123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Counter And Trace Logging Requirements

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

To create or modify a log, you must have Full Control permission for the registry key that controls the Performance Logs And Alerts service. This key is free practice questions Administrators usually have this permission by default. Administrators can grant per?mission to users by using the Security menu in the registry editor.
To run the Performance Logs And Alerts service (which runs in the background when you configure a counter or trace log), you must have permission to start or configure services on the system. Administrators have this right by default and can grant it to users by using Group Policy. To log data on a remote computer, the Performance Logs And Alerts service must run under an account that has access to the remote system.
Creating a Counter Log
To create a counter log, you first define the counters you want to log and then set log file and scheduling parameters.
To create a counter log, complete the following steps:
1.Click Start, point to Administrative Tools, and then click Performance.
2.Double-click Performance Logs And Alerts, ...
... and then click Counter Logs. Existing logs are listed in the details pane. A green icon indicates that a log is running; a red icon indicates that a log is stopped.
3.Right-click a blank area of the details pane, and then click New Log Settings.
4.In the New Log Settings dialog box, in the Name box, type the name of the log,and then click OK.
5.In the General tab of the dialog box for a counter log, shown in free Microsoft practice tests,ensure that the correct path and filename of the log file appear in the Current Log File Name box, and then click Add Counters.
In the Add Counters dialog box, select one of the following:
Q To monitor the computer on which System Monitor is running, click Use Local Computer Counters.
Q To monitor a specific computer, regardless of where System Monitor is running, click Select Counters From Computer, and select in the text box the UNC name of the computer you want to monitor (the name of the local computer is selected by default). Or, you can type the IP address of the computer you want to monitor.
When creating a Performance Logs And Alerts snap-in for export, make sure to select Use Local Computer Counters. Otherwise, counter logs obtain data from the computer named in the text box, regardless of where the snap-in is installed.
7.In the Performance Object list, select NTDS.
8.To select the counters to monitor, choose one of the following options:
To monitor all counters for the NTDS performance object, click All Counters.
To monitor only selected counters, click Select Counters From List, and select the counters you want to monitor from the list. You can select multiple counters by clicking on a Free A+ exam questions counter and holding the Ctrl key.

Total Views: 499Word Count: 463See All articles From Author

Add Comment

System/Network Administration Articles

1. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

2. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

3. Best Online Cybersecurity Training Institute In India
Author: securium Academy

4. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

5. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

6. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

7. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

8. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

9. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

10. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

11. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

12. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab

13. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy

14. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan

15. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: