49770 12:36:30 (0) ** WMI namespace security for 'ROOT/HPQ/DEFAULT': ...................................................................... MODIFIED.
49771 12:36:30 (1) !! ERROR: Default trustee 'NT AUTHORITY\AUTHENTICATED USERS' has been REMOVED!
49772 12:36:30 (0) ** - REMOVED ACE:
49773 12:36:30 (0) ** ACEType: &h0
49774 12:36:30 (0) ** ACCESS_ALLOWED_ACE_TYPE
49775 12:36:30 (0) ** ACEFlags: &h12
49776 12:36:30 (0) ** CONTAINER_INHERIT_ACE
49777 12:36:30 (0) ** INHERITED_ACE
49778 12:36:30 (0) ** ACEMask: &h13
49779 12:36:30 (0) ** WBEM_ENABLE
49780 12:36:30 (0) ** WBEM_METHOD_EXECUTE
49781 12:36:30 (0) ** WBEM_WRITE_PROVIDER
49782 12:36:30 (0) **
49783 12:36:30 (0) ** => The REMOVED ACE was part of the DEFAULT setup for the trustee.
49784 12:36:30 (0) ** Removing default security will cause some operations to fail!
49785 12:36:30 (0) ** It is possible to fix this issue by editing the security descriptor and adding the ACE.
49786 12:36:30 (0) ** For WMI namespaces, this can be done with 'WMIMGMT.MSC'.
49787 12:36:30 (0) ** Note: WMIDiag has no specific knowledge of this WMI namespace.
49788 12:36:30 (0) ** The security diagnostic is based on the WMI namespace expected defaults.
49789 12:36:30 (0) ** A specific WMI application can always require a security setup different
49790 12:36:30 (0) ** than the WMI security defaults.
49791 12:36:30 (0) **
49792 12:36:30 (0) ** WMI namespace security for 'ROOT/HPQ/TESTEVENT': .................................................................... MODIFIED.
49793 12:36:30 (1) !! ERROR: Default trustee 'NT AUTHORITY\AUTHENTICATED USERS' has been REMOVED!
49794 12:36:30 (0) ** - REMOVED ACE:
49795 12:36:30 (0) ** ACEType: &h0
49796 12:36:30 (0) ** ACCESS_ALLOWED_ACE_TYPE
49797 12:36:30 (0) ** ACEFlags: &h12
49798 12:36:30 (0) ** CONTAINER_INHERIT_ACE
49799 12:36:30 (0) ** INHERITED_ACE
49800 12:36:30 (0) ** ACEMask: &h13
49801 12:36:30 (0) ** WBEM_ENABLE
49802 12:36:30 (0) ** WBEM_METHOD_EXECUTE
49803 12:36:30 (0) ** WBEM_WRITE_PROVIDER
49804 12:36:30 (0) **
49805 12:36:30 (0) ** => The REMOVED ACE was part of the DEFAULT setup for the trustee.
49806 12:36:30 (0) ** Removing default security will cause some operations to fail!
49807 12:36:30 (0) ** It is possible to fix this issue by editing the security descriptor and adding the ACE.
49808 12:36:30 (0) ** For WMI namespaces, this can be done with 'WMIMGMT.MSC'.
49809 12:36:30 (0) ** Note: WMIDiag has no specific knowledge of this WMI namespace.
49810 12:36:30 (0) ** The security diagnostic is based on the WMI namespace expected defaults.
49811 12:36:30 (0) ** A specific WMI application can always require a security setup different
49812 12:36:30 (0) ** than the WMI security defaults.
49813 12:36:30 (0) **
49814 12:36:30 (0) ** WMI namespace security for 'ROOT/INTEROP': .......................................................................... MODIFIED.
49815 12:36:30 (1) !! ERROR: Default trustee 'NT AUTHORITY\AUTHENTICATED USERS' has been REMOVED!
