Users Guide

Interacting with the Cartridge for Guest Process Investigation 27
Installing and Configuring WinRM
Listening for Remote Connections
WinRM on the monitored Windows machine must be configured to listen for incoming
connections from remote parties. There are several methods and options available for
creating a listener.
The following example shows one method to create a listener:
“winrm create winrm/config/listener?Address=*+Transport=HTTP”
Authentication Scheme 1 - Encrypted Basic Authentication via HTTPS
This authentication scheme establishes an encrypted HTTPS session with WinRM. This
configuration requires that WinRM be configured with an HTTPS listener and an
appropriate certificate that identifies the machine WinRM is running on.
In addition to this WinRM configuration, the server that is running the vFoglight Agent
Manager (or servers that are not vFoglight) must be configured to trust the WinRM
Server's Certificate. You must configure the vFoglight Agent Manager to trust third
party certificates.
Note FglAM can be installed on servers that are not vFoglight servers. It is the FglAM server that
needs configured, not the vFoglight server. These procedures discuss installing FglAM on
the same machine as vFoglight.
The following provides an example for configuring WinRM with an HTTPS Listener
and Certificate:
* winrm create winrm/config/listener?Address=*+Transport=HTTPS
@{CertificateThumbpring="PASTE_CERTIFICATE_THUMBPRINT_HERE"}
Authentication Scheme 2 - Unencrypted Basic Authentication
Within the second authentication scheme, you are able to establish a session with
WinRM using unencrypted, basic authentication. The following are example commands
for setting those configuration values:
* winrm set winrm/config/service/auth @{Basic="true"}
* winrm set winrm/config/service @{AllowUnencrypted="true"}