Solved

What are the security requirements for Performance Monitoring logs?

Posted on 2004-09-10
2
173 Views
Last Modified: 2013-12-04
I was just given a new XP computer at my work. Want to set up some Performance Monitoring counter logs. Want them in CSV format so that I can put them in my SQL Server. When I try to do this I find that the monitored field comes out as “  “ (nothing). I could do this on my Windows 2000 machine. I set the “run as” to myself, after the default did not work. I suspect that I do not have the security settings right. I can see this data if I look at the System Monitoring plot.
What are the security requirements for Performance Monitoring logs?

Thanks,
0
Comment
Question by:wsfindlater
  • 2
2 Comments
 
LVL 40

Accepted Solution

by:
Fatal_Exception earned 500 total points
ID: 12032368
I think you need to be at least a Power User to be able to access the logs.  See if your admin will give those rights to your system.  He just needs to add you to the Power Users Group.

BTW:  here is a very good site explaining the setup and use of the logs...

http://www.wown.info/j_helmig/wxpperfl.htm

FE
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 12069270
Thank you..

FE
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Learn how to create flexible layouts using relative units in CSS.  New relative units added in CSS3 include vw(viewports width), vh(viewports height), vmin(minimum of viewports height and width), and vmax (maximum of viewports height and width).

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now