Solved

WMI Service Error??

Posted on 2006-11-07
6
268 Views
Last Modified: 2010-03-06
Exchange 2003 SP2 on a WIN2k3 SP1 box.

Exchange_Server has reported a Error.  Reported status is:
Queues - Unknown
Drives - Unknown
Services - Error
Memory - Unknown
CPU - Unknown

I had an issue awhile back with disk space and database size, so I adjusted many diagnostic logging levels.  I am sure this is releated to this, but how do I know which service is experiencing the error?

Also, Is there a 'template' or guidlines I can follow to set my diag logging levels so that they will only log issues I need to be concerned with?

-Darren
0
Comment
Question by:darrennelson
  • 3
  • 3
6 Comments
 

Author Comment

by:darrennelson
ID: 17891310
also, the email notification came at 11:34PM.  I checked my logs and there wasn't anything obvious in the sys or app log at or around those times.
0
 
LVL 3

Expert Comment

by:rstovall
ID: 17891471
Sounds like local machine access problem for WMI?

This could likely be resolved through using DCOMCNFG .. and verify that WMI has all necessary permissions

Also, if you added drives ot the system, (due to disk space issues)  .. verify that system has full control in NTFS perms...

appears to be more access/security related than a setting . .let me know what you find in DCOM (sometines I have removed and re-added perms in DCOMCNFG to resolve access issues)
0
 

Author Comment

by:darrennelson
ID: 17891814
rst,

I'm not familiar with DCOMCNFG.  I'm in it now, and navigated to Component Services->Comuters->My Computer->DCOM Config->Windows Management and Instrumentation->Properties->Security.  Here I have 'Launch and Activation Permissions' set to customize - if I edit, the group 'Everyone' has full access - no other groups or users present.  Under "Access Permissions", its set to "Use Default".  Under "Configuration Permissions", once again "Customize" is selected and if I edit, local admins and SYSTEM have full access, various other users have different degrees of access.

Am I in the right place?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 3

Accepted Solution

by:
rstovall earned 125 total points
ID: 17891850
Perfect .. remove system and readd it to have full permissions ...

Also, verify that system has access to all newly added drives .. especially if you have moved a store or log files over there!!

I wouldn't worry about other users, unless you have something running as a service account, etc ..

Let me know if that resolves the problem .. kind of a long shot, with my knowledge of WMI .. but it sure sounds like this kind of access problem
0
 

Author Comment

by:darrennelson
ID: 17891907
I have removed and readded SYSTEM and will continue to monitor.  No additional disks to worry about at this time, although were are getting close to that point.

On the subject of monitoring, is there a default Diagnostic Logging level in Exchange that I can set all my events to log at?  Or is it just tinkering with what you need logged?

-Darren
0
 
LVL 3

Expert Comment

by:rstovall
ID: 17892190
there is no blanket solution for this monitoring ..

"tinkering" with what you need when you need it is usually the way to go ..

There are some ways to get even more verbose logging if you should ever need it .. you can add loglevel in the registry up to 7 I believe

this may be of some use to you
http://www.computerperformance.co.uk/exchange2003/exchange2003_logs_diagnostic.htm
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Not sure what the best email signature size is? Are you worried about email signature image size? Follow this best practice guide.
Marketers need statistics and metrics like everybody else needs oxygen. In this article we explain how to enable marketing campaign statistics for Microsoft Exchange mail.
In this video we show how to create an Address List in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Organization >> Ad…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now