|
<< Click to Display Table of Contents >> Raynet One > 2026.1 > User Guide > Technical overview Agentless Inventory Methods: Windows Zero Touch |
Windows Zero Touch is the fully agentless, adaptive inventory method in Raynet One Scan Engine for all supported Windows platforms.
The Windows Zero Touch inventory method is technically compatible with a wide range of Windows versions as long as the required WMI services and remote management features are available and enabled.
However, Raynet One officially supports and recommends the use of currently maintained Microsoft Windows releases. This ensures optimal compatibility and reliable inventory results in current and well maintained Windows environments.
Operating System |
Supported Versions (as of December 2025) |
|---|---|
Windows Client |
•Windows 11 (all editions, including 21H2 through 24H2 and later releases) |
Windows Server |
•Windows Server 2022, Windows Server 2025 (all editions) |
Older Windows versions may still provide functional inventory results via WMI; however, they are not part of the official support scope due to Microsoft's end-of-support status.
The scanner works exclusively with native Windows protocols (DCOM/RPC, SMB, Remote Registry, WinRM) and follows a strict phase model (0–6). Every phase is executed with the absolute minimum required privileges (Least-Privilege principle). If a privilege is missing, the scanner automatically falls back to the next best available method – exactly like Unix Zero Touch.
Key technical requirements:
•Domain or local account with appropriate rights on the target
•Firewall ports 135 (RPC Endpoint Mapper), dynamic RPC ports (49152-65535), 445 (SMB) and optionally 5985/5986 (WinRM)
•For full inventory depth: account must be local administrator + member of „Distributed COM Users“ and „Performance Monitor Users“ on the target
•Without local admin rights: graceful degradation to basic WMI + registry read (still ~70 % data)
Every single query is classified into one of the following Execution Contexts. This decides which access method is used and what happens if the required privilege is missing.
Execution Context |
Primary Access Method |
Required Rights |
Fallback on Failure |
Typical Use Cases |
|---|---|---|---|---|
WMI-ReadOnly |
•WMI (root\cimv2 basic classes) |
•Enable Remote WMI + Read |
•(always works) |
•OS version, hostname, basic hardware |
WMI-Full |
•WMI (all namespaces) |
•Execute Method + Remote Launch |
•Partial data (ReadOnly) |
•Hardware, processes, services, Hyper-V, SQL |
Registry-Remote |
•Remote Registry Service |
•Read HKLM |
•Skip software inventory |
•Installed software (64/32-bit) |
SMB-AdminShare |
•\\target\C$\, ADMIN$, IPC$ |
•Full Share + File Read/Execute |
•Fallback to WMI only |
•Disk serials, file scanning, Docker/Python |
Remote-Execution |
•WinRM or WMI Process.Create |
•Local Administrator + docker-users (if Docker) |
•Skip Docker / custom scripts |
•docker.exe, python.exe, custom inventory scripts |
Execution Context
•Phase 0 first probes all available protocols and rights in a single pass. The result of this phase determines the maximum achievable inventory depth for the remaining phases.
•Phases 1-6 are executed adaptively: only queries that are applicable to the detected Windows version and permitted by the current privileges are run. Queries requiring unavailable rights or non-existent components are silently skipped or automatically degraded (Principle of Least Privilege).
•Every query is classified into one of the Execution Contexts defined above. The context decides: which access method is used (WMI, Registry, SMB, Remote Execution). Whether elevated rights are required. Which fallback path is taken if the rights are missing
•When Phase 6 is complete, all collected data is normalised, returned to the Scan Engine and the connection is closed.
•Multiple targets are processed fully in parallel, with each scan instance running its own independent Phase 0-6 sequence.
This fully automated, adaptive behaviour - combined with graceful degradation at every step - is the reason the solution is called Zero Touch.
The phases described below are executed strictly in order; rights discovered in Phase 0 are reused throughout the entire scan. If a required Execution Context is not available, the scanner never aborts - it simply delivers the best possible result with the rights that are present.
First contact with the target. In a single pass, the scanner tests connectivity (RPC 135 + dynamic ports, SMB 445, Remote Registry, WMI-ReadOnly, WMI Execute Method, WinRM) and determines which Execution Contexts are actually available - this result rigidly defines the maximum achievable inventory depth for the remaining phases.
