (c) Microsoft Corporation. All rights reserved.

# For personal use only. Provided AS IS and WITH ALL FAULTS.

# Set-WmiNamespaceSecurity.ps1

# Example: Set-WmiNamespaceSecurity root/cimv2 add steve Enable,RemoteAccess

Param ( [parameter(Mandatory=$true,Position=0)][string] $namespace,

    [parameter(Mandatory=$true,Position=1)][string] $operation,

    [parameter(Mandatory=$true,Position=2)][string] $account,

    [parameter(Position=3)][string[]] $permissions = $null,

    [bool] $allowInherit = $false,

    [bool] $deny = $false,

    [string] $computerName = ".",

    [System.Management.Automation.PSCredential] $credential = $null)

   

Process {

    $ErrorActionPreference = "Stop"

    Function Get-AccessMaskFromPermission($permissions) {

        $WBEM_ENABLE = 1

    $WBEM_METHOD_EXECUTE = 2

    $WBEM_FULL_WRITE_REP = 4

    $WBEM_PARTIAL_WRITE_REP = 8

    $WBEM_WRITE_PROVIDER = 0x10

    $WBEM_REMOTE_ACCESS = 0x20

    $WBEM_RIGHT_SUBSCRIBE = 0x40

    $WBEM_RIGHT_PUBLISH = 0x80

        $READ_CONTROL = 0x20000

        $WRITE_DAC = 0x40000

       

        $WBEM_RIGHTS_FLAGS = $WBEM_ENABLE,$WBEM_METHOD_EXECUTE,$WBEM_FULL_WRITE_REP,`

            $WBEM_PARTIAL_WRITE_REP,$WBEM_WRITE_PROVIDER,$WBEM_REMOTE_ACCESS,`

            $READ_CONTROL,$WRITE_DAC

        $WBEM_RIGHTS_STRINGS = "Enable","MethodExecute","FullWrite","PartialWrite",`

            "ProviderWrite","RemoteAccess","ReadSecurity","WriteSecurity"

        $permissionTable = @{}

        for ($i = 0; $i -lt $WBEM_RIGHTS_FLAGS.Length; $i++) {

            $permissionTable.Add($WBEM_RIGHTS_STRINGS[$i].ToLower(), $WBEM_RIGHTS_FLAGS[$i])

        }

       

        $accessMask = 0

        foreach ($permission in $permissions) {

            if (-not $permissionTable.ContainsKey($permission.ToLower())) {

                throw "Unknown permission: $permission`nValid permissions: $($permissionTable.Keys)"

            }

            $accessMask += $permissionTable[$permission.ToLower()]

        }

       

        $accessMask

    }

    if ($PSBoundParameters.ContainsKey("Credential")) {

        $remoteparams = @{ComputerName=$computer;Credential=$credential}

    } else {

        $remoteparams = @{}

    }

       

    $invokeparams = @{Namespace=$namespace;Path="__systemsecurity=@"} + $remoteParams

    $output = Invoke-WmiMethod @invokeparams -Name GetSecurityDescriptor

    if ($output.ReturnValue -ne 0) {

        throw "GetSecurityDescriptor failed: $($output.ReturnValue)"

    }

    $acl = $output.Descriptor

    $OBJECT_INHERIT_ACE_FLAG = 0x1

    $CONTAINER_INHERIT_ACE_FLAG = 0x2

    $computerName = (Get-WmiObject @remoteparams Win32_ComputerSystem).Name

   

    if ($account.Contains('\')) {

        $domainaccount = $account.Split('\')

        $domain = $domainaccount[0]

        if (($domain -eq ".") -or ($domain -eq "BUILTIN")) {

            $domain = $computerName

        }

        $accountname = $domainaccount[1]

    } elseif ($account.Contains('@')) {

        $domainaccount = $account.Split('@')

        $domain = $domainaccount[1].Split('.')[0]

        $accountname = $domainaccount[0]

    } else {

   $domain = $computerName

        $accountname = $account

    }

    $getparams = @{Class="Win32_Account";Filter="Domain='$domain' and Name='$accountname'"} + $remoteParams

    $win32account = Get-WmiObject @getparams

    if ($win32account -eq $null) {

        throw "Account was not found: $account"

    }

    switch ($operation) {

        "add" {

            if ($permissions -eq $null) {

                throw "-Permissions must be specified for an add operation"

            }

            $accessMask = Get-AccessMaskFromPermission($permissions)

   

            $ace = (New-Object System.Management.ManagementClass("win32_Ace")).CreateInstance()

