Solved

How to enable disabled, "grayed out" monitors

Posted on 2008-06-12
4
1,396 Views
Last Modified: 2013-11-21
I need to enable the "Ping Status" monitor but when I click on properties it is listed as "disabled" and the check box is grayed out so i can't enable it. I have tried to search the Administrative settings and what-not but I'm unable to find out how to enable a disabled, grayed out monitor.

Does anyone know?
0
Comment
Question by:DonaldWilliams
  • 3
4 Comments
 
LVL 3

Expert Comment

by:Adil_khan
ID: 21772982
Hi,

Could you please provide the screenshots of where you are clicking and what is greyed out and what do want to enable.

Thanks  
0
 

Author Comment

by:DonaldWilliams
ID: 21773218
Here ya go
1.jpeg
2.jpeg
0
 
LVL 3

Expert Comment

by:Adil_khan
ID: 21776895
Thanks very much for the Screen shots,

Well it looks like a GPO to me, well normally anything greyed out is considered as some sort of policies,
review your GPO, and regkeys, I will also go through them and see what comes up.

Cheers
0
 
LVL 3

Accepted Solution

by:
Adil_khan earned 500 total points
ID: 21786999
Hi Donald,

sorry for the late reply, to be honest with you i haven't been able to find much on the issue you have,
becuase i don't have the exact the enviroment as yours, as mentioned above, the issue you have would be mostly related to some sort of GPO, please follow the link the below for which i provided an answer for an outlook issue a similar type of issue.

http://www.experts-exchange.com/Software/Office_Productivity/Groupware/Outlook/Q_23459908.html?sfQueryTermInfo=1+grei+outlook+password

hope this helps.

regards


0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question