Next Topic

Previous Topic

Book Contents

Monitors using Windows authentication

The following monitors all require Windows authentication:

  • CPU utilization
  • Disk utilization
  • Memory utilization
  • Swap file utilization
  • Process
  • Windows performance
  • WMI

These monitors uses the remote registry service to query the monitored object. Ensure that the remote registry service is running on both the monitored object and the Network Monitor host.

By default, only administrators can access the remote registry. This is controlled by the registry key.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\Winreg

You can edit the permissions of this registry key to limit or grant access to the remote registry. If the key does not exist, access is granted to everyone.

A special case exists for the Disk utilization monitor in compatibility mode. In this case, you need to specify the default share representing the monitored disk. For example, instead of specifying C: you should specify C$ and ensure that this default share exists and is accessible by the monitoring account.