Skip to main content

Windows Discovery Troubleshooting

If your Device42 Windows discovery jobs are failing, use this checklist to systematically diagnose authentication, WMI or WinRM, and connectivity issues.

This page is organized as a step-by-step troubleshooting flow, starting with basic environment checks and progressing through network, authentication, firewall, and permission validation. For general Windows discovery setup, see Windows and Hyper-V Autodiscovery.

1. Basic Environment and Discovery Setup

Verify that the fundamental components of your discovery environment are in place.

ItemNotes
Device42 Windows discovery job createdUse the correct discovery type (Windows or Hyper-V)
At least one Windows Discovery Service (WDS) is installed and onlineWDS should be registered in Device42
Correct WDS selected in job (if applicable)Job > Advanced Options
Target hosts specified (IPs or FQDNs resolve properly)Use valid DNS names or IPs
Valid Windows credentials assigned to jobEither manual or WDS Service Account Credentials
Job logs show which credentials were attemptedUse debug mode if needed

2. Network Connectivity Checks

Run the following tests from the WDS or discovery machine.

TestCommand / Notes
Ping or netstat Windows hostping HOSTNAME or IP
netstat HOSTNAME or IP
Test port 135 (for WMI)PowerShell: Test-NetConnection -ComputerName HOST -Port 135
If using WinRM, test port 5985 (HTTP) or 5986 (HTTPS)Test-NetConnection -ComputerName HOST -Port 5985
Hostname resolves correctlynslookup HOSTNAME
If using IPs, DNS is not requiredEnsure IPs are pingable

3. Authentication Validation

Confirm that the credentials used by the discovery job are valid and correctly configured.

CheckNotes
Credentials are valid and not expired or lockedTry logging in via RDP to confirm
Domain credentials are fully qualified (e.g. DOMAIN\user)Required for remote auth
If using gMSA, WDS service is running as the gMSACheck Windows Service Log On As
For gMSA, discovery job set to Use Service Account CredentialsOnly works with WDS

4. Firewall and Port Configuration

Check the following firewall rules and port settings on the target Windows host.

ItemCommand / Notes
Port 135 allowed (for WMI and DCOM)Windows Firewall inbound rule: WMI (DCOM-In)
WMI rule enabledWindows Management Instrumentation (WMI-In)
Ephemeral port range not blockedAllow dynamic ports or set custom port range for WMI
WinRM enabled and allowed (if using WinRM)Run: winrm quickconfig on target
WinRM listener existswinrm enumerate winrm/config/listener
WinRM firewall rule enabledWindows Remote Management (HTTP-In)

5. WMI and WinRM Functionality Tests

Run these commands from the WDS or discovery system to verify that WMI and WinRM are functioning correctly.

WMI Test

Get-WmiObject -Class Win32_OperatingSystem -ComputerName TARGET -Credential (Get-Credential)

WinRM Test

Test-WSMan TARGET

Or use the winrm command directly:

winrm id -r:TARGET
ResultExpected Outcome
WMI command succeedsReturns OS information
WinRM test returns 200 OKWinRM is properly configured

6. Permission and Namespace Access

Verify that the discovery account has the required permissions on the target host.

ItemNotes
Account has remote WMI permissionsUse the Device42 WMI Tester to verify
Can connect to \\TARGET\root\cimv2Use the Device42 WMI Tester to verify
Account is in Distributed COM UsersOr granted DCOM launch permissions manually
Account is in Performance Monitor/Log Users (optional)For perf counters
Account is in Event Log Readers (optional)For Windows events

7. Device42 Job-Specific Settings

Review the following settings within your Device42 discovery job.

CheckNotes
Discovery job set to correct protocol (WMI or WinRM)WinRM recommended where possible
Selected WDS is online and has connectivityTest from the same system
Job runs with Debug enabled for verbose logsReview log output in Job History
Device42 not behind proxy blocking outbound port 443For job report and updates

8. If the Job Still Fails

If you have completed the checks above and the job still fails, try the following additional steps.

StepNotes
Use the Device42 WMI Test ToolDownload from Device42
Use WBEMTest locallyConnect to \\TARGET\root\cimv2 with credentials
Review Device42 job logs for authentication errorsCheck for Access Denied vs RPC Unavailable vs other errors
Open a support ticket with Device42Include logs, test results, account details, and network path info