            $ace.AccessMask = $accessMask

            if ($allowInherit) {

                $ace.AceFlags = $OBJECT_INHERIT_ACE_FLAG + $CONTAINER_INHERIT_ACE_FLAG

            } else {

                $ace.AceFlags = 0

            }

                       

            $trustee = (New-Object System.Management.ManagementClass("win32_Trustee")).CreateInstance()

            $trustee.SidString = $win32account.Sid

            $ace.Trustee = $trustee

           

            $ACCESS_ALLOWED_ACE_TYPE = 0x0

            $ACCESS_DENIED_ACE_TYPE = 0x1

            if ($deny) {

                $ace.AceType = $ACCESS_DENIED_ACE_TYPE

            } else {

                $ace.AceType = $ACCESS_ALLOWED_ACE_TYPE

            }

            $acl.DACL += $ace.psobject.immediateBaseObject

        }

       

        "delete" {

            if ($permissions -ne $null) {

               throw "Permissions cannot be specified for a delete operation"

            }

       

            [System.Management.ManagementBaseObject[]]$newDACL = @()

            foreach ($ace in $acl.DACL) {

                if ($ace.Trustee.SidString -ne $win32account.Sid) {

                    $newDACL += $ace.psobject.immediateBaseObject

                }

            }

            $acl.DACL = $newDACL.psobject.immediateBaseObject

        }

       

        default {

            throw "Unknown operation: $operation`nAllowed operations: add delete"

        }

    }

    $setparams = @{Name="SetSecurityDescriptor";ArgumentList=$acl.psobject.immediateBaseObject} + $invokeParams

    $output = Invoke-WmiMethod @setparams

    if ($output.ReturnValue -ne 0) {

        throw "SetSecurityDescriptor failed: $($output.ReturnValue)"

    }

}

 

Setting security is a bit more complicated than retrieving
it.  You should have noticed that there
are many more parameters for this Powershell function.  Let’s go over each of them:

Param ( [parameter(Mandatory=$true,Position=0)][string] $namespace,

    [parameter(Mandatory=$true,Position=1)][string] $operation,

    [parameter(Mandatory=$true,Position=2)][string] $account,

    [parameter(Position=3)][string[]] $permissions = $null,

    [bool] $allowInherit = $false,

    [bool] $deny = $false,

    [string] $computerName = ".",

    [System.Management.Automation.PSCredential] $credential = $null)

 

1.
$namespace is the WMI namespace that you intend
to modify. 

2.
$operation is either Add or Delete. 

a.
If you want to modify existing Ace, you need to
Delete (which will delete all Aces for a user/group) and then Add back what you
want. 

3.
$account is the name of the user/group

4.
$permission is an array of the permissions to
grant to the user/group

5.
$allowInherit controls whether child namespaces
will inherit the Ace

6.
$deny indicates that this is a Deny Ace

a.
By default, you are adding Allow Aces, but you
can explicitly Deny a permission

7.
$computerName is optional and can be a remote
system

8.
$credential is the credentials to the remote
system

 

Similar to the Get-WmiNamespaceSecurity script, we want to
handle the AccessMask in a friendly way. 
This is essentially the reverse of the function in the Get script and
uses a similar logic.  Based on the
supplied permissions, we produce the accessmask value for the Ace.

    Function Get-AccessMaskFromPermission($permissions) {

        $WBEM_ENABLE = 1

$WBEM_METHOD_EXECUTE = 2

    $WBEM_FULL_WRITE_REP = 4

    $WBEM_PARTIAL_WRITE_REP = 8

  $WBEM_WRITE_PROVIDER = 0x10

    $WBEM_REMOTE_ACCESS = 0x20

       $READ_CONTROL = 0x20000

        $WRITE_DAC = 0x40000

       

        $WBEM_RIGHTS_FLAGS = $WBEM_ENABLE,$WBEM_METHOD_EXECUTE,$WBEM_FULL_WRITE_REP,`

            $WBEM_PARTIAL_WRITE_REP,$WBEM_WRITE_PROVIDER,$WBEM_REMOTE_ACCESS,`

            $READ_CONTROL,$WRITE_DAC

        $WBEM_RIGHTS_STRINGS = "Enable","MethodExecute","FullWrite","PartialWrite",`

            "ProviderWrite","RemoteAccess","ReadSecurity","WriteSecurity"

