Overview
Thelocal command group provides comprehensive capabilities for interacting with the local SCCM client. These commands enable reconnaissance, credential extraction, log analysis, and WMI querying directly on the current workstation or server.
Local commands operate entirely on the current system and do not require network connectivity to SCCM infrastructure.
Command Categories
WMI Operations
classes
List available WMI classes in a namespace
class-instances
Query specific WMI class instances with filtering
class-properties
Get property definitions for WMI classes
query
Execute custom WQL queries on local WMI
Information Gathering
client-info
Get SCCM client version information
site-info
Get management point and site code
user-sid
Get current user SID in hex format
triage
Comprehensive log file analysis
File Operations
Common Workflows
Initial Reconnaissance
1
Get Site Information
Start with
local site-info to identify the management point and site code2
Check Client Version
Use
local client-info to verify SCCM client version and compatibility3
Comprehensive Analysis
Run
local triage for complete log analysis and infrastructure discoveryCredential Extraction
1
Extract Secrets
Use
local secrets -m wmi or local secrets -m disk to extract credentials2
Get User Context
Run
local user-sid to get current user’s hex SID for database operations3
Verify Access
Use discovered credentials with other SharpSCCM commands
WMI Investigation
1
List Classes
Start with
local classes to see available WMI classes2
Examine Properties
Use
local class-properties to understand class structure3
Query Data
Extract specific data with
local class-instances or local queryPrerequisites
Permissions Required
Permissions Required
- Standard User: Most read-only operations (classes, properties, site-info)
- Local Administrator: Required for secrets extraction and some WMI operations
- SYSTEM: Optional for enhanced secrets extraction
SCCM Client Requirements
SCCM Client Requirements
- SCCM client must be installed and configured
- Client should be assigned to a site
- WMI repository must be accessible and functional
Security Considerations
Integration with Remote Commands
Local commands often provide essential information for remote operations:Performance Notes
- WMI operations are typically fast (< 1 second)
- Log analysis (triage) can take 20+ seconds
- Secrets extraction may require elevated privileges and take several seconds
- File operations depend on file size and disk performance