Solved

How to enable disabled, "grayed out" monitors

Posted on 2008-06-12
4
1,443 Views
Last Modified: 2013-11-21
I need to enable the "Ping Status" monitor but when I click on properties it is listed as "disabled" and the check box is grayed out so i can't enable it. I have tried to search the Administrative settings and what-not but I'm unable to find out how to enable a disabled, grayed out monitor.

Does anyone know?
0
Comment
Question by:DonaldWilliams
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 3

Expert Comment

by:Adil_khan
ID: 21772982
Hi,

Could you please provide the screenshots of where you are clicking and what is greyed out and what do want to enable.

Thanks  
0
 

Author Comment

by:DonaldWilliams
ID: 21773218
Here ya go
1.jpeg
2.jpeg
0
 
LVL 3

Expert Comment

by:Adil_khan
ID: 21776895
Thanks very much for the Screen shots,

Well it looks like a GPO to me, well normally anything greyed out is considered as some sort of policies,
review your GPO, and regkeys, I will also go through them and see what comes up.

Cheers
0
 
LVL 3

Accepted Solution

by:
Adil_khan earned 500 total points
ID: 21786999
Hi Donald,

sorry for the late reply, to be honest with you i haven't been able to find much on the issue you have,
becuase i don't have the exact the enviroment as yours, as mentioned above, the issue you have would be mostly related to some sort of GPO, please follow the link the below for which i provided an answer for an outlook issue a similar type of issue.

http://www.experts-exchange.com/Software/Office_Productivity/Groupware/Outlook/Q_23459908.html?sfQueryTermInfo=1+grei+outlook+password

hope this helps.

regards


0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question