Monitoring

Last Updated on 4 March 2015, Total: 24 Blog Posts

  1. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

  2. Troubleshooting DNS using NMCap

    Network Monitor is a free tool available from Microsoft. You can capture data using either the graphical Network Monitor or the command-line NMCap tool. Analysis of the captured data must be done through the graphical interface. As network traffic is in abundance especially on busy servers, you would need to use filters to reduce the number of packets collected and... Read More

  3. Network Monitor OneClick

    OneClick version of Network Monitor is a quick solution that allows you to capture network traffic from a Windows computer without the need of installing the complete Network Monitor package. Still, you need Network Monitor installed on a separate computer in order to able to analyze the saved data. This tool is useful for customer support scenarios. The two One... Read More

  4. Using NMCap to capture network data

    The Network Monitor tool is not included with Windows default installations hence, you need to download it from Microsoft Download Center and run the installer on a target machine. The tool installs a network driver with each network adapter in order to be able to collect data. Using the equivalent command line tool NMCap requires you change directory to c:\Program... Read More

  5. Windows Performance Monitor

    Performance Monitor is a great tool for identifying performance bottlenecks! You can identify the source of performance problems that make your system performs slow or sometimes completely unusable. Performance Monitor is best suited when you are collecting performance statistics over a period of time such as, when users on regular basis report system degradation at specific times. You can set... Read More

  6. Windows Reliability Monitor

    I rarely come across systems administrators that use Windows reliability monitor when troubleshooting server or client platforms! I guess we either completely forget about this tool or the issue at hand is so critical that the tool is unavailable or even inadequate. However, I do recommend administrators to become acquainted with Reliability Monitor and leverage the power of its graphical... Read More

  7. Quick resource utilization check on Windows 2008 Servers

    There are a number of tools which give you details about resource utilization on Windows based machines. Detailed reports are best used when digging further down into an existing problem or analyzing a complex problem that requires a lot of details but an ad hoc quick performance check would suffice with few details. Actually, routine quick checks would benefit most... Read More

  8. Customizing a Data Collector Set

    As we have seen in the previous post creating a customized Data Collector Set is pretty straight forward. Go here to read the post! In addition we have seen that the data sources defined were derived from a set template. In this post we are going to see how you can add your own data sources to a previously created... Read More

  9. Data Collector Sets

    Most Systems Administrators have used Performance Monitor to view real-time performance data on Windows servers and identify bottlenecks. Some may have also recorded sessions and later analyzed log files for performance issues. In fact, this is what I will be talking about in the couple of posts to come, mainly about Data Collector Sets. Data Collector sets gather system information,... Read More

  10. Using HTTPS in Event Forwarding

    As we have seen in Setting up an Event Collecting Computer you can use either Http or Https protocol to transfer data from the forwarding to the collecting computer. Although standard Http transport uses encryption for forwarded events, you can configure event forwarding to use the encrypted Https protocol. However, using Https requires the following additional tasks to be performed... Read More

Featured Links