Table of Contents
- Getting Started
- Agent-Based Monitoring
- Data Providers
- Directory Services
- Auditing
- Hosts
- Templates
- Template Properties
- Batch Update Templates
- Log Management Templates
- File and Directory Monitor Templates
- Windows Monitor Templates
- Account Lockout Monitor Template
- Logon Monitor Template
- CPU Monitor Template
- Memory Monitor Template
- Disk Space Monitor Template
- SMART Monitor Template
- Process Monitor Template
- Service Monitor Template
- Performance Counter Monitor Template
- PowerShell Script Template
- Registry Value Monitor Template
- Active Directory User Monitor Template
- Active Directory User Integrity Monitor Template
- Task Scheduler Template
- Clock Synchronization Template
- Defragment NTFS Disks Template
- Network and Application Monitor Templates
- Database Monitor Template
- Directory Service Monitor Template
- DNS Blacklist Monitor Template
- DNS Monitor Template
- Domain Expiration Monitor Template
- Network Speed Monitor Template
- Ping Monitor Template
- Database Table Reseed
- SQL Server Shrink and Backup Template
- SSH Shell
- TCP Port Scan Monitor Template
- Website Monitor Template
- SSL Certificate Monitor Templates
- Email Monitor Templates
- SNMP Monitor Templates
- Monitors
- Reports
- Auto-Configurators
- Filters
- Actions
- Desktop Actions
- Email Actions
- Event Log Actions
- Executable Actions
- File Actions
- IIS IP Address Restriction Actions
- Microsoft Teams Actions
- PowerShell Actions
- Report Actions
- Service Actions
- SMS Actions
- SNMP Trap Actions
- Syslog Actions
- Template Actions
- IIS IP Address Restriction Actions
- Action Variables
- Schedules
- Environment Variables
- Options
- Account Lockout Monitoring and Reporting
- Merging Logs
- SNMP
- SSH Shell
- Exporting and Importing Configuration Objects
- Shared Views
- Auto-Config Host Assignment Properties
- General Executable Properties
- Assign Actions
- Assign Directories
- Assign Disks
- Assign Shares
- Assign Files
- Assign Consolidated Logs
- Assign Event Logs
- Assign Azure Audit Logs
- Target Files and Sub-Directories
- Define Log Entry Columns
- Define Log Entry Columns with Regular Expressions
- Define CSV and W3C Log Entry Columns
- Active Directory User and Group Filters
- Explicitly Assigned Logs
- File Explorer
- Report Columns
- Report Date/Time Ranges
- Report Security Event Log Filters
- Select Folder or File
- Executable Timeline
- Command Line Interface
- Troubleshooting
- Terminology
Corner Bowl Server Manager
SIEM, IPS, Server Monitoring, Uptime Monitoring and Compliance Software
Access Denied Errors
An Access Denied error is typically thrown by the local WMI Service when an attempt is made to access WMI functions from a host that is either not logged into the domain or when the Server Manager Service is not running with domain administrator credentials.
You may also receive an access denied error when attempting to access Administrator Shares such as c$, d$, e$ etc.
Verify the error:
- Open a command-prompt and type:Wbemtest
- The Wbemtest application opens.
- Click Connect.
-
From the Namespace text box, type:\\HOSTNAME\root\cimv2Where HOSTNAME is the name of the remote host throwing the error. If either host resides on a different domain or within a workgroup, specify administrator credentials that reside on the remote host or domain.
- Click Connect. You should receive the Access Denied error. If you do not receive the error, verify the service is running under the same credentials as the account you are logged into the server with or Server Manager is configured to logon to the remote host as the account you are logged into the server with.
Verify service credentials:
- From the Management Console, select View | Dashboard.
- From the Service Status table verify the Logon as value is set to either a domain or local administrator account. If the value is SYSTEM or an non-administrator account, from the menu select Service | Change Service Logon .
- The Change Service Logon dialog displays. Enter administrator credentials then click OK.
Verify WMI permissions:
- Ensure WMI permissions have been set correctly. From the remote host throwing the error, open a command-prompt and type: wmimgmt.msc
- Right-click on the WMI Control (local) node and select Properties. Select the Security tab and navigate to root/CIMV2. Click the Security button. Grant the account you and the service are using to access logs Remote Enable and Read Security rights.
Verify DCOM settings:
For more information see: Securing a Remote WMI Connection
Verify Windows shares are enabled:
- From the host you are unable to download logs from, verify Windows Shares are enabled.
Other things to try:
Assign Service Logon As Credentials