        $permissionTable = @{}

        for ($i = 0; $i -lt $WBEM_RIGHTS_FLAGS.Length; $i++) {

            $permissionTable.Add($WBEM_RIGHTS_STRINGS[$i].ToLower(), $WBEM_RIGHTS_FLAGS[$i])

        }

       

        $accessMask = 0

    foreach ($permission in $permissions) {

            if (-not $permissionTable.ContainsKey($permission.ToLower())) {

                throw "Unknown permission: $permission`nValid permissions: $($permissionTable.Keys)"

            }

            $accessMask += $permissionTable[$permission.ToLower()]

        }

       

        $accessMask

    }

 

The next section takes advantage of Powershell 2.0 splatting
so I can store commonly used parameters in a single variable.  If credentials were not specified I don’t
want the credential prompt to come up since this script can be used locally or
remotely.  Finally, I get the current
Security Descriptor so I can add or delete from it.  Always check the ReturnValue returned from
calling the WMI method.

   if ($PSBoundParameters.ContainsKey("Credential")) {

        $remoteparams = @{ComputerName=$computer;Credential=$credential}

    } else {

        $remoteparams = @{}

    }

       

    $invokeparams = @{Namespace=$namespace;Path="__systemsecurity=@"} + $remoteParams

    $output = Invoke-WmiMethod @invokeparams -Name GetSecurityDescriptor

    if ($output.ReturnValue -ne 0) {

        throw "GetSecurityDescriptor failed: $($output.ReturnValue)"

    }

    $acl = $output.Descriptor

 

Next, we need to retrieve the Win32_Account associated with
the user or group.  However, there are
different ways of specifying the account name. 
In a domain environment, you can use domain\account or
account@domain.  For a local account, you
can use .\account, computername\account, or just account.  This section of the script handles all these
cases and normalizes the result so we can get the resulting Win32_Account
instance.

    $computerName = (Get-WmiObject @remoteparams Win32_ComputerSystem).Name

   

    if ($account.Contains('\')) {

        $domainaccount = $account.Split('\')

        $domain = $domainaccount[0]

        if (($domain -eq ".") -or ($domain -eq "BUILTIN")) {

            $domain = $computerName

        }

        $accountname = $domainaccount[1]

    } elseif ($account.Contains('@')) {

        $domainaccount = $account.Split('@')

        $domain = $domainaccount[1].Split('.')[0]

        $accountname = $domainaccount[0]

    } else {

        $domain = $computerName

        $accountname = $account

    }

    $getparams = @{Class="Win32_Account";Filter="Domain='$domain' and Name='$accountname'"} + $remoteParams

    $win32account = Get-WmiObject @getparams

    if ($win32account -eq $null) {

        throw "Account was not found: $account"

    }

 

Now we move onto the actual operations.  Here we will handle adding a user and
granting/denying specific permissions. 
We create a new instance of the Win32_Ace class and set the inheritance
flags appropriately.  Next, we create a
new Win32_Trustee based on the user’s sid. 
This class is an embedded object in the Win32_Ace instance.  With the accessmask and acetype set, we
append it to the end of the existing DACL.

    switch ($operation) {

        "add" {

            if ($permissions -eq $null) {

       throw "-Permissions must be specified for an add operation"

            }

            $accessMask = Get-AccessMaskFromPermission($permissions)

   

            $ace = (New-Object System.Management.ManagementClass("win32_Ace")).CreateInstance()

   $ace.AccessMask = $accessMask

            if ($allowInherit) {

                $ace.AceFlags = $OBJECT_INHERIT_ACE_FLAG + $CONTAINER_INHERIT_ACE_FLAG

            } else {

                $ace.AceFlags = 0

            }

                       

   $trustee = (New-Object System.Management.ManagementClass("win32_Trustee")).CreateInstance()

            $trustee.SidString = $win32account.Sid

            $ace.Trustee = $trustee

           

            $ACCESS_ALLOWED_ACE_TYPE = 0x0

            $ACCESS_DENIED_ACE_TYPE = 0x1

            if ($deny) {

                $ace.AceType = $ACCESS_DENIED_ACE_TYPE

            } else {

                $ace.AceType = $ACCESS_ALLOWED_ACE_TYPE

            }

            $acl.DACL += $ace.psobject.immediateBaseObject

        }

 

For the delete operation, we search through all the Aces for
the specific user and remove them from the current DACL.  If you want to modify existing permission,
you would need to delete and then add. 
You could add a modify operation to the script, but the logic gets a bit
complicated if you want to support adding and removing permissions within the
same operation.

