- 12 minutes to read

Prerequisites for the Nodinite Windows Server Monitoring Agent

Nodinite Windows Server Monitoring Agent delivers robust, secure, and scalable monitoring for your entire Windows Server landscape. This page details all prerequisites to ensure a seamless installation, optimal connectivity, and compliance with best practices.

  • ✅ Secure and scalable monitoring for on-premises and cloud environments
  • ✅ All software, user rights, and firewall requirements in one place
  • ✅ Expert guidance for PowerShell, WinRM, and Service Bus setup
  • ✅ Avoid common pitfalls with clear troubleshooting and FAQ links

This page outlines the prerequisites for installing and running the Nodinite Windows Server Monitoring Agent.

graph LR subgraph "Nodinite Instance" roNI(fal:fa-monitor-waveform Windows Server Monitoring agent) end subgraph "Windows Servers" roWS(fab:fa-windows Windows Server) roNI --- roWS roWS -.-> |Custom PowerShell scripts| roAzureAPI(fab:fa-windows Remote Windows Server) end subgraph "Any pingable device/server" roDevice(fal:fa-router Device) roNI -.- |Ping| roDevice end

This diagram shows how the agent connects to Windows Servers and pingable devices, supporting both local and remote PowerShell scripts.

You can install this agent on-premises using TCP/IP for local network access, or in the cloud/off-site using Service Bus Relaying. For more details, see the external link 'Azure Relay FAQs'.

We recommend keeping this agent close to Nodinite Core Services. This documentation covers local network setup (usually on the Nodinite application server)

Verified Topic
Software Requirements
What Windows User Rights does the Windows Server Monitoring agent require?
What Firewall settings do the Nodinite Windows Server Monitoring agent require?
WinRM must be enabled for remote PowerShell. Some IIS Monitoring features rely on remote PowerShell

Software Requirements

The Windows Server Monitoring Agent is a Windows Service and is usually installed on the Nodinite application server.

Product
Windows Server Windows 2025
Windows 2022
Windows 2019
Windows 2016
Windows 2012 R2*
Windows 2012*
.NET Framework .NET Framework 4.8 or later New 6.0
Our recommendation is .NET Framework 4.8.1 or later
Powershell WMF 5.1 or later If you are using Windows 2012/2012 R2, you must install WMF 5.1 or later to make use of the PowerShell Monitoring feature. Also, some IIS Monitoring features rely on PowerShell.
IIS Monitoring (Agent Host) Remote PowerShell must be enabled for some IIS Monitoring features; follow the WinRM instructions.
IIS Monitoring (Target Host) IIS Management Console
IIS 6 Metabase Compatibility
IIS 6 Management Compatibility
IIS 6 WMI Compatibility
Management Service (Please review the additional heading)
Troubleshooting IIS Monitoring on Windows Server 2012 R2 and earlier
Target server must have Web Scripting Tools installed. Use the following PowerShell command to install the feature: 'Install-WindowsFeature Web-Scripting-Tools'
Remote PowerShell must be enabled for some IIS Monitoring features; follow the WinRM instructions

Versions 6.2 and later do no longer require the Microsoft.Web.Administration assembly on Agent Host.
Versions 6.0 and later make use of the .NET Framework 4.8 or later.
Versions 5.4 and later make use of the .NET Framework 4.6.2 or later.
Versions prior to 5.4 make use of the .NET Framework 4.5.2 or later.

Remote Windows Servers with IIS to monitor must have these Windows features installed.
IIS 6 Features
IIS 6 roles and features required for remote monitoring.

If you have three servers with IIS to monitor, you must install this feature on three servers
If you see entries in the Event Log like while activating CLSID {2B72133B-3F5B-4602-8952-803546CE3344}, please review the prereqs, restart, and make sure the following settings have been applied: Setting DCOM Security to Allow a User to Access a Computer Remotely

Management Service

If the IIS is a remote server to the Monitoring Agent; You must also enable remote connections and make sure the WMSVC service is operational. Please review the Remote Administration for IIS Manager for additional details.

  1. Enable remote connections
  2. Make sure to auto-start the VMSVC service
    Management Service
    Ensure to allow remote connections and set the 'WMSVC' service to start automatically.

Enable remote connections

  1. In the IIS MMC, click on the node, then, on Management Service.
  2. Check the Enable remote connections checkbox.

Click the Apply to persist the changes.

Apply changes
Click Apply to persist the changes.

Set WMSVC to start automatically

The WMSVC service installs with Startup Type set to Manual, which means that the service has to be manually restarted each time the server reboots or if HTTP.sys is stopped (WMSVC depends on HTTP.sys). Set the Startup Type to Automatic if you want WMSVC to start on system boot. Do this in the Services MMC console, or using this command line in an administrative command prompt:

sc.exe config WMSVC start= auto  

Supported Versions

Windows Server is ever-evolving, and Microsoft sometimes adds new functionality and/or deprecates older SDKs, methods and adjust policies. For Nodinite, this means you need to update Nodinite and our Windows Server Monitoring Agent from time to time.

Make sure to subscribe to our Release Notes.

What Windows User Rights does the Windows Server Monitoring agent require?

The Nodinite Windows Server Monitoring Agent runs as a Windows Service on a Windows Server (physical or virtual machine), typically on the same server as the Nodinite application.

Service Account Requirements

You must configure a Windows user account to run the monitoring agent service. This account needs specific permissions:

1. Account Type

Choose one of the following account types:

  • Domain account (recommended) - A user account from your Active Directory domain (e.g., DOMAIN\NodiniteAgent)
  • Local named account - A local user account on the server where the agent is installed (e.g., .\NodiniteAgent)

Tip

Use a domain account if you plan to monitor multiple servers across your network. This simplifies permission management.

2. Required Permissions

The service account needs two sets of permissions:

a) On the Agent Server (where the agent is installed):

b) On all Servers to monitor (Agent host and remote targets):

  • Local Administrator membership - The service account must be a member of the local Administrators group on every Windows Server the agent will monitor. This includes the Agent Server when the agent also monitors its host.

Important

Critical requirement: To monitor Windows Servers (local or remote), the service account must have local administrator rights on each server being monitored. Without this, the agent cannot access WMI, performance counters, remote PowerShell, IIS management or other management operations required for full monitoring.

Example Configuration

If you're using domain account DOMAIN\NodiniteAgent to monitor 5 Windows Servers:

  1. ✅ Grant "Log on as a service" right on the Agent Server
  2. ✅ Add DOMAIN\NodiniteAgent to the local Administrators group on all 5 remote servers
  3. ✅ Configure the Windows Server Monitoring Agent service to run as DOMAIN\NodiniteAgent

Note

Security consideration: While local administrator rights are required for full monitoring capabilities (WMI, performance counters, IIS management), consider your organization's security policies. Some enterprises use dedicated monitoring accounts with restricted permissions or implement least-privilege access patterns. Consult your security team if standard administrator rights are not permitted.

What Firewall settings do the Nodinite Windows Server Monitoring agent require?

Depending on where on the network you install the Windows Server Monitoring Agent and the Nodinite Monitoring Service; To monitor Windows Servers, you may need different firewall configurations on other servers. The following illustration shows the agent installed on a dedicated Windows Server.

graph TD subgraph "Nodinite Instance" roMonitoringService(fal:fa-watch-fitness Monitoring Service) roNI(fal:fa-monitor-waveform Windows Server Monitoring agent) roMonitoringService --> |"TCP/HTTPS"| roNI roWS1(fab:fa-windows Local Windows Server) end subgraph "Other Windows Servers" roAzureAPI(fab:fa-windows Remote Windows Server) roNI -.-> |WMI, RPC, ...| roAzureAPI roNI --> roWS1 end

This diagram illustrates agent and service communication, including remote WMI and RPC traffic.

The Windows Server Monitoring Agent has both inbound and outbound communication:

  1. Between the Monitoring Service and the Windows Server Monitoring Agent
  2. Between the Windows Server Monitoring Agent and monitored Windows Server(s)
    • Local (no ports required)
    • Remote ports are used

1. Between the Monitoring Service and the Windows Server Monitoring agent

The following ports must be allowed on the Windows server where the agent is installed and running:

Port Name Inbound Outbound TCP UDP Nodinite Version Comment
53 DNS All The Agent needs to know where your other servers/services are (can sometimes optionally be solved using entries in the local hosts file)

And further with one of the following options depending on your Nodinite version and deployment scenario:

Option 1a (Nodinite v7 - IIS hosted on local network)

Nodinite v7 hosts agents in IIS. When the agent is installed on the same server as the Nodinite application (typical scenario), no additional firewall rules are required between the Monitoring Service and the agent.

Port Name Inbound Outbound TCP UDP Nodinite Version Comment
Custom HTTP/HTTPS v7 Agent IIS site port (configured during installation in the Portal). Only required if agent is on a remote IIS server

Note

Nodinite v7 IIS Hosting: When agents are hosted in IIS on the same server as the Nodinite application (typical installation), firewall rules are not required between the Monitoring Service and the agent. The custom port is assigned during installation via the Nodinite Portal and only needs to be opened if the agent is hosted on a remote IIS Windows Server.

Option 1b (Nodinite v6 and earlier - Windows Service on local network)

Nodinite v6 and earlier versions use Windows Services with RPC communication on port 8000.

Port Name Inbound Outbound TCP UDP Nodinite Version Comment
8000 RPC v6 and earlier Communication is initiated by the Monitoring Service. Only used with legacy MSI installer on remote Windows servers

Note

Nodinite v6 Legacy: Port 8000 is only used when agents have default installations on remote Windows servers using the legacy MSI installer. This port is not required for Nodinite v7 IIS-hosted agents.

Option 2 (Cloud/Hybrid - All versions)

Use Service Bus Relayed connections when Nodinite and the agent are on totally different networks (cloud, off-site, or across firewalls).

Nodinite uses the same principle technique as the On-Premise data gateway; see 'Adjust communication settings for the on-premises data gateway' user guide.

Port Name Inbound Outbound TCP UDP Nodinite Version Comment
443 HTTPS All Secure outbound traffic to Azure Service Bus
5671, 5672 Secure AMQP All Alternative protocol for Azure Service Bus
9350 - 9354 Net.TCP All Legacy Service Bus protocol

2. Between the Windows Server Monitoring agent and Windows Servers

There is RPC and WMI traffic between the Windows Server Monitoring Agent and the monitored Windows Servers (1..*)

graph TD subgraph "Nodinite Instance" roNI(fal:fa-monitor-waveform Windows Server Monitoring agent) roWS1(fab:fa-windows Local Windows Server) end subgraph "Other Windows Servers" roNI -.-> |135, 445, ...| roAzureAPI(fab:fa-windows Remote Windows Server) roNI --> roWS1 end

This diagram shows agent-to-server communication for RPC and WMI monitoring.

The following sections detail firewall requirements organized by service. Three servers participate in the monitoring interchange:

  • Agent Server - Where the Nodinite Windows Server Monitoring Agent is installed
  • Remote Windows Server - Target server(s) being monitored
  • Domain Controller (DC) - Active Directory server for authentication

WMI / RPC Monitoring (Agent → Remote Server)

Required for remote Windows Server monitoring, performance counters, and WMI queries.

Direction Source Destination Protocol Port(s) Purpose Notes
Outbound Agent Server Remote Windows Server TCP 135 RPC Endpoint Mapper Used to establish DCOM/WMI session
Outbound Agent Server Remote Windows Server TCP 49152–65535 WMI / DCOM dynamic RPC Dynamic RPC range for Windows Server 2012+. Can be safely reduced to 49152–49162 (10 ports) based on expected concurrency. See How to configure RPC dynamic port allocation
Outbound Agent Server Remote Windows Server TCP 445 SMB / RPC over Named Pipes Windows Performance Counters access
Inbound Remote Windows Server Agent Server TCP 49152–65535 Response to WMI / RPC calls Response traffic automatically allowed if stateful firewall is used

PowerShell Remoting / WinRM (Agent → Remote Server)

Required if monitoring via PowerShell Remoting or certain IIS monitoring features (alternative to WMI).

