06.05.2013 Views

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Installing and Configuring on Windows Environments<br />

Note:<br />

<strong>The</strong> monitored computer should be able to connect to IPC$. <strong>The</strong> following<br />

registry entry enables connecting to IPC$:<br />

o Hive: HKEY_LOCAL_MACHINE\SYSTEM<br />

o Key: CurrentControlSet\Services\LanmanServer\Parameters<br />

o Name: AutoShareWks<br />

o Type: REG_DWORD<br />

o Value: 1<br />

At least READ access should be granted to the following registry subkey<br />

(allowing it to remotely connect to the Windows registry):<br />

HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg. This<br />

permission determines who can remotely connect to a registry. If this<br />

subkey does not exist, all users can remotely connect to the registry. To<br />

remotely connect to a registry, a user must have at least READ access to<br />

the winreg subkey on the target computer.<br />

At least READ access should be granted to the following registry keys on<br />

the remote computer:<br />

o HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServ<br />

ers\winreg<br />

o HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Per<br />

flib<br />

To monitor Windows 2000 and Windows XP, the user name must have<br />

access granted by the following group policies:<br />

o Profile single process<br />

o Profile system performance<br />

Both group policies are security settings that you can set from the Local<br />

Policies => User Rights option in the Administrative Tools of the Control<br />

Panel.<br />

To monitor Windows XP, if the systemroot is on an NTFS partition, the user<br />

name must have at least READ access to the following two files:<br />

o %SystemRoot%\System32\Perfc009.dat<br />

o %SystemRoot%\System32\Perfh009.dat<br />

273

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!