OS Monitoring

The Domotz OS Monitoring Feature

The Domotz Operating System (OS) Monitoring Feature extracts additional information about your devices, including OS name, version, vendor, architecture, serial number, and build number. Compatible devices will be marked as locked in the device list view. Domotz will mark computers, servers, and notebooks having the SSH (22) or WINRM (5986) ports open as locked, so you can unlock the OS Monitoring feature.

For security reasons, SSH has priority over WINRM if a Windows machine has both services enabled:

OS Management Feature screenshot 1

Whenever possible, we recommend using the SSH configuration.

The OS Monitoring feature has been tested on the following systems:

  • Windows 10 (or newer)
  • macOS Catalina (or newer)
  • Debian/Ubuntu Linux
  • VMWare/ESXi
  • Dell iDRAC
  • HP iLO (HP iLO 4 is not supported)
  • Raspbian

Note: After enabling SSH or WinRM on your machine, it might take up to 3 hours to see the possibility to unlock this functionality on the device.

Unlock the Domotz OS Monitoring feature

You can unlock this feature through your Credentials Manager by inserting a user’s credentials (no administrator privileges are required).

  • SSH unlocked example:
OS Management Feature screenshot 2
  • WINRM locked example:
OS Management Feature screenshot 3

After unlocking the device the OS information will be available from the device info view:

OS Management Feature screenshot 4


Virtual Machine Data

On a VMWare ESXi server, Domotz will also retrieve information related to Virtual Machines (VM):

The following information for each VM will be presented:

  • Name of the VM
  • Power Status
  • Guest Full Name and OS
  • Memory Size
  • Virtual CPUs (number)
  • Ethernet Cards attached to the VM (number)
  • Virtual Disks attached to the VM (number)
  • Path Name for the VM disk
  • UUID
  • Boot-Time

Unlock VMware ESXi

To unlock a VMware ESXi host you need to:

  • Enable sshd
  • Edit /etc/sshd_config, search for a line called PasswordAuthentication, uncomment is and set it to yes. For example:

    PasswordAuthentication yes

    If you made this modification, please save and exit the file, and then restart the sshd service on your ESXI host.
  • Use the root user to unlock the device

Microsoft Windows – SSH

We recommend the SSH option to monitor Windows systems, since the WINRM one can be quite tricky to configure.

Enable an SSH Server using Domotz PowerShell script

Please download the script from here: https://github.com/domotz/support_scripts/raw/main/os_monitoring/enable_ssh_os_monitoring.zip

and run it with administrative privileges.

Enable SSH Server (Manual Install)

Open a PowerShell prompt, using the Run as Administrator option and apply the following commands:

  • Check the availability of the server:

Get-WindowsCapability -Online | ? Name -like 'OpenSSH*'

  • Install the server:

Add-WindowsCapability -Online -Name OpenSSH.Server~~~~

  • Start the sshd service:

Start-Service sshd

  • Optional but recommended, configure the service to start automatically:

Set-Service -Name sshd -StartupType 'Automatic'

  • Confirm the firewall rule is configured. It should be created automatically by setting up:

Get-NetFirewallRule -Name *ssh*

  • There should be a firewall rule named “OpenSSH-Server-In-TCP”, which should be enabled. In case the firewall does not exist, please create one:

New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22

Microsoft Windows – WINRM

We recommend the SSH option to monitor Windows systems, since the WINRM one can be quite tricky to configure.

Enable an WinRM using Domotz PowerShell script

Please download the script from here:


and run it with administrative privileges.

How to enable WINRM on Windows (manual install)

Open a PowerShell prompt, using the Run as Administrator option and apply the following commands:

winrm quickconfig #follow the guided process

winrm set winrm/config/service/Auth '@{Basic="true"}'
winrm set winrm/config/service '@{AllowUnencrypted="true"}'
winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="1024"}'

Test WinRM configuration

There are two ways to verify that WinRM has been correctly enabled on a Windows machine:

  • PowerShell

Using a PowerShell admin console, make sure WinRM is enabled on the client (the machine you are using to perform the test from):

winrm quickconfig

Enable HTTP:

winrm set winrm/config/client '@{AllowUnencrypted="true"}'

Add the machine you are testing to the trusted hosts (replace HOST_IP with the actual IP of the Windows machine you want to test/monitor):

winrm set winrm/config/client '@{TrustedHosts="HOST_IP"}'

Execute the following commands:

$Credential = Get-Credential wmiuser  
#where wmiuser is the username to be used

test-wsman HOST_IP -Authentication Basic -Credential $Credential #replace the HOST_IP with the correct one

The output should be something like:

wsmid           : http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
ProtocolVersion : http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor   : Microsoft Corporation
ProductVersion  : OS: 10.0.19042 SP: 0.0 Stack: 3.0
  • Curl

Create the credential object for the PowerShell commands:

$Credential = Get-Credential wmiuser

Execute the Invoke-Webrequest cmdlet (replace HOST_IP with the target IP address):

curl  http://HOST_IP:5985/wsman -ContentType 'application/soap+xml;charset=UTF-8' -Credential $Credential -Method Post -UseBasicParsing -Body '<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><s:Header/><s:Body><wsmid:Identify/></s:Body></s:Envelope>' | Select-Object -ExpandProperty Content

