Solved

What are the security requirements for Performance Monitoring logs?

Posted on 2004-09-10
2
183 Views
Last Modified: 2013-12-04
I was just given a new XP computer at my work. Want to set up some Performance Monitoring counter logs. Want them in CSV format so that I can put them in my SQL Server. When I try to do this I find that the monitored field comes out as “  “ (nothing). I could do this on my Windows 2000 machine. I set the “run as” to myself, after the default did not work. I suspect that I do not have the security settings right. I can see this data if I look at the System Monitoring plot.
What are the security requirements for Performance Monitoring logs?

Thanks,
0
Comment
Question by:wsfindlater
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 40

Accepted Solution

by:
Fatal_Exception earned 500 total points
ID: 12032368
I think you need to be at least a Power User to be able to access the logs.  See if your admin will give those rights to your system.  He just needs to add you to the Power Users Group.

BTW:  here is a very good site explaining the setup and use of the logs...

http://www.wown.info/j_helmig/wxpperfl.htm

FE
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 12069270
Thank you..

FE
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Move Event Log in windows 2012 3 120
internet access from windows servers 4 89
Server 2008-R2 lost password 19 111
Allowing a local account for incoming Rdp but not outgoing Rdp 15 203
This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question