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
RPC Endpoint Mapper |
•Network |
•- |
•WMI communication base port |
•TCP Port 135 |
•- |
SMB/ CIFS |
•Network |
•- |
•File system access |
•TCP Port 445 |
•SMB-AdminShare |
WMI Services |
•WMI |
•Dynamic RPC Ports |
•WMI data retrieval |
•TCP (49152-65535) |
•WMI-ReadOnly / WMI-Full |
WinRM (TCP 5985/5986) is not tested in Phase 0. It is only probed in Phase 6 (Extended Inventory) and serves as the optional, preferred channel for Remote-Execution (Docker, Python custom scripts).
If WinRM is unavailable, the scanner automatically falls back to WMI Process.
Collects fundamental system information that is always available. Uses only WMI-ReadOnly (root\cimv2 basic classes) and Remote Registry read access - this phase runs successfully on every target that passed Phase 0.
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
Win32_OperatingSystem |
•WMI OS |
•\root\cimv2 |
•OS version, build, hostname, domain |
•WMI Query |
•WMI-ReadOnly |
Win32_ComputerSystem |
•WMI Basic |
•\root\cimv2 |
•Manufacturer, model, domain/ workgroup |
•WMI Query |
•WMI-ReadOnly |
Win32_LogicalDisk |
•WMI Disk |
•\root\cimv2 |
•Logical volumes, size, free space, FS type |
•WMI Query |
•WMI-ReadOnly |
HKLM\SOFTWARE\Microsoft\WindowsNT \CurrentVersion |
•Registry OS |
•HKEY_LOCAL_MACHINE |
•Detailed Windows build, edition, ProductName |
•Registry Query |
•Registry-Remote |
HKLM\SOFTWARE\Microsoft\VirtualMachine \Guest\Parameters |
•Registry Hyper-V |
•HKEY_LOCAL_MACHINE |
•Hyper-V guest detection (64-bit) |
•Registry Query |
•Registry-Remote |
HKLM\SOFTWARE\Wow6432Node\Microsoft \Virtual Machine\Guest\Parameters |
•Registry Hyper-V |
•HKEY_LOCAL_MACHINE |
•Hyper-V guest detection (32-bit) |
•Registry Query |
•Registry-Remote |
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
Win32_Processor |
•WMI CPU |
•\root\cimv2 |
•CPU cores, speed, features |
•WMI Query |
•WMI-Full |
Win32_PhysicalMemory |
•WMI Hardware |
•\root\cimv2 |
•RAM modules, size, speed, location |
•WMI Query |
•WMI-Full |
Win32_VideoController |
•WMI GPU |
•\root\cimv2 |
•GPU model, driver, VRAM |
•WMI Query |
•WMI-Full |
Win32_BIOS |
•WMI Basic |
•\root\cimv2 |
•BIOS version, date, manufacturer |
•WMI Query |
•WMI-Full |
Win32_ComputerSystemProduct |
•WMI Hardware Advanced |
•\root\cimv2 |
•UUID, vendor, model, serial |
•WMI Query |
•WMI-Full |
Win32_SystemEnclosure |
•WMI Hardware |
•\root\cimv2 |
•Chassis type, serial number |
•WMI Query |
•WMI-Full |
Win32_NetworkAdapter |
•WMI Basic |
•\root\cimv2 |
•Network adapters, MAC, speed |
•WMI Query |
•WMI-Full |
Win32_NetworkAdapterConfiguration |
•WMI Basic |
•\root\cimv2 |
•IP config, DHCP, DNS |
•WMI Query |
•WMI-Full |
Win32_SoundDevice |
•WMI Hardware Advanced |
•\root\cimv2 |
•Sound card/device information |
•WMI Query |
•WMI-Full |
Win32_Keyboard |
•WMI Hardware Advanced |
•\root\cimv2 |
•Keyboard device information |
•WMI Query |
•WMI-Full |
Win32_PointingDevice |
•WMI Hardware Advanced |
•\root\cimv2 |
•Mouse/pointing device information |
•WMI Query |
•WMI-Full |
Win32_VideoConfiguration |
•WMI GPU |
•\root\cimv2 |
•Additional video adapter configuration details |
•WMI Query |
•WMI-Full |
Win32_CDROMDrive |
•WMI Disk |
•\root\cimv2 |
•Optical drive information |
•WMI Query |
•WMI-Full |
Win32_serverFeature |
•WMI Services |
•\root\cimv2 |
•Installed Windows Server roles and features |
•WMI Query |
•WMI-Full |
Win32_Process |
•WMI Services |
•\root\cimv2 |
•Running processes + command line |
•WMI Query |
•WMI-Full |
Win32_Service |
•WMI Services |
•\root\cimv2 |
•Windows services + start type |
•WMI Query |
•WMI-Full |
HKLM\SYSTEM\ControlSet001\Services\* |
•Registry Services |
•HKEY_LOCAL_MACHINE |
