Skip to main content

Windows

Description

The Windows connector connects to a Windows server via WinRM (Windows Remote Management) and uses PowerShell to discover local user accounts, local groups, group memberships, Windows services, and scheduled tasks. It supports both HTTP and HTTPS transport.

System Type Classification

FieldValue
System TypeServer
Default Scan Priority200

Version Support

OrbisID EditionSupported
CommunityYes
ProYes
EnterpriseYes

Windows scanning is available in all editions.

Supported Protocols

ProtocolPortEncryptionRecommendation
WinRM HTTP5985 TCPNoneDevelopment / testing only
WinRM HTTPS5986 TCPTLSRecommended for production

What OrbisID Discovers

DataSource
Local user accountsGet-LocalUser / Win32_UserAccount WMI
Local groupsGet-LocalGroup / Win32_Group WMI
Group membershipsGet-LocalGroupMember
Domain members in local groupsGet-LocalGroupMember (external members tracked for cross-system resolution)
Account status (enabled/disabled)Enabled property
Last logon timestampLastLogon property
Windows servicesGet-CimInstance Win32_Service
Scheduled tasksGet-ScheduledTask (non-Microsoft tasks only)

Privileged Groups

The following local groups are automatically classified as privileged:

Administrators, Backup Operators, Server Operators, Account Operators, Print Operators, Remote Management Users, Power Users, Schema Admins, Enterprise Admins, Domain Admins, Replicator

Connection Requirements

Enabling WinRM on the Target Host

Run from an elevated (Administrator) command prompt on the target host:

winrm quickconfig

This enables the WinRM service, creates a listener on port 5985, and configures the Windows Firewall rule.

For HTTPS (recommended for production), configure a WinRM HTTPS listener with a valid certificate:

winrm create winrm/config/Listener?Address=*+Transport=HTTPS @{Hostname="<fqdn>"; CertificateThumbprint="<thumbprint>"}

Credential Requirements

The scanning credential must be a local or domain account with WinRM access. The account must be a member of one of the following:

  • Local Administrators group (full access), or
  • Remote Management Users group + WMI namespace read access granted

For least-privilege deployments, grant the service account access to WMI namespaces:

# Grant WMI namespace access
$sd = Get-WmiObject -Namespace root\cimv2 -Class __SystemSecurity
$binarySD = $sd.GetSD()
# (use WMI Security configuration or GPO to add the account)

Domain Credentials

Domain accounts can be supplied as DOMAIN\username in the credential — the scanner automatically splits the domain prefix before constructing the WinRM connection.

Network Requirements

RequirementDetail
WinRM enabledRun winrm quickconfig on the target
Port 5985 or 5986Must be accessible from OrbisID or the On-Premise Agent
PowerShell RemotingEnabled as part of winrm quickconfig
Windows FirewallAllow inbound WinRM (TCP 5985/5986)

Configuration Steps

  1. Navigate to Systems in the sidebar
  2. Click Add System
  3. Fill in the fields:
FieldValue
NameDescriptive name (e.g., dc-prod-01)
Hostname / IPWinRM-accessible hostname or IP
Port5985 (HTTP) or 5986 (HTTPS)
OS TypeWindows
System TypeServer
CredentialWindows account with WinRM access (DOMAIN\user or local account)
  1. Click Test Connection — this runs a lightweight PowerShell Write-Output command to verify WinRM connectivity and authentication
  2. Click Save
HTTPS Recommended

Use WinRM HTTPS (port 5986) in production to encrypt credentials in transit. For environments where HTTPS is not practical, consider using an On-Premise Agent deployed within the same network segment to reduce exposure.

Troubleshooting

SymptomLikely CauseResolution
Connection test fails: Connection refusedWinRM not enabled or port blockedRun winrm quickconfig on the target; check firewall rules
Connection test fails: Access deniedInsufficient account permissionsVerify the account is in Administrators or Remote Management Users
Connection test fails: AuthenticationErrorIncorrect credentialVerify username (include domain prefix if required) and password
No service or task dataPowerShell execution policy restricts cmdletsCheck the execution policy: Get-ExecutionPolicy -List; set to RemoteSigned if restricted
Domain group members missingGet-LocalGroupMember unavailable (older OS)Windows Server 2012 R2 and older do not have Get-LocalGroupMember; scanner falls back to WMI for users and groups but membership enumeration may be limited
Scan succeeds but no accountsAccount lacks WMI namespace accessGrant root\cimv2 namespace read access to the scanning account