        "delete" {

            if ($permissions -ne $null) {

                throw "Permissions cannot be specified for a delete operation"

            }

       

            [System.Management.ManagementBaseObject[]]$newDACL = @()

            foreach ($ace in $acl.DACL) {

                if ($ace.Trustee.SidString -ne $win32account.Sid) {

                    $newDACL += $ace.psobject.immediateBaseObject

                }

            }

            $acl.DACL = $newDACL.psobject.immediateBaseObject

        }

       

        default {

            throw "Unknown operation: $operation`nAllowed operations: add delete"

        }

    }

 

Now that we have the DACL modified, we just need to invoke
the SetSecurityDescriptor method on the namespace and check the ReturnValue to
ensure it succeded.

    $setparams = @{Name="SetSecurityDescriptor";ArgumentList=$acl.psobject.immediateBaseObject} + $invokeParams

    $output = Invoke-WmiMethod @setparams

    if ($output.ReturnValue -ne 0) {

        throw "SetSecurityDescriptor failed: $($output.ReturnValue)"

    }

 

Steve Lee

Senior Test Manager

Microsoft

Comments

  • Anonymous
    April 13, 2010
    This is a great script, but I encounted a problem here. It seems the GetSecurityDescriptor in __SystemSecurity is not working. It always get RPC error here: $output = Invoke-WmiMethod @invokeparams -Name GetSecurityDescriptor But if I change GetSecurityDescriptor to GetSd or other method, it works. I don't know if there is any preconditions for this WMI method GetSecurityDescriptor, could you give me some suggestions?

  • Anonymous
    April 20, 2010
    What OS are you running this on?  GetSecurityDescriptor was added in Vista/Win2k8.

  • Anonymous
    April 25, 2010
    Thank you, problem solved. It is OS problem, and it works in powershell 2.0 RTM, not 2.0 CTP.

  • Anonymous
    August 02, 2010
    Does the winmgmt service need to be restarted for these types of changes to take effect?

  • Anonymous
    August 02, 2010
    Changing namespace security does NOT require restarting the winmgmt service, however, I do believe it will only affect new connections and not existing ones.

  • Anonymous
    September 09, 2010
    Hi Steve, many thanks for this script. It saves me a lot of time. Only one thing: to run it remotely I have to do the following changes: from:    if ($PSBoundParameters.ContainsKey("Credential")) {        $remoteparams = @{ComputerName=$computer;Credential=$credential}    } else {        $remoteparams = @{}    } to:    if ($PSBoundParameters.ContainsKey("Credential")) {        $remoteparams = @{ComputerName=$computer;Credential=$credential}    } else {        $remoteparams = @{ComputerName=$computerName}    } and from: $getparams = @{Class="Win32_Account";Filter="Domain='$domain' and Name='$accountname'"} + $remoteParams to: $getparams = @{Class="Win32_Account";Filter="Domain='$domain' and Name='$accountname'"} Kind regards, Florian

  • Anonymous
    September 10, 2010
    The comment has been removed

  • Anonymous
    January 13, 2011
    Does it work on Windows Server 2003 R2? I get this error: Unable to find type [parameter(Mandatory=$true,Position=0)]: make sure that the assembly containing this type is loaded . At C:Documents and Settings60034XXXMy DocumentsWMIWmi.ps1:13 char:48

  • Param ( [parameter(Mandatory=$true,Position=0)][ <<<< string] $namespace, thanks
  • Anonymous
    January 13, 2011
    The script works fine on Windows Server 2008, but I have a doubt How I can make for add an account to the namespace root and also applies to all subnamespaces? Thanks in advance

  • Anonymous
    January 14, 2011
    @oxxo, regarding the Powershell error, make sure you are using Powershell 2.0 For subnamespaces, if the ACL on the subnamespace is defined to inherit from the parent (and by default it is), then any modifications to the parent (including root) should be inherited automatically.  However, if a namespace ACL explicitly is set to not inherit, then you would need to update that subnamespace directly.

  • Anonymous
    June 21, 2012
    I should add its Win2008R2

  • Anonymous
    August 09, 2013
    by default ACL only applies to parent namespace. For this script to work on subnamespaces, you have to take out $OBJECT_INHERIT_ACE_FLAG = 0x1, tested on server 2008 and server 2008r2

  • Anonymous
    November 07, 2013
    I am trying to use this script and it won't work on Windows 2003, how do you get it to work?

  • Anonymous
    November 08, 2013
    Are you getting an error message?  What parameters are you providing?

