To enable the Volume Activation Management Tool (VAMT) to function correctly, certain configuration changes are required on all client computers:

Organizations where the VAMT will be widely used may benefit from making these changes inside the master image for Windows.

Important

This procedure only applies to clients running Windows Vista® or later. For clients running Windows XP Service Pack 2, see http://go.microsoft.com/fwlink/?LinkId=182933.

Configuring the Windows Firewall to allow VAMT access

Enable the VAMT to access client computers using the Windows Firewall Control Panel:

  1. Open Control Panel and double-click System and Security.

  2. Click Windows Firewall.

  3. Click Allow a program or feature through Windows Firewall.

  4. Click the Change settings option.

  5. Select the Windows Management Instrumentation (WMI) checkbox.

  6. Click OK.

Warning

By default, Windows Firewall Exceptions only apply to traffic originating on the local subnet. To expand the exception to apply to multiple subnets, you need to change the exception settings in the Windows Firewall with Advanced Security, as described below.

Configure Windows Firewall to allow VAMT access across multiple subnets

Enable the VAMT to access client computers across multiple subnets using the Windows Firewall with Advanced Security Control Panel:



Screenshot of Windows Firewall with Adv. Security
  1. Open the Control Panel, double-click Administrative Tools, and then click Windows Firewall with Advanced Security.

  2. For each of the following three WMI items, for the applicable Network Profile (Domain, Public, Private), make the changes (steps a-c):

    • Windows Management Instrumentation (ASync-In)

    • Windows Management Instrumentation (DCOM-In)

    • Windows Management Instrumentation (WMI-In)

    1. On the General tab, select the Allow the connection checkbox.

    2. On the Scope tab, change the Remote IP Address setting from "Local Subnet" (default) to allow the specific access you need.

    3. On the Advanced tab, verify selection of all profiles that are applicable to the network (Domain or Private/Public).

In certain scenarios, only a limited set of TCP/IP ports are allowed through a hardware firewall. Administrators must ensure that WMI (which relies on RPC over TCP/IP) is allowed through these types of firewalls. By default, the WMI port is a dynamically allocated random port above 1024. The following Microsoft knowledge article discusses how administrators can limit the range of dynamically-allocated ports. This is useful if, for example, the hardware firewall only allows traffic in a certain range of ports.

For more information about how to configure RPC dynamic port allocation to work with firewalls, see http://go.microsoft.com/fwlink/?LinkId=182911

Create a registry value for the VAMT to access workgroup-joined computers

Caution

This section contains information about how to modify the registry. Make sure to back up the registry before you modify it; in addition, ensure that you know how to restore the registry, if a problem occurs. For more information about how to back up, restore, and modify the registry, see the Microsoft Knowledge Base article: http://go.microsoft.com/fwlink/?LinkId=182912.

On the client computer, create the following registry key using regedit.exe.

  1. Navigate to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system

  2. Enter the following details:

    Value Name: LocalAccountTokenFilterPolicy

    Type: DWORD

    Value Data: 1

Note

To discover VAMT-manageable Windows computers in workgroups, you must enable network discovery on each client.

Deployment options

There are several options for organizations to configure the WMI firewall exception for computers:

  • Image. Add the configurations to the master Windows image deployed to all clients.

  • Group Policy. If the clients are part of a domain, then all clients can be configured using Group Policy. The Group Policy setting for the WMI firewall exception is found in GPMC.MSC at: Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Inbound Rules.

  • Script. Execute a script using Microsoft System Center Configuration Manager 2007 or a third-party remote script execution facility.

  • Manual. Configure the WMI firewall exception individually on each client.

The above configurations will open an additional port through the Windows Firewall on target computers and should be performed on computers that are protected by a network firewall. We recommend disabling the WMI exception once each computer has been successfully activated. However, in order to allow VAMT to query the up-to-date licensing status, the WMI exception must be maintained. We recommend administrators consult their network security policies and make clear decisions when creating the WMI exception.

See Also