Solved

Evaluating our Poolmon.exe

Posted on 2008-10-08
2
800 Views
Last Modified: 2012-06-27
The problem expressed in this article is the exact same symptom/errors we are experiencing.
http://blogs.msdn.com/david.wang/archive/2005/09/21/HOWTO-Diagnose-IIS6-failing-to-accept-connections-due-to-Connections-Refused.aspx

I've attached a screenshot of our poolmon.exe
How can I find out what these tags are related to? A couple of Goole searches came up empty...Strange.
Poolmon.jpg
0
Comment
Question by:GWitek
2 Comments
 
LVL 68

Expert Comment

by:Qlemo
ID: 22752091
You should perform a poolmon -c to get the according driver names. Than look for the big non-paged figures, and associate them with the driver.
The Rx tags look suspicious, but the real big fishes are   File, TraT and Irp. Irp is I/O related, so I guess you have big usage of file sharing on that server.

0
 
LVL 3

Accepted Solution

by:
GWitek earned 0 total points
ID: 23938736
Ended up rebuilding the computer, Belive this had to do with Symantec AV. Junk!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now