Solved

Evaluating our Poolmon.exe

Posted on 2008-10-08
2
822 Views
Last Modified: 2012-06-27
The problem expressed in this article is the exact same symptom/errors we are experiencing.
http://blogs.msdn.com/david.wang/archive/2005/09/21/HOWTO-Diagnose-IIS6-failing-to-accept-connections-due-to-Connections-Refused.aspx

I've attached a screenshot of our poolmon.exe
How can I find out what these tags are related to? A couple of Goole searches came up empty...Strange.
Poolmon.jpg
0
Comment
Question by:GWitek
2 Comments
 
LVL 69

Expert Comment

by:Qlemo
ID: 22752091
You should perform a poolmon -c to get the according driver names. Than look for the big non-paged figures, and associate them with the driver.
The Rx tags look suspicious, but the real big fishes are   File, TraT and Irp. Irp is I/O related, so I guess you have big usage of file sharing on that server.

0
 
LVL 3

Accepted Solution

by:
GWitek earned 0 total points
ID: 23938736
Ended up rebuilding the computer, Belive this had to do with Symantec AV. Junk!
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Moving SQl Server SBS 2003 to SQL Server 2014 27 127
Server 2008 SBS is losing disk space 4 96
idle mapped drive 10 58
inplace upgrade from Windows 2003 R2 to 2012 8 73
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question