Presentation is loading. Please wait.

Presentation is loading. Please wait.

Monitoring and Troubleshooting Chapter 17. Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed.

Similar presentations


Presentation on theme: "Monitoring and Troubleshooting Chapter 17. Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed."— Presentation transcript:

1 Monitoring and Troubleshooting Chapter 17

2 Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed in the advanced sharing window? What command utility can be used to manage your disk storage?

3 Monitoring and Troubleshooting Using Event Viewer Event Levels Creating Custom Views Windows Logs Monitoring Performance

4 Using Event Viewer Event viewer is one of the primary tools used to monitor a Windows operating system

5 Using Event Viewer You can double click on any event to view detailed information Provides important details for troubleshooting purposes Source Event ID User

6 Using Event Viewer

7 Event Levels Information events—indicates a change has occurred or describe a successful completion of an operation Critical events—is an event that an application or component cannot automatically recover from Error events—indicate a problem has occurred external to the application that might impact functionality Warning events—indicate events that may lead to a problem in the future

8 Creating Custom Views Some custom views are created automatically Server roles—each time you add a server role, a custom view is created Administrative events—shows critical, error and warning events from all administrative logs

9 Creating Custom Views Custom View contains user created filters as well as administrative events, summary page events, and filters created through the addition of server roles.

10 Windows Logs Application—logs events from applications. Security—displays all audited events. Events include file auditing (who is accessing the file), logon events and other objects. System—logs events related to the operating system. A service not starting would be logged to the system event log Other logs include Application and Service Logs Most applications create their own log files outside of Event Viewer Setup logs Web service logs

11 Windows Logs Event log files are located in %systemroot%\system32\config

12 Troubleshooting Commands Ping  verifies connectivity IPCONFIG /ALL  displays IP configuration Nslookup  used to verify DNS configuration Netstat  view network information/statistics locally. Netstat –aon Net share  Verify shares on system Hostname  verify configured computer name Nbtstat  NetBIOS information Traceroute  trace hops to destination Pathping  combines ping and traceroute….much faster, less information Etc.

13 Monitoring Performance Monitoring tools: Performance Monitor—uses objects and counters to monitor performance Most common objects to monitor Processor Page file Memory Disk access Resource Monitor—constantly running and capturing counters on the core four resources of your system. Processor Memory Disk subsystem Network Interface Task Manager

14 Monitoring Performance

15

16 Summary Troubleshooting begins in Event Viewer Three primary log files found on every Windows system: Application Security System Location of event logs in %systemroot%\system32\config Performance monitor uses counters to monitor processes Resource monitor is constantly tracking the four core resources: Processor Disk Subsystem Network Memory


Download ppt "Monitoring and Troubleshooting Chapter 17. Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed."

Similar presentations


Ads by Google