06-19-2017 07:55 AM
I am getting the error below when trying to configure WMI. I almost get a similar error if I try to deploy the agent instead, i.e. remote copy failed to set credentials. I am using a domain admin account and I didn't see anything obvious when I turned on debug for Passive ID and didn't see anything obvious.
I can go through all the steps to check what the Config WMI script is supposed to do, but I thought the only prerequisite to running the Config WMI was the ID used was a member of Domain Admins.
Solved! Go to Solution.
06-19-2017 08:05 AM
You are correct. The only requirements are domain admin privileges as well as the ability for ISE / ISE-PIC to have access through windows firewalls. Check out the troubleshooting section of the ISE-PIC admin guide verify you AD instance is set up properly. Also, we have an ISE-PIC specific community that you can post these types of questions to in the future: Passive Identity Connector (PIC)
Regards,
-Tim
09-18-2018 07:46 AM
06-19-2017 08:05 AM
You are correct. The only requirements are domain admin privileges as well as the ability for ISE / ISE-PIC to have access through windows firewalls. Check out the troubleshooting section of the ISE-PIC admin guide verify you AD instance is set up properly. Also, we have an ISE-PIC specific community that you can post these types of questions to in the future: Passive Identity Connector (PIC)
Regards,
-Tim
07-26-2018 01:03 AM
Hi, I have the same problem "Unable to run executable on dc3.test.corp, The IseExec remote execution functionality failed to read response"
One difference I have 3 DC in one domain.
dc1 is win server 2012 - ISE-PIC works fine
dc2 is win server 2016 (upgraded from win server 2012) -ISE-PIC works fine
dc3 is win server 2016 - ISE-PIC doesn`t works.
Firewall on dc3 is disabled and account from which I connect is domain admin.
ISE dubug constantly shows this massage:
"2018-07-25 15:37:47,334 DEBUG [Thread-19][] com.cisco.idc.dc-probe- DCOM timeout reached on DC. Identity Mapping.NTLMv2 = true , Identity Mapping.dc-domainname = test.corp , Identity Mapping.probe = WMI , Identity Mapping.dc-windows-version = Win2016 , Identity Mapping.dc-username = administrator , Identity Mapping.dc-name = dc3.test.corp , Identity Mapping.dc-host = dc3.test.corp/{ip address} , Identity Mapping.server = ise , Identity Mapping.dc-netBIOS = TEST ,
2018-07-25 15:37:52,220 DEBUG [qtp60830820-14 - /][] com.cisco.idc.dc-probe- [ConfigHandler] configuration-server received request
2018-07-25 15:37:57,222 DEBUG [qtp60830820-13 - /][] com.cisco.idc.dc-probe- [ConfigHandler] configuration-server received request "
07-26-2018 11:56 AM
09-17-2018 11:47 PM
We just moved a domain controller, by demoting and then promoting it afterwards. Now I receive the same error, and the firewall is ok.
Is there are possibility that all the configuration on the domain controller got rolled back when we demoted it, and have to be done again? Shouldn't the config from ISE automatically apply the proper changes on the DC?
09-18-2018 06:03 AM
09-18-2018 06:09 AM
I read that newer version of ISE takes care of the registry settings etc. Then I only need to "Add DCs", type in user and pass for a account with sufficient privileges, and It should work?
09-18-2018 07:44 AM
09-18-2018 07:46 AM
09-20-2018 01:09 AM
05-07-2019 02:32 AM - edited 05-10-2019 06:53 AM
The password for the joining user must NOT contain special characters; at least no $ sign......for whatever reason.....
Adding and testing of a passiv-ID connection works with the "wrong" password as well, but the provider stays down.
Environment:
ISE 2.4
Domain Controller 2016
08-18-2022 12:10 PM
Paul, what was solution? Firewall settings are correct and we are using domain admin account, with same error.
02-07-2024 08:48 AM
Below is message in the Windows Domain Controller system log: plus a Microsoft knowledge base article
The server-side authentication level policy does not allow the user Domain\[domain id] SID (S-1-5-21-3253444385-1653231566-2523731723-1128) from address [ise-server-ip] to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application.
After adding the registry entry the PassiveID Domain Controllers > Add > test still fails
02-23-2024 11:44 AM
WMI as protocol for Agent after KB5004442 does not work properly anymore. You have to change it for MS-RPC protocol.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide