Hi ThongLao,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
I found a lot of activities in the Windows Remote Management "Operational" folder that has me kind of worried. There are literally hundreds of logs for Event 145, 161, and 142 showing up, even though I'm pretty sure I never turned on any remote access features for this machine. The errors keep saying the client cant connect to some destination URI and mention "winrm quickconfig," which is weird because none of my coworkers have these events on there PCs. It looks like the system is constantly trying to enumerate listeners or transfer data in the background and failing with error 2150858770. Does anyone know what background process or corporate software might be triggerring these WinRM connection attempts every few minutes?
Hi ThongLao,
To identify the specific software causing this, open the Details tab of one of these events in Event Viewer and look for the ProcessID. You can then match this ID to a specific service in the Details tab of Task Manager. Also, you should check the registry path HKLM\Software\Policies\Microsoft\Windows\WinRM; if you see entries here, it confirms that your IT department is pushing WinRM configurations via Group Policy. The reason your coworkers may not see these errors is likely a difference in their "Network Location Awareness" profile or a GPO that successfully completed the "winrm quickconfig" on their machines but failed on yours due to a local firewall restriction or a corrupted HTTP.sys dependency.
You can verify your current listener status by running winrm enumerate winrm/config/listener in an elevated Command Prompt. If it returns an empty result, the background attempts will continue to fail and log errors until either the configuration is completed or the management agent targeting your PC is adjusted.
Hope this answer brought you some useful information. If it did, please hit “accept answer”. Should you have any questions, feel free to leave a comment.
VP
WinRM activity in the Operational log does not necessarily mean that interactive “remote access” was explicitly enabled by the user. Many Windows components and management tools probe WinRM locally or remotely, and when WinRM isn’t fully configured or reachable, they generate repeated connection failures and enumeration errors like the ones described.
From the provided information, the most relevant causes and triggers are:
winrm quickconfig and failures when enumerating listeners match the scenario where the WinRM service or its listener configuration is broken or missing.winrm quickconfig.”Enter-PSSession, Invoke-Command, etc.) will rely on WinRM and can generate these events if the local listener or firewall rules are not correctly configured.winrm quickconfig creates firewall exceptions only for the current profile; if the profile changes (for example, from Domain to Private or Public), WinRM traffic may start failing and logging errors until the configuration is updated.winrm e winrm/config/listener) or connect to the default WS-Man endpoint will fail and log Operational events.winrm quickconfig; if that was never run successfully or the configuration was later damaged, background WinRM consumers will keep failing.Putting this together for the described scenario:
winrm quickconfig strongly indicate that some corporate management or monitoring tool, or a GPO-driven configuration, is trying to use WinRM on this Windows 10 machine.To identify the trigger in an enterprise environment, the most likely sources to investigate are:
Computer Configuration → Administrative Templates → Windows Components → Windows Remote Management and Windows Remote Shell that may be enabling or probing WinRM.Once the responsible tool or policy is identified, the options are either:
References: