Skip to main content

Windows Discovery Troubleshooting

Purpose

Use this checklist when your Device42 Windows Discovery jobs are failing due to authentication, WMI/WinRM, or connectivity issues.

1. Basic Environment and Discovery Setup

ItemNotes
Device42 Windows Discovery Job createdUse the correct discovery type (Windows/Hyper-V)
At least one Windows Discovery Service (WDS) is installed and onlineWDS should be registered in Device42
Correct WDS selected in job (if applicable)Job → Advanced Options
Target hosts specified (IPs or FQDNs resolve properly)Use valid DNS names or IPs
Valid Windows credentials assigned to jobEither manual, or WDS "Service Account Credentials"
Job logs show which credentials were attemptedUse debug mode if needed

2. Network Connectivity Checks

Run from WDS or discovery machine:

TestCommand / Notes
Ping/Netstat Windows hostping HOSTNAME or IP
netstat HOSTNAME or IP
Test port 135 (for WMI)PowerShell: Test-NetConnection -ComputerName HOST -Port 135
If using WinRM, test port 5985 (HTTP) or 5986 (HTTPS)Test-NetConnection -ComputerName HOST -Port 5985
Hostname resolves correctlynslookup HOSTNAME
If using IPs, DNS isn't requiredEnsure IPs are pingable

3. Authentication Validation

CheckNotes
Credentials are valid and not expired/lockedTry login via RDP to confirm
Domain credentials are fully qualified (e.g. DOMAIN\user)Required for remote auth
If using gMSA, WDS service is running as the gMSACheck Windows Service "Log On As"
For gMSA, discovery job set to "Use Service Account Credentials"Only works with WDS

4. Firewall and Port Configuration

On target Windows host:

ItemCommand / Notes
Port 135 allowed (for WMI/DCOM)Windows Firewall inbound rule: "WMI (DCOM-In)"
WMI rule enabled"Windows Management Instrumentation (WMI-In)"
Ephemeral port range not blockedAllow dynamic ports or set custom port range for WMI
WinRM enabled and allowed (if using WinRM)Run: winrm quickconfig on target
WinRM listener existswinrm enumerate winrm/config/listener
WinRM firewall rule enabled"Windows Remote Management (HTTP-In)"

5. WMI / WinRM Functionality Tests

From WDS or discovery system:

WMI Test

Get-WmiObject -Class Win32_OperatingSystem -ComputerName TARGET -Credential (Get-Credential)

WinRM Test

Test-WSMan TARGET

Or:

winrm id -r:TARGET
ResultExpect
WMI command succeedsReturns OS info
WinRM test returns 200 OKWinRM properly set up

6. Permission / Namespace Access

ItemNotes
Account has remote WMI permissionsCan use Device42 WMI Tester
Can connect to \\TARGET\root\cimv2Use Device42 WMI Tester
Account is in Distributed COM UsersOr granted DCOM launch permissions manually
Account is in Performance Monitor/Log Users (optional)For perf counters
Account is in Event Log Readers (optional)For Windows events

7. Device42 Job-Specific Settings

CheckNotes
Discovery job set to correct protocol (WMI or WinRM)WinRM recommended where possible
Selected WDS is online and has connectivityTest from same system
Job runs with Debug enabled for verbose logsReview log output in Job History
Device42 not behind proxy blocking outbound port 443For job report / updates

8. If the Job Still Fails

StepNotes
Use Device42 WMI Test ToolDownload from Device42
Use WBEMTest locallyConnect to \\TARGET\root\cimv2 with credentials
Review Device42 job logs for authentication errorsCheck for "Access Denied" vs "RPC Unavailable" vs other
Open support ticket with Device42Include logs, test results, account details, and network path info