49816 12:36:30 (0) ** - REMOVED ACE:
49817 12:36:30 (0) ** ACEType: &h0
49818 12:36:30 (0) ** ACCESS_ALLOWED_ACE_TYPE
49819 12:36:30 (0) ** ACEFlags: &h12
49820 12:36:30 (0) ** CONTAINER_INHERIT_ACE
49821 12:36:30 (0) ** INHERITED_ACE
49822 12:36:30 (0) ** ACEMask: &h13
49823 12:36:30 (0) ** WBEM_ENABLE
49824 12:36:30 (0) ** WBEM_METHOD_EXECUTE
49825 12:36:30 (0) ** WBEM_WRITE_PROVIDER
49826 12:36:30 (0) **
49827 12:36:30 (0) ** => The REMOVED ACE was part of the DEFAULT setup for the trustee.
49828 12:36:30 (0) ** Removing default security will cause some operations to fail!
49829 12:36:30 (0) ** It is possible to fix this issue by editing the security descriptor and adding the ACE.
49830 12:36:30 (0) ** For WMI namespaces, this can be done with 'WMIMGMT.MSC'.
49831 12:36:30 (0) ** Note: WMIDiag has no specific knowledge of this WMI namespace.
49832 12:36:30 (0) ** The security diagnostic is based on the WMI namespace expected defaults.
49833 12:36:30 (0) ** A specific WMI application can always require a security setup different
49834 12:36:30 (0) ** than the WMI security defaults.
49835 12:36:30 (0) **
49836 12:36:30 (0) **
49837 12:36:30 (0) ** DCOM security warning(s) detected: .................................................................................. 0.
49838 12:36:30 (0) ** DCOM security error(s) detected: .................................................................................... 0.
49839 12:36:30 (0) ** WMI security warning(s) detected: ................................................................................... 0.
49840 12:36:30 (0) ** WMI security error(s) detected: ..................................................................................... 4.
49841 12:36:30 (0) **
49842 12:36:30 (0) ** Overall DCOM security status: ....................................................................................... OK.
49843 12:36:30 (1) !! ERROR: Overall WMI security status: ................................................................................. ERROR!
49844 12:36:30 (0) ** - Started at 'Root' --------------------------------------------------------------------------------------------------------------
49845 12:36:30 (0) ** INFO: WMI permanent SUBSCRIPTION(S): ................................................................................ 16.
49846 12:36:30 (0) ** - ROOT/SUBSCRIPTION, NTEventLogEventConsumer.Name="SCM Event Log Consumer".
49847 12:36:30 (0) ** 'select * from MSFT_SCMEventLogEvent'
49848 12:36:30 (0) ** - ROOT/HPQ, CpuThreshEventConsumer.Name="Cpu Threshold Event Consumer".
49849 12:36:30 (0) ** 'select * from __instancemodificationevent within 30 where targetinstance isa 'Win32_PerfFormattedData_PerfOS_Processor' and targetinstance.PercentProcessorTime > 99 and targetinstance.Name != '_Total''
49850 12:36:30 (0) ** - ROOT/HPQ, DiskThreshEventConsumer.Name="Disk Threshold Event Consumer".
49851 12:36:30 (0) ** 'select * from __instancemodificationevent within 30 where targetinstance isa 'Win32_PerfFormattedData_PerfDisk_LogicalDisk' and targetinstance.PercentFreeSpace < 1 and targetinstance.Name != '_Total''
49852 12:36:30 (0) ** - ROOT/HPQ, HealthDriverEventConsumer.Name="Health Event Consumer".
49853 12:36:30 (0) ** 'select * from HP_PowerSupplyEvent'
49854 12:36:30 (0) ** - ROOT/HPQ, HealthDriverEventConsumer.Name="Health Event Consumer".
49855 12:36:30 (0) ** 'select * from HP_ASRStateChangeEvent'
49856 12:36:30 (0) ** - ROOT/HPQ, HealthDriverEventConsumer.Name="Health Event Consumer".
49857 12:36:30 (0) ** 'select * from HP_FanEvent'
49858 12:36:30 (0) ** - ROOT/HPQ, HealthDriverEventConsumer.Name="Health Event Consumer".
