Table of Contents
- Introduction
- System Requirements
- Assign Service Logon As Credentials
- Server Configuration
- Agent-Based Monitoring
- Azure Relay Hybrid Connection
- Account Lockout Monitoring and Reporting
- Data Providers
- Directory Services
- Hosts
- Templates
- Template Properties
- Batch Update Templates
- Log Management Templates
- File and Directory Monitor Templates
- Windows Monitor Templates
- Account Lockout Monitor Template
- Logon Monitor Template
- CPU Monitor Template
- Memory Monitor Template
- Disk Space Monitor Template
- SMART Monitor Template
- Process Monitor Template
- Service Monitor Template
- Performance Counter Monitor Template
- Active Directory User Monitor Template
- Active Directory User Integrity Monitor Template
- Task Scheduler Template
- Clock Synchronization Template
- Defragment NTFS Disks Template
- Network and Application Monitor Templates
- SSL Certificate Monitor Templates
- Email Monitor Templates
- SNMP Monitor Templates
- Monitor Hierarchy
- Reports
- Auto-Configurators
- Options
- Actions
- Filters
- Schedules
- Shared Views
- General Executable Properties
- Assign Actions
- Assign Directories
- Assign Disks
- Assign Shares
- Assign Files
- Assign Consolidated Logs
- Assign Event Logs
- Assign Active Directory Audit Logs
- Target Files and Sub-Directories
- Define Log Entry Columns
- Define Log Entry Columns with Regular Expressions
- Define CSV and W3C Log Entry Columns
- Active Directory User and Group Filters
- Explicitly Assigned Logs
- Report Columns
- Report Date/Time Ranges
- Report Security Event Log Filters
- SNMP
- SSH Shell
- Exporting and Importing Configuration Objects
- Command Line Interface
- Troubleshooting
- Terminology
Windows Logon As Properties
When accessing remote Windows hosts the account the service is running as is used to access Windows resources such as Windows Shares and WMI. If the service is running as a domain administrator and the remote computer is not on your domain or the service is running as a local adminstrator you will need to impersonate an administrator account that is on the other domain or local to the target host. Use the Host Properties / Windows Logon As view to assign impersonation credentials and test access.
To assign impersonation credentials
- From the Explorer view, locate the Windows host you would like to assign impersonation credentials, right click then select Host Properties. The Host Properties view displays.
- Select the Windows Logon As tab.
- Use the Username text box to specify only the username. Do not prepend the username with the domain or hostname.
- Use the Password text box to specify password.
- Use the Domain drop-down to specify the domain the user is a member of.
-
Click the Test button to test the Windows Shares and WMI access.
If you receive an Access Denied error, see Access Denied for more information. To assign or update logon as credentials to multiple computers simultaneously, see Batch Update Hosts.