  • Anonymous
    November 20, 2013
    The comment has been removed

  • Anonymous
    April 03, 2014
    Steve - thanks a ton for providing this script. It's three years but did help me. Florian- thanks a ton for the implicit credentials.

  • Anonymous
    June 12, 2014
    Hi Steve: First, thanks a lot for this script. Steve, not sure why when it is trying to modify the permissions in rootcimv2 I got the message below. But for root or rootdefault it is working fine. Thanks. Invoke-WmiMethod : Unexpected error At C:installSQLPowershellscriptsSet-WmiNamespaceSecurity.ps1:125 char:31

  •     $output = Invoke-WmiMethod <<<<  @invokeparams -Name GetSecurityDescriptor    + CategoryInfo          : InvalidOperation: (:) [Invoke-WmiMethod], ManagementException    + FullyQualifiedErrorId : InvokeWMIManagementException,Microsoft.PowerShell.Commands.InvokeWmiMethod
  • Anonymous
    September 10, 2014
    The comment has been removed

  • Anonymous
    May 18, 2015
    Great scripts, Steve, they seem to be working great for me. One question: How would one modify the security to add a user for the "main" wmi schema as seen in the GUI for winrm configsddl wmi? What resource_uri does this map to, or how would I go about finding out?

  • Anonymous
    May 18, 2015
    The comment has been removed

  • Anonymous
    May 18, 2015
    Thanks, Steve! This should get me well on my way to completing my powershell script! (working on getting event logging automagically set up for RSA Security Analytics)

  • Anonymous
    June 29, 2015
    Check out the DSC resource that should replace the need for these scripts: blogs.msdn.com/.../use-dsc-to-manage-wmi-namespace-security.aspx

  • Anonymous
    July 14, 2015
    I have 2 domains, A and B. they have a trust between each other, different forests. my account is in domain A. I want to set wmi security on domain B, but i get Account Not Found error on this. Account was not found: chris@domainA.local At C:toolswinrmSet-WMInamespaceSecurity2.ps1:95 char:9

  •         throw "Account was not found: $account"
  •         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~    + CategoryInfo          : OperationStopped: (Account was not...domainA.local:String) [], RuntimeException    + FullyQualifiedErrorId : Account was not found: chris@domainA.local I also tried it with domainAchris and same result. If I set the wmi security on rootcimv2 manually, it can find the account. any thoughts on this?
  • Anonymous
    July 17, 2015
    The comment has been removed

  • Anonymous
    August 17, 2015
    Hey Steve, I am trying to run the WMI script you have above but am getting an error that confuses me. I am also getting the "throw "Account was not found: $account"", our naming convention is first.last, I have also tried with an account that has no special characters. I did as you suggested and ran win32_account on the remote device and it lists the domain accounts including the one I am using to test. I also tried running domainfirst.last and it doesn't generate an error, I then try to run "Get-WmiObject -Class Win32_PerfRawData_PerfDisk_LogicalDisk -ComputerName $ComputerName" and it provides me with an access denied error. To troubleshoot this further I gave the account local admin access and the same command ran successfullly remotely and locally. Do you have any suggestions on how to resolve this?

  • Anonymous
    August 17, 2015
    The comment has been removed

  • Anonymous
    August 18, 2015
    Hi Steve, Thanks for taking the time to reply. We're far from ready to actually support DSC sadly, I will see if I can sort out where the script is getting stuck.

  • Anonymous
    October 27, 2015
    The comment has been removed

  • Anonymous
    November 20, 2015
    Looks like there was a reason I wrote the code as I did originally which I should have added a comment to explain.  If you make the changes I wrote above, you'll actually break other scenarios.  The problem has to do with doing a double network hop.  Assume you are on ClientA and remotely managing TargetB.  In the original script, I was resolving accounts locally on ClientA.  This works perfectly fine if both machines are in a workgroup and have the same local accounts or if both machines are in the same domain.  If ClientA and TargetB are in different domains or if one is in a workgroup or if they are both in a workgroup and have different local accounts it doesn't work.  With the change, the account gets resolved remotely on TargetB.  However, if this is a domain account, it will fail with Access Denied as it will incur a second network hop to the domain controller to resolve the account. A proper fix here would be somewhat complicated to satisfy all scenarios.  Easiest would be a switch to indicate if the account should be resolved locally or remotely, but this still doesn't work if ClientA is not in the same domain as TargetB.  To make that work, you would need to use Kerberos delegation or change to using the new CIM cmdlets and CredSSP.