TOPIC
	about_WMI_cmdlets

SHORT DESCRIPTION
	Provides background information about Windows Management Instrumentation
	(WMI) and Windows PowerShell.
		 
LONG DESCRIPTION
	This topic provides information about WMI technology, the WMI cmdlets for 
	Windows PowerShell, WMI-based remoting, WMI accelerators,
	and WMI troubleshooting. This topic also provides links to more information
	about WMI.

				 
  About WMI 

	Windows Management Instrumentation (WMI) is the Microsoft implementation
	of Web-Based Enterprise Management (WBEM), which is an industry 
	initiative to develop a standard technology for accessing management 
	information in an enterprise environment. WMI uses the Common Information
	Model (CIM) industry standard to represent systems, applications, 
	networks, devices, and other managed components. CIM is developed and 
	maintained by the Distributed Management Task Force (DMTF). You can use
	WMI to manage both local and remote computers. For example, you can use
	WMI to do the following: 

		-- Start a process on a remote computer.

		-- Restart a computer remotely.

		-- Get a list of the applications that are installed on a local or 
			 remote computer.

		-- Query the Windows event logs on a local or remote computer.

 
  The WMI Cmdlets for Windows PowerShell

	Windows PowerShell implements WMI functionality through a set of cmdlets
	that are available in Windows PowerShell by default. You can use these 
	cmdlets to complete the end-to-end tasks necessary to manage local and 
	remote computers.
 
	The following WMI cmdlets are included.

	Cmdlet				 Description
	------------------	 ----------------------------------------------
	Get-WmiObject		Gets instances of WMI classes or information 
							 about the available classes.

	Invoke-WmiMethod	 Calls WMI methods.

	Register-WmiEvent	Subscribes to a WMI event.

	Remove-WmiObject	 Deletes WMI classes and instances.

	Set-WmiInstance		Creates or modifies instances of WMI classes.


  Sample Commands

	The following command displays the BIOS information for the local 
	computer.
		 
		C:\PS> get-wmiobject win32_bios | format-list *

	
	The following command  displays information about the WinRM service
	for three remote computers.
	
		C:\PS> get-wmiobject -query "select * from win32_service where name='WinRM'" -computername server01, server01, server03
				 

	The following more complex command exits all instances of a program.
		 
		C:\PS> notepad.exe
		C:\PS> $np = get-wmiobject -query "select * from win32_process where name='notepad.exe'" 
		C:\PS> $np | remove-wmiobject


  WMI-Based Remoting 

	While the ability to manage a local system through WMI is useful, it is
	the remoting capabilities that make WMI a powerful administrative tool. 
	WMI uses Microsoft's Distributed Component Object Model (DCOM) to 
	connect to and manage systems. You might have to configure some systems
	to allow DCOM connections. Firewall settings and locked-down DCOM 
	permissions can block WMI's ability to remotely manage systems. 
   

  WMI Type Accelerators

	Windows PowerShell includes WMI type accelerators. These WMI type 
	accelerators (shortcuts) allow more direct access to a WMI objects
	than a non-type accelerator approach would allow. 

	The following type accelerators are supported with WMI:

		[WMISEARCHER] - A shortcut for searching for WMI objects.

		[WMICLASS] - A shortcut for accessing the static properties
					 and methods of a class.

		[WMI] - A shortcut for getting a single instance of a class.

	[WMISEARCHER] is a type accelerator for a ManagementObjectSearcher.
	It can take a string constructor to create a searcher that you can then
	do a GET() on.