•Detailed persistent configuration of all registered Windows services and drivers (paths, parameters, privileges) |
•Registry Query |
•Registry-Remote |
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
HKLM\SOFTWARE\Microsoft\Windows\ CurrentVersion\Uninstall |
•Registry Software |
•HKEY_LOCAL_MACHINE |
•Installed 64-bit software |
•Registry Query |
•Registry-Remote |
HKLM\SOFTWARE\Wow6432Node\Microsoft\ Windows\CurrentVersion\Uninstall |
•Registry Software |
•HKEY_LOCAL_MACHINE |
•Installed 32-bit software |
•Registry Query |
•Registry-Remote |
SoftwareLicensingService |
•WMI Software Advanced |
•\root\cimv2 |
•KMS/MAK licensing service •details |
•WMI Query |
•WMI-Full |
SoftwareLicensingProduct |
•WMI Software Advanced |
•\root\cimv2 |
•Windows/Office activation and license status |
•WMI Query |
•WMI-Full |
Win32_Product |
•WMI Software |
•\root\cimv2 |
•Legacy MSI detection (fallback) |
•WMI Query |
•WMI-Full |
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
Win32_DiskDrive |
•WMI Disk |
•root\cimv2 |
•Physical disk serial numbers, model, SMART |
•WMI Query |
•WMI-Full |
CIM_DataFile |
•WMI File System |
•root\cimv2 |
•File metadata, executable headers, content scanning |
•WMI Query |
•WMI-Full |
Any file path |
•File system |
•Remote Files |
•File scanning and content capture |
•SMB/CIFS |
•SMB-AdminShare |
C$\D$\E$\etc |
•File system |
•SMB Shares |
•File content and metadata |
•SMB/CIFS |
•SMB-AdminShare |
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
Msvm_ComputerSystem + all Msvm_* (all classes) |
•WMI Hyper-V |
•root\virtualization\v2 |
•Complete Hyper-V inventory: virtual machines, configuration, settings, CPU |
•WMI Query |
•WMI-Full |
MSCluster_Cluster + all MSCluster_* (all classes) |
•WMI Hyper-V |
•root\MSCluster |
•Failover Cluster nodes, resources, networks |
•WMI Query |
•WMI-Full |
SqlService, ServerSettings, HADRServiceSettings, ServerNetworkProtocol |
•WMI Hyper-V |
•root\Microsoft\SqlServer* |
•SQL Server instances, ports, features |
•WMI Query |
•WMI-Full |
SqlServiceAdvancedProperty |
•WMI SQL Server |
•root\Microsoft\SqlServer* |
•Advanced SQL service properties |
•WMI Query |
•WMI-Full |
ServerSettingsExtendedProtection |
•WMI SQL Server |
•root\Microsoft\SqlServer* |
•SQL extended protection settings |
•WMI Query |
•WMI-Full |
ServerSettingsGeneralFlag |
•WMI SQL Server |
•root\Microsoft\SqlServer* |
•SQL general configuration flags |
•WMI Query |
•WMI-Full |
HKLM\SOFTWARE\Microsoft\Microsoft SQL Server\*\Setup |
•Registry SQL Server |
•HKEY_LOCAL_MACHINE |
•SQL Server installed editions versions, patches, path |
•Registry Query |
•Registry-Remote |
MSSQL_*, MSReportServer_* |
•WMI Hyper-V |
•\root\MicrosoftSqlServer |
•Legacy SQL + Reporting Services |
•WMI Query |
•WMI-Full |
Resource/ Class |
Category |
Namespace/ Path |
Purpose |
Access Method |
Execution Context |
|---|---|---|---|---|---|
docker.exe |
•Docker |
•Command Execution |
•Docker containers, images, versions |
•Remote Command Execution |
•Remote-Execution |
python.exe |
•Python Scripts |
•Command Execution |
•Customer-specific Python inventory scripts |
•Remote Command Execution |
•Remote-Execution |
Raynet One Scan Engine's Windows Zero Touch inventory is designed and documented as a zero-impact, fully agentless scanning method.
No software, agent, service, scheduled task, or configuration is installed on the target system.
The scanner executable and all temporary working files are automatically deleted immediately after scan completion.
All inventory operations are performed under the supplied administrative credentials and are fully recorded in the standard Windows Security event log - exactly like any other legitimate administrative activity.