49859 12:36:30 (0) ** 'select * from HP_TempSensorFailureEvent'
49860 12:36:30 (0) ** - ROOT/HPQ, HealthDriverEventConsumer.Name="Health Event Consumer".
49861 12:36:30 (0) ** 'select * from HP_UIDStateChangeEvent'
49862 12:36:30 (0) ** - ROOT/HPQ, MemoryEventConsumer.Name="Memory Event Consumer".
49863 12:36:30 (0) ** 'select * from HP_IMLUpdatedEvent'
49864 12:36:30 (0) ** - ROOT/HPQ, ProcEventConsumer.Name="Processor Event Consumer".
49865 12:36:30 (0) ** 'select * from HP_IMLUpdatedEvent'
49866 12:36:30 (0) ** - ROOT/HPQ, HPAlertIndicationConsumer.Name="HP_AlertIndication to EventLog".
49867 12:36:30 (0) ** 'SELECT * FROM HP_AlertIndication'
49868 12:36:30 (0) ** - ROOT/HPQ, HPAlertIndicationConsumer.Name="HP_AlertIndication to EventLog".
49869 12:36:30 (0) ** 'SELECT * FROM HP_ThresholdIndication'
49870 12:36:30 (0) ** - ROOT/HPQ, SNMPEventConsumer.Name="SNMP Agent WindowNTLog Event Consumer".
49871 12:36:30 (0) ** 'SELECT * FROM __InstanceCreationEvent WHERE TargetInstance ISA 'Win32_NTLogEvent' AND TargetInstance.SourceName='Foundation Agents' AND TargetInstance.Logfile='System' AND TargetInstance.EventCode='400''
49872 12:36:30 (0) ** - ROOT/HPQ, SNMPEventConsumer.Name="SNMP Agent WindowNTLog Event Consumer".
49873 12:36:30 (0) ** 'SELECT * FROM __InstanceCreationEvent WHERE TargetInstance ISA 'Win32_NTLogEvent' AND TargetInstance.SourceName='MsiInstaller' AND TargetInstance.Logfile='Application' AND TargetInstance.EventCode='11724''
49874 12:36:30 (0) ** - ROOT/HPQ, SysEventConsumer.Name="System Event Consumer".
49875 12:36:30 (0) ** 'select * from HP_ASRStateChangeEvent'
49876 12:36:30 (0) ** - ROOT/HPQ, TestEventConsumer.Name="Test Event Consumer".
49877 12:36:30 (0) ** 'select * from __InstanceCreationEvent WITHIN 1 WHERE TargetInstance ISA 'HP_TestEvent''
49878 12:36:30 (0) **
49879 12:36:30 (0) ** WMI TIMER instruction(s): ........................................................................................... NONE.
49880 12:36:30 (0) ** INFO: WMI namespace(s) requiring PACKET PRIVACY: .................................................................... 5 NAMESPACE(S)!
49881 12:36:30 (0) ** - ROOT/CIMV2/SECURITY/MICROSOFTTPM.
49882 12:36:30 (0) ** - ROOT/CIMV2/TERMINALSERVICES.
49883 12:36:30 (0) ** - ROOT/MICROSOFTIISV2.
49884 12:36:30 (0) ** - ROOT/WEBADMINISTRATION.
49885 12:36:30 (0) ** - ROOT/SERVICEMODEL.
49886 12:36:30 (0) ** => When remotely connecting, the namespace(s) listed require(s) the WMI client to
49887 12:36:30 (0) ** use an encrypted connection by specifying the PACKET PRIVACY authentication level.
49888 12:36:30 (0) ** (RPC_C_AUTHN_LEVEL_PKT_PRIVACY or PktPrivacy flags)
49889 12:36:30 (0) ** i.e. 'WMIC.EXE /NODE:"CASASERVER" /AUTHLEVEL
ktprivacy /NAMESPACE:\\ROOT\SERVICEMODEL Class __SystemSecurity'
49890 12:36:30 (0) **
49891 12:36:30 (0) ** WMI MONIKER CONNECTIONS: ............................................................................................ OK.
