?
Solved

View WMI Queries Running in Background

Posted on 2016-09-16
2
Medium Priority
?
105 Views
Last Modified: 2016-09-24
We have a large environment using SCCM 2012 R2 and SCOM 2012 R2 we have notice and issue starting in July affecting only Windows 2008 / 2008R2 get a memory leak becuase of excess number of handle open. All of the hotfixes I have found do not apply since the DLL's on the server are newer than the one's in the hotfix. How can I see which WMI queries are running in the backgroud or have run?
0
Comment
Question by:compdigit44
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
Learnctx earned 2000 total points
ID: 41803016
0
 
LVL 20

Author Comment

by:compdigit44
ID: 41803146
I have enabled logging but how can I tell what is the problem or most resource intensive query?
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 22 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question