?
Solved

What are the security requirements for Performance Monitoring logs?

Posted on 2004-09-10
2
Medium Priority
?
189 Views
Last Modified: 2013-12-04
I was just given a new XP computer at my work. Want to set up some Performance Monitoring counter logs. Want them in CSV format so that I can put them in my SQL Server. When I try to do this I find that the monitored field comes out as “  “ (nothing). I could do this on my Windows 2000 machine. I set the “run as” to myself, after the default did not work. I suspect that I do not have the security settings right. I can see this data if I look at the System Monitoring plot.
What are the security requirements for Performance Monitoring logs?

Thanks,
0
Comment
Question by:wsfindlater
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 40

Accepted Solution

by:
Fatal_Exception earned 2000 total points
ID: 12032368
I think you need to be at least a Power User to be able to access the logs.  See if your admin will give those rights to your system.  He just needs to add you to the Power Users Group.

BTW:  here is a very good site explaining the setup and use of the logs...

http://www.wown.info/j_helmig/wxpperfl.htm

FE
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 12069270
Thank you..

FE
0

Featured Post

Want to be a Web Developer? Get Certified Today!

Enroll in the Certified Web Development Professional course package to learn HTML, Javascript, and PHP. Build a solid foundation to work toward your dream job!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month12 days, 12 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question