49892 12:36:30 (0) ** WMI CONNECTIONS: .................................................................................................... OK.
49893 12:36:30 (1) !! ERROR: WMI GET operation errors reported: ........................................................................... 4 ERROR(S)!
49894 12:36:30 (0) ** - Root/CIMV2, Win32_PerfFormattedData_BITS_BITSNetUtilization, 0x80041002 - (WBEM_E_NOT_FOUND) Object cannot be found.
49895 12:36:30 (0) ** MOF Registration: 'C:\WINDOWS\SYSTEM32\WBEM\WMIPERFINST.MOF'
49896 12:36:30 (0) ** - Root/CIMV2, Win32_PerfRawData_BITS_BITSNetUtilization, 0x80041002 - (WBEM_E_NOT_FOUND) Object cannot be found.
49897 12:36:30 (0) ** MOF Registration: 'C:\WINDOWS\SYSTEM32\WBEM\WMIPERFINST.MOF'
49898 12:36:30 (0) ** - Root/CIMV2, Win32_PerfFormattedData_TermService_TerminalServices, 0x80041002 - (WBEM_E_NOT_FOUND) Object cannot be found.
49899 12:36:30 (0) ** MOF Registration: 'C:\WINDOWS\SYSTEM32\WBEM\WMIPERFINST.MOF'
49900 12:36:30 (0) ** - Root/CIMV2, Win32_PerfRawData_TermService_TerminalServices, 0x80041002 - (WBEM_E_NOT_FOUND) Object cannot be found.
49901 12:36:30 (0) ** MOF Registration: 'C:\WINDOWS\SYSTEM32\WBEM\WMIPERFINST.MOF'
49902 12:36:30 (0) ** => When a WMI performance class is missing (i.e. 'Win32_PerfRawData_TermService_TerminalServices'), it is generally due to
49903 12:36:30 (0) ** a lack of buffer refresh of the WMI class provider exposing the WMI performance counters.
49904 12:36:30 (0) ** You can refresh the WMI class provider buffer with the following command:
49905 12:36:30 (0) **
49906 12:36:30 (0) ** i.e. 'WINMGMT.EXE /SYNCPERF'
49907 12:36:30 (0) **
49908 12:36:30 (0) ** WMI MOF representations: ............................................................................................ OK.
49909 12:36:30 (0) ** WMI QUALIFIER access operations: .................................................................................... OK.
49910 12:36:30 (0) ** WMI ENUMERATION operations: ......................................................................................... OK.
49911 12:36:30 (0) ** WMI EXECQUERY operations: ........................................................................................... OK.
49912 12:36:30 (2) !! WARNING: WMI GET VALUE operation errors reported: ................................................................... 5 WARNING(S)!
49913 12:36:30 (0) ** - Root, Instance: __EventConsumerProviderCacheControl=@, Property: ClearAfter='00000000000030.000000:000' (Expected default='00000000000500.000000:000').
49914 12:36:30 (0) ** - Root, Instance: __EventProviderCacheControl=@, Property: ClearAfter='00000000000030.000000:000' (Expected default='00000000000500.000000:000').
49915 12:36:30 (0) ** - Root, Instance: __EventSinkCacheControl=@, Property: ClearAfter='00000000000015.000000:000' (Expected default='00000000000230.000000:000').
49916 12:36:30 (0) ** - Root, Instance: __ObjectProviderCacheControl=@, Property: ClearAfter='00000000000030.000000:000' (Expected default='00000000000500.000000:000').
49917 12:36:30 (0) ** - Root, Instance: __PropertyProviderCacheControl=@, Property: ClearAfter='00000000000030.000000:000' (Expected default='00000000000500.000000:000').
49918 12:36:30 (0) **
49919 12:36:30 (0) ** WMI WRITE operations: ............................................................................................... NOT TESTED.
49920 12:36:30 (0) ** WMI PUT operations: ................................................................................................. NOT TESTED.
49921 12:36:30 (0) ** WMI DELETE operations: .............................................................................................. NOT TESTED.
49922 12:36:30 (0) ** WMI static instances retrieved: ..................................................................................... 2367.
49923 12:36:30 (0) ** WMI dynamic instances retrieved: .................................................................................... 0.
49924 12:36:30 (0) ** WMI instance request cancellations (to limit performance impact): ................................................... 1.
49925 12:36:30 (0) ** ----------------------------------------------------------------------------------------------------------------------------------
49926 12:36:30 (0) ** # of Event Log events BEFORE WMIDiag execution since the last 20 day(s):
49927 12:36:30 (0) ** DCOM: ............................................................................................................. 0.
49928 12:36:30 (0) ** WINMGMT: .......................................................................................................... 0.
49929 12:36:30 (0) ** WMIADAPTER: ....................................................................................................... 0.
49930 12:36:30 (0) **
49931 12:36:30 (0) ** # of additional Event Log events AFTER WMIDiag execution:
49932 12:36:30 (0) ** DCOM: ............................................................................................................. 0.
49933 12:36:30 (0) ** WINMGMT: .......................................................................................................... 0.
49934 12:36:30 (0) ** WMIADAPTER: ....................................................................................................... 0.
49935 12:36:30 (0) **
49936 12:36:30 (0) ** 4 error(s) 0x80041002 - (WBEM_E_NOT_FOUND) Object cannot be found
49937 12:36:30 (0) ** => This error is typically a WMI error. This WMI error is due to:
49938 12:36:30 (0) ** - a missing WMI class definition or object.
49939 12:36:30 (0) ** (See any GET, ENUMERATION, EXECQUERY and GET VALUE operation failures).
49940 12:36:30 (0) ** You can correct the missing class definitions by:
49941 12:36:30 (0) ** - Manually recompiling the MOF file(s) with the 'MOFCOMP <FileName.MOF>' command.
49942 12:36:30 (0) ** Note: You can build a list of classes in relation with their WMI provider and MOF file with WMIDiag.
49943 12:36:30 (0) ** (This list can be built on a similar and working WMI Windows installation)
49944 12:36:30 (0) ** The following command line must be used:
49945 12:36:30 (0) ** i.e. 'WMIDiag CorrelateClassAndProvider'
49946 12:36:30 (0) ** Note: When a WMI performance class is missing, you can manually resynchronize performance counters
49947 12:36:30 (0) ** with WMI by starting the ADAP process.
49948 12:36:30 (0) ** - a WMI repository corruption.
49949 12:36:30 (0) ** In such a case, you must rerun WMIDiag with 'WriteInRepository' parameter
49950 12:36:30 (0) ** to validate the WMI repository operations.
49951 12:36:30 (0) ** Note: ENSURE you are an administrator with FULL access to WMI EVERY namespaces of the computer before
49952 12:36:30 (0) ** executing the WriteInRepository command. To write temporary data from the Root namespace, use:
49953 12:36:30 (0) ** i.e. 'WMIDiag WriteInRepository=Root'
49954 12:36:30 (0) ** - If the WriteInRepository command fails, while being an Administrator with ALL accesses to ALL namespaces
49955 12:36:30 (0) ** the WMI repository must be reconstructed.
49956 12:36:30 (0) ** Note: The WMI repository reconstruction requires to locate all MOF files needed to rebuild the repository,
49957 12:36:30 (0) ** otherwise some applications may fail after the reconstruction.
49958 12:36:30 (0) ** This can be achieved with the following command:
49959 12:36:30 (0) ** i.e. 'WMIDiag ShowMOFErrors'
49960 12:36:30 (0) ** Note: The repository reconstruction must be a LAST RESORT solution and ONLY after executing
49961 12:36:30 (0) ** ALL fixes previously mentioned.
49962 12:36:30 (2) !! WARNING: Static information stored by external applications in the repository will be LOST! (i.e. SMS Inventory)