
- #32 lives troubleshooting update#
- #32 lives troubleshooting Patch#
- #32 lives troubleshooting windows#
Note: According to Microsoft, on Mahardening changes will be enabled by default with no ability to disable them.

To address the vulnerabilities, on June 14, 2022, Microsoft had programmatically enabled the hardening on DCOM servers by default that could be disabled via the RequireIntegrityActivationAuthenticationLevel registry key if necessary. As a result, both the DCOM RPC communication between the client and the server, and data collection in Collector is successful.
#32 lives troubleshooting Patch#
When the patch is installed on the client machine, by default it enables RPC_C_AUTHN_LEVEL_PKT_INTEGRITY on DCOM clients. It is therefore recommended that you first patch the Collector device and then the monitored device to the latest updates to resolve the event id 10036 issue.
#32 lives troubleshooting windows#
To understand the issue in detail, see Microsoft documentation Manage changes for Windows DCOM Server Security Feature Bypass. When you enable it on the server (either without any changes on the client or updating the patch on the client), it has an impact on the DCOM RPC communication resulting in the “Access is Denied” error. When the patch is installed on the server machine, the ‘RequireIntegrityActivationAuthenticationLevel’ registry value is disabled by default.
#32 lives troubleshooting update#
After applying this update on the server, we observed the occurrences of the event id 10036 in the DCOM RPC between the Client and Server communication. When Microsoft identified critical vulnerabilities with WMI, it released a Windows DCOM Server security feature bypass (CVE-2021-26414) to address the security vulnerabilities. \USERNAME or MACHINENAME\USERNAME.ĭata Collection Failure due to WMI Vulnerabilities

The LogicMonitor Collector primarily uses Windows Management Instrumentation (WMI) to monitor Windows servers. Note: A Windows Collector must be used in order to monitor Windows hosts.
