Overview
List available WMI classes in the SMS Provider namespace. This command is useful for understanding the WMI schema, identifying custom classes, and discovering available data sources for reconnaissance and exploitation.Syntax
Parameters
The IP address, FQDN, or NetBIOS name of the SMS Provider to connect to
The three-character site code (e.g., “PS1”)
The WMI namespace to query (default: auto-detected SMS namespace)
Filter classes by name pattern (supports partial matching)
Return count of results only
Examples
Required Permissions
SMS Admins local group membership on the SMS Provider server
Class Categories
Core Resource Classes
Core Resource Classes
SMS_R_ Classes:*
SMS_R_System- Device/computer informationSMS_R_User- User account informationSMS_R_UserGroup- User group information
Collection Classes
Collection Classes
Collection Management:
SMS_Collection- Collection definitionsSMS_CollectionMember- Collection membershipSMS_CollectionRule- Collection rules
Application Classes
Application Classes
Application Management:
SMS_Application- Application definitionsSMS_ApplicationAssignment- Application deploymentsSMS_DeploymentType- Deployment configurations
Administrative Classes
Administrative Classes
Administration:
SMS_Admin- Administrative usersSMS_Role- Security rolesSMS_SecuredObject- Object permissions
WMI Schema Discovery
Class Naming Patterns
Class Naming Patterns
SMS_ Classes:*
- Core SCCM functionality
- Microsoft-provided classes
- Standard SCCM operations
- Organization-specific extensions
- Third-party integrations
- Custom reporting classes
Class Relationships
Class Relationships
Resource Classes:
- Discovery and inventory data
- Device and user information
- Hardware and software inventory
- Administrative operations
- Configuration and policy
- Deployment and enforcement
Use Cases
WMI Reconnaissance
WMI Reconnaissance
Schema Discovery:
- Understand available data sources
- Identify custom extensions
- Map WMI capabilities
- Find interesting data classes
- Identify administrative classes
- Discover custom implementations
Attack Planning
Attack Planning
Data Source Identification:
- Locate sensitive information classes
- Find credential-related classes
- Identify high-value data sources
- Understand WMI structure for exploitation
- Plan data extraction strategies
- Identify manipulation opportunities
Common Class Patterns
Output Analysis
Class Distribution
Class Distribution
By Category:
- Resource classes: Discovery and inventory
- Management classes: Administrative operations
- Policy classes: Configuration and enforcement
- Custom classes: Organization-specific extensions
- SMS_: Microsoft SCCM classes
- CCM_: Client-side classes
- Win32_: Windows management classes
- Custom: Organization-specific classes
Security Implications
Security Implications
Sensitive Data Classes:
- User and device information
- Administrative accounts and roles
- Credential and secret storage
- Network and infrastructure data
- Deployment and execution
- Collection and targeting
- Policy and configuration
- Administrative operations
Related Commands
get class-instances- Query specific class instancesget class-properties- Examine class structurelocal classes- List local WMI classeslocal query- Execute custom WQL queries