Important These steps may increase your security risk. These steps may also make the computer or the network more vulnerable to attack by malicious users or by malicious software such as viruses. We recommend the process that this article describes to enable programs to operate as they are designed to or to implement specific program capabilities. Before you make these changes, we recommend that you evaluate the risks that are associated with implementing this process in your particular environment. If you decide to implement this process, take any appropriate additional steps to help protect the system. We recommend that you use this process only if you really require this process.
Choose 'Connect to another computer' from the Action menu to manage a different computer.
The error was: Access is denied.
The error was: The network path was not found.
Details: The network path was not found.
- Computer Management
- Device Manager
- Disk Management
- Event Viewer
- Group Policy
- Indexing Service
- Internet Protocol Security (Ipsec) Monitor
- IP Security Policy
- Local Users and Groups
- Removable Storage Management
- Resultant Set of Policy
- Shared Folders
- WMI Control
- Select Users, Computers, or Groups
- Find Users, Contacts, and Groups
Method 1 and Method 2 describe how to resolve this issue for each computer. Method 3 describes how to resolve this issue on multiple computers by using Group Policy.
Advanced UsersThese methods are intended for advanced computer users. If you are not comfortable with advanced troubleshooting, you might want to ask someone for help or contact support. For information about how to contact support, visit the following Microsoft Web site:
Method 1: Use the Netsh command-line toolOn the remote Windows XP SP2-based computer, run a netsh command to allow traffic through Windows Firewall on TCP port 445:
- Click Start, click Run, type cmd in the Open box, and then click OK.
- Type the following command, and then press ENTER: netsh firewall set portopening tcp 445 smb enableYou receive the following message:
- Close the command prompt.
Method 2: Use the Graphical User InterfaceOn the remote Windows XP SP2-based computer, modify Windows Firewall to allow incoming TCP traffic on port 445:
- Click Start, and then click
- Click Security Center, and then click
- Click the Exceptions tab, click to select the File and Printer Sharing check box, and then click
- Click to select the TCP 445 check box, click Change scope, and then take one of the following actions:
- Click My network (subnet) only.
- Click Custom list, and then type the IP addresses that you want to manage this computer.
- Click OK four times.
Method 3: Use Group Policy to set the 'Allow Remote Administration Exception' policyNote These steps assume that all the computers that you want to manage by using this policy are in the same organizational unit. For more information about how use Group Policy, visit the following Microsoft Web site:
Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2 guide. To obtain this guide, visit the following Microsoft Web site:
- Create a Group Policy object for the organizational unit that contains the Windows XP SP2-based computers that you want to manage:
- Log on to a domain controller.
- Click Start, click
Run, type dsa.msc in the
Open box, and then click OK.
- Expand your domain, right-click the organizational unit that you want to create the Group Policy in, and then click
- Click the Group Policy tab, and then click New.
- Type a name for the Group Policy object, and then press ENTER.
- Click Close.
- Log on to a domain member computer that is running Windows XP SP2 as a user who is a member of one or more of the following security groups:
- Domain Admins
- Enterprise Admins
- Group Policy Creator Owners
- Click Start, click Run, type mmc in the Open box, and then click OK.
- On the File menu, click Add/Remove Snap-in.
- On the Standalone tab, click
- In the Add Standalone Snap-in dialog box, click Group Policy Object Editor, and then click
- In the Select Group Policy Object dialog box, click Browse.
- Click the Group Policy object that you want to update with the new Windows Firewall settings. For example, click the organizational unit that contains the Windows XP SP2 computers, click OK, and then click the Group Policy object that you created in step 1.
- Click OK, and then click
- Click Close, and then click
- Under Console Root, expand the Group Policy object that you selected in step 8, expand Computer Configuration, expand Administrative Templates, expand Network, expand Network Connections, expand Windows Firewall, and then click Domain Profile.
- On the right side, double-click Windows Firewall: Allow remote administration exception.
- Click Enabled, and then specify the administrative scope in the Allow unsolicited incoming messages from box. For example, to allow remote administration from a particular IP address, type that IP address in the Allow unsolicited incoming messages from box.
To allow remote administration from a particular subnet, type that subnet by using the Classless Internet Domain Routing (CIDR) format. In this scenario, type
192.168.1.0/24 to specify the network 192.168.1.0 with a 24-bit subnet mask of 255.255.255.0. For more information about how to specify a valid administrative scope, see the Syntax area of the
Setting tab in this policy.
- Click OK, and then click
Exit on the File menu.
Article ID: 840634 - Last Review: May 18, 2009 - Revision: 1