	For example:

	PS> $s = [WmiSearcher]'Select * from Win32_Process where Handlecount > 1000'
	PS> $s.Get() |sort handlecount |ft handlecount,__path,name -auto

	handlecount  __PATH											name
	-----------  ------											----
	1105		 \\SERVER01\root\cimv2:Win32_Process.Handle="3724"   powershell...
	1132		 \\SERVER01\root\cimv2:Win32_Process.Handle="1388"   winlogon.exe
	1495		 \\SERVER01\root\cimv2:Win32_Process.Handle="2852"   iexplore.exe
	1699		 \\SERVER01\root\cimv2:Win32_Process.Handle="1204"   OUTLOOK.EXE
	1719		 \\SERVER01\root\cimv2:Win32_Process.Handle="1912"   iexplore.exe
	2579		 \\SERVER01\root\cimv2:Win32_Process.Handle="1768"   svchost.exe


	[WMICLASS] is a type accelerator for ManagementClass. This has a 
	string constructor that takes a local or absolute WMI path to a WMI 
	class and returns an object that is bound to that class. 

	For example:

	PS> $c = [WMICLASS]"root\cimv2:WIn32_Process"
	PS> $c |fl *
	Name			 : Win32_Process
	__GENUS		: 1
	__CLASS		: Win32_Process
	__SUPERCLASS	 : CIM_Process
	__DYNASTY		: CIM_ManagedSystemElement
	__RELPATH		: Win32_Process
	__PROPERTY_COUNT : 45
	__DERIVATION	 : {CIM_Process, CIM_LogicalElement, CIM_ManagedSystemElement}
	__SERVER		 : SERVER01
	__NAMESPACE	: ROOT\cimv2
	__PATH		 : \\SERVER01\ROOT\cimv2:Win32_Process

	[WMI] is a type accelerator for ManagementObject. This has a string 
	constructor that takes a local or absolute WMI path to a WMI instance
	and returns an object that is bound to that instance. 

	For example:

	PS> $p = [WMI]'\\SERVER01\root\cimv2:Win32_Process.Handle="1204"'
	PS> $p.Name
	OUTLOOK.EXE
 

  WMI Troubleshooting 

	The following problems are the most common problems that might occur 
	when you try to connect to a remote computer.

	Problem 1: The remote computer is not online. 

	If a computer is offline, you will not be able to connect to it by 
	using WMI. You may receive the following error message:

		"Remote server machine does not exist or is unavailable"


	If you receive this error message, verify that the computer is online.
	Try to ping the remote computer.
 
 
	Problem 2: You do not have local administrator rights on the remote 
			 computer.
 
	To use WMI remotely, you must have local administrator rights on the
	remote computer. If you do not, access to that computer will be denied.

	To verify namespace security:

		a. Click Start, right-click My Computer, and then click Manage.

		b. In Computer Management, expand Services and Applications, 
			 right-click WMI Control, and then click Properties.

		c. In the WMI Control Properties dialog box, click  the Security tab.
	 
 
	Problem 3: A firewall is blocking access to the remote computer. 

	WMI uses the DCOM (Distributed COM) and RPC (Remote Procedure Call) 
	protocols to traverse the network. By default, many firewalls block
	DCOM and RPC traffic. If your firewall is blocking these protocols,
	your connection will fail. For example, Windows Firewall in Microsoft
	Windows XP Service Pack 2 is configured to automatically block all
	unsolicited network traffic, including DCOM and WMI. In its default 
	configuration, Windows Firewall rejects an incoming WMI request, and 
	you receive the following error message:

		"Remote server machine does not exist or is unavailable" 
	 

  More Information about WMI

	For more information about WMI, see the following topics in the MSDN
	(Microsoft Developer Network) library:

		"About WMI:
		http://go.microsoft.com/fwlink/?LinkId=142212

		"WMI Troubleshooting"
		http://go.microsoft.com/fwlink/?LinkId=142213


	And, see "Secrets of Windows Management Instrumentation - Troubleshooting
	and Tips" in the Microsoft TechNet Script Center:

		http://go.microsoft.com/fwlink/?LinkId=142214
 

SEE ALSO
	Online version: http://go.microsoft.com/fwlink/?LinkId=142219
	Get-WmiObject
	Invoke-WmiMethod
	Register-WmiEvent
	Remove-WmiObject
	Set-WmiInstance