→ 🚀Are you a Lansweeper Champion?! Join our Contributor Program Sign up here!

Community FAQ
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
MarkDunn
Engaged Sweeper
I'm having problems seeing a LOT of machines on my network due to the RPC server not responding. One of the fixes mentioned is to run this on the machines in a .cmd file:

call netsh firewall set service RemoteAdmin enable
call netsh firewall add portopening protocol=tcp port=135 name=DCOM_TCP135
call netsh firewall add allowedprogram program=%windir%\system32\wbem\unsecapp.exe name=WMI
call netsh firewall add allowedprogram program=%windir%\system32\dllhost.exe name=Dllhost

My main concern with this is allowing dllhost as a program in the firewall. Isn't this process used by many virus writers to exploit dll files?

Any thoughts would be appreciated.

3 REPLIES 3
MarkDunn
Engaged Sweeper
I'm assuming this will suffice?

http://www.lansweeper.com/kb/firewall.aspx
Hemoco
Lansweeper Alumni
MarkDunn wrote:
I'm assuming this will suffice?

http://www.lansweeper.com/kb/firewall.aspx

Yes, in a domain this is the easiest way.
Hemoco
Lansweeper Alumni
All windows files can be potentially exploited if you don't install the latest Microsoft patches.

Easiest solution is to set up a group policy for the windows firewall

Archive

This board contains archived posts from the retired Lansweeper Forum and Insiders Community.

New to Lansweeper?

Try Lansweeper For Free

Experience Lansweeper with your own data.
Sign up now for a 14-day free trial.

Try Now