Direction Source Destination Protocol Port(s) Purpose Notes
Outbound Agent Server Remote Windows Server TCP 5985 WinRM (HTTP) PowerShell Remoting over HTTP
Outbound Agent Server Remote Windows Server TCP 5986 WinRM (HTTPS) PowerShell Remoting over HTTPS (recommended for security)

Tip

Use HTTPS (port 5986) in production environments for encrypted PowerShell Remoting sessions.

Authentication (Agent → Domain Controller)

Required if the agent authenticates using domain credentials or queries certificates from Active Directory.

Direction Source Destination Protocol Port(s) Purpose Notes
Outbound Agent Server Domain Controller TCP/UDP 88 Kerberos authentication Required for domain authentication
Outbound Agent Server Domain Controller TCP/UDP 389 LDAP Standard LDAP queries
Outbound Agent Server Domain Controller TCP 636 LDAPS (Secure LDAP) Required for LDAPS authentication or querying certificates from AD
Outbound Agent Server Domain Controller TCP 445 SMB Used if Group Policy or file-based certificate access is needed
Inbound Domain Controller Agent Server TCP/UDP Same as outbound Response to Kerberos / LDAP Usually allowed by stateful firewall inspection

Note

DNS Resolution: All servers (Agent, Remote Windows Servers, and Domain Controllers) require outbound access to DNS on TCP/UDP port 53 for name resolution. This is already listed in section 1. Between the Monitoring Service and the Windows Server Monitoring agent and applies universally. You can optionally solve this using entries in the local hosts file on each server. See How DNS works on TCP and UDP for additional details.

ICMP / Ping Monitoring (Agent → Any Device)

Required for availability checks and network connectivity monitoring.

Direction Source Destination Protocol Port(s) Purpose Notes
Outbound Agent Server Any monitored device ICMP - Ping availability checks Apply to device/servers to ping as per your configuration. See New-NetFirewallRule for ICMP

Important

Stateful Firewalls: Most modern Windows Firewall implementations are stateful, meaning inbound response traffic for established outbound connections is automatically allowed. The inbound rules listed above are primarily for reference and troubleshooting scenarios where stateful inspection may be disabled or restricted.

Add firewall rule

If you want to monitor the IIS on a remote Windows server, additional firewall exclusions may be required.

Please add a new firewall rule on the remote server to monitor to allow the dllhost.exe to accept incoming requests from the Nodinite Windows Server Monitoring Agent.

Setting Value
Rule type Inbound
Rule type Custom
Program %systemroot%\system32\dllhost.exe
Protocol TCP
Local port RPC Dynamic Ports
Remote port All Ports
Action Allow connection
Profile Domain
netsh advfirewall firewall add rule name="Remote IIS inetinfo" dir=in action=allow description="Remote IIS Service Managment" program="%systemroot%\System32\inetsrv\inetinfo.exe" enable=yes  

netsh advfirewall firewall add rule name="COM+ Remote Administration (All Programs)" dir=in action=allow description="" program="%windir%\system32\dllhost.exe" enable=yes localport=RPC protocol=tcp  

WinRM

⚠️WinRM must be enabled on remote Windows Server if you are using the PowerShell feature with remote target.

Run the scripts below on the remote server to enable WinRM:

The user must have administrator rights on the remote server.

Enable-PSRemoting -Force  

Firewall rules must allow PowerShell Remoting (TCP 5985 for HTTP, TCP 5986 for HTTPS).

New-NetFirewallRule -Name "Allow WinRM" -DisplayName "Allow WinRM" -Enabled True -Profile Any -Direction Inbound -Action Allow -Protocol TCP -LocalPort 5985  

Frequently asked questions

Additional solutions to common problems and the FAQ for the Nodinite Windows Server Monitoring Agent exist in the Troubleshooting user guide.

Next Step

Install Windows Server Monitoring Agent

Add or manage a Monitoring Agent Configuration
Monitoring
Administration