The output should be something like:

<s:Envelope xml:lang="it-IT" xmlns:s=http://www.w3.org/2003/05/soap-envelope><s:Header></s:Header><s:Body><wsmid:IdentifyResponse xmlns:wsmid=http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd><wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion><wsmid:ProductVendor>Microsoft Corporation</wsmid:ProductVendor><wsmid:ProductVersion>OS: 10.0.19042 SP: 0.0 Stack: 3.0</wsmid:ProductVersion></wsmid:IdentifyResponse></s:Body></s:Envelope>

If you are able to execute curl command from a macOS or Linux machine, use the following command:

# use curl commands to check winrm service configuration
export IP_ADDRESS=yourIP
export USER=username
export PASSWORD=password

# Checks that the selected account can log in via WinRM using Basic Auth

curl --header "Content-Type: application/soap+xml;charset=UTF-8" http://$IP_ADDRESS:5985/wsman --basic  -u $USER:$PASSWORD --data '<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><s:Header/><s:Body><wsmid:Identify/></s:Body></s:Envelope>'


You need a normal user that can log in to a shell.

If you have verified that you are logging in as a user with shell access, then open the terminal and enter the following command:

sudo systemsetup -setremotelogin on

You will be required to input your user password when you run the command. Provide the password and press enter.

To check if SSH is enabled, run the following command:

sudo systemsetup -getremotelogin

If SSH is on, you will get a message that reads “Remote Login: On”.

How to allow non-admin users to access a device with WinRM or SSH (on Windows)

SSH (Windows)

When using SSH, the following steps need to be executed to allow a non-admin user to extract the OS information:

  1. Select Start > Run.
  2. On the Run dialog, type wmimgmt.msc in the Open field.
  3. Click OK to display the Windows Management Infrastructure (WMI) Control Panel.
  4. In the left pane of the WMI Control Panel, highlight the WMI Control (local) entry, right-click, and select the Properties menu option. This displays the WMI Control (Local) Properties dialog box.
  5. Select the Security tab in the WMI Control (Local) Properties dialog box.
  6. In the namespace tree within the Security tab, expand the Root folder. This action lists the available WMI namespaces.
  7. Select the CIMV2 namespace to highlight it.
  8. Click Security to display the Security for ROOT\CIMV2 dialog box.
  9. Click Add in the Security for ROOT\CIMV2 dialog box to display the Select Users or Groups dialog box.
  10. Add the domain user account that will be used as your proxy data collection user account. This should be a domain account (not a local computer account), but it does not need to be an account with administrative access.
  11. Click OK to close the Select Users or Groups dialog box and return to the Security for ROOT\CIMV2 dialog box. The user account you selected should now be listed in the Name list at the top of the dialog box.
  12. Select the newly added user (if it is not already selected) and enable the following permissions: 
    • Enable Account
    • Remote Enable
      Enable the permissions by clicking the Allow box, if it is not already checked for that specific permission. The Enable Account permission should already be selected, but you’ll need to select the Remote Enable permission.
  13. Click OK to close the Security for ROOT\CIMV2 dialog box.

Note: The above steps are sufficient to allow an SSH user to extract basic information about an Operating System. However, in addition to this, Domotz is also able to extract status information about “Disks”. In particular, you can use Domotz to identify whether or not a disk has BitLocker enabled. To allow Domotz to extract this information, repeat steps 7-13 above but instead of the ‘CIMV2’ block, navigate the tree until the ‘root/CIMV2/Security/MicrosoftVolumeEncryption’ section is highlighted.


To allow non-admin users to access a device with WinRM, add the following additional commands:

(Get-PSSessionConfiguration -Name Microsoft.PowerShell).Permission

Get the name of the group ‘Remote Management Users’ (The exact phrase may differ if your Windows version is not in English).

Net localgroup "Remote Management Users" /add username

The ‘username’ is the account you will use on Domotz.

Then you have to grant permissions to connect to WinRM and execute WMI commands to groups or users:

1 – Open a privileged command prompt or PowerShell window

2 – Assign the permissions for WinRM to the user, to open the security applet run the following:

winrm configsddl default

Add your user and grant it Read and Execute permissions:

3 – Assign the user WMI remote permissions from the WMI management console.
To open the console run:

  • Right ‘WMI Control’ and select ‘Properties’
  • Navigate to the Security tab, expand ‘Root’ and select ‘CIMV2’
  • Click ‘Advanced’
  • Verify that inheritance is enabled
  • Click ‘Add’
  • Select your user and grant it ‘Remote Enable’ and ‘Execute’

First Login to enable a user

For both the SSH or WinRM methodology, if you are using a non-Admin user, we recommend logging in to the machine with the non-admin user at least once. This should be done following the Windows initialization process. We recommend this because the full profile will be created and it will be possible for Domotz to discover the Applications installed via the Windows Store.

How to allow non-admin users to access the device with SSH (on Linux)

You would only need a normal user that can log in to a shell (/bin/bash).

Updated on November 11, 2022

Was this article helpful?