Microsoft ISA Reviews

Monitoring and Tuning ISA Server Performance

Monitoring and Tuning ISA Server Performance

Tuning ISA Server Efficiency

You possibly can optimize ISA Server efficiency and tune the ISA Server cache. The ISA Server efficiency settings you can tune to optimize the efficiency of the ISA Server pc exist on the Efficiency tab of the Array Properties dialog field.

ISA Server caches objects to RAM and on disk. The default ISA Server configuration caches objects which are under 12,800 bytes in measurement in RAM. An object that’s saved in RAM is retrieved quicker by ISA Server than an object which is saved on disk. The default configuration caches objects that are bigger than 12,800 bytes in measurement on disk.

You need to use the settings on the Cache Configuration Properties dialog field (Superior tab) to vary the dimensions of objects that are saved in reminiscence. ISA Server cache efficiency is tuned by manipulating the share of obtainable RAM for cache area. A excessive proportion of obtainable RAM for cache area results in an enchancment in cache response time. Extra content material might be saved in quicker bodily reminiscence than on disk. Earlier than setting a excessive proportion of obtainable RAM for cache area, you will have to remember that much less reminiscence can be obtainable for different actions of the working system and for different purposes’ actions as nicely.

Easy methods to optimize ISA Server efficiency

  1. Open ISA Administration.

  2. Proper-click the ISA Server array and choose Properties from the shortcut menu.

  3. Click on the Efficiency tab.

  4. Transfer the slider to Extra Than 1000 when greater than 1, 000 customers are anticipated day by day.

  5. Transfer the slider to Fewer Than 1000 when lower than 1, 000 customers are anticipated day by day.

  6. Transfer the slider to Fewer Than 100 when lower than 100 customers are anticipated day by day.

  7. Click on OK.

Learn how to optimize ISA Server cache efficiency

  1. Open the ISA Administration console.

  2. Navigate to the Cache Configuration node within the console tree.

  3. Proper-click the Cache Configuration node after which choose Properties from the shortcut menu.

  4. The Cache Configuration Properties dialog field opens.

  5. Click on the Superior tab.

  6. Enter the share of free reminiscence to make use of for caching within the Proportion Of Free Reminiscence To Use For Caching textbox.

  7. Click on OK.

Monitoring System and Community Efficiency utilizing Commonplace objects and Counters

A number of parts that must be included in a server monitoring plan are:

  • Determine these server occasions which must be monitored.

  • Decide and arrange screens and alerts to examine the occasions.

  • Decide whether or not filters are needed to scale back the amount of monitoring info which you need to acquire after which configure any crucial filters.

  • Set up a logging technique to log occasion knowledge that must be analyzed. Alternatively, you’ll be able to monitor and analyze server exercise when it happens.

  • View and analyze knowledge collected by occasions within the Efficiency console.

One other key element to monitoring server efficiency is to determine bottlenecks. A bottleneck may be described as a situation which is created by a specific useful resource which in flip prevents different assets from working optimally.

Bottlenecks often happen when:

  • Sure settings usually are not configured appropriately.

  • A useful resource is defective and never functioning appropriately.

  • Inadequate assets exist, and a useful resource is being overused.

  • The place many situations of the identical specific useful resource exist, the assets is probably not dealing with load equally or effectively.

  • A specific software(s) is hogging a useful resource.

Server and system efficiency is often impacted by the next:

  • Assets are configured incorrectly that are inflicting assets to be intensely utilized.

  • Assets are unable to deal with the load it’s configured to deal with. On this case, itis often essential to improve the actual useful resource or add any further elements that might enhance the potential of the useful resource.

  • Assets which are malfunctioning impair efficiency.

  • The workload is just not configured to be evenly dealt with by a number of situations of the equivalent useful resource.

  • Assets are ineffectually allotted to an software(s).

You need to use System Monitor to gather and analyze efficiency knowledge for each the native pc and distant pc, and to trace numerous processes operating on a Home windows Server 2003 or Home windows 2000 system. The System Monitor utility is situated inside the Efficiency MMC snap-in.

A number of key actions that may be carried out utilizing System Monitor and the primary options of System Monitor are listed under:

  • View and monitor real-time efficiency knowledge or view knowledge from a log file.

  • Select which knowledge you need to gather by choosing between numerous objects and counters.

  • Gather knowledge from a number of computer systems concurrently.

  • Select the format or view through which you need to look at collected knowledge:

    • Graph view

    • Report view

    • Histogram view

  • Monitor processes and elements that you simply need to optimize

  • Monitor the outcomes of your optimization efforts

  • View developments in workloads and the impact being realized on useful resource utilization.

  • Plan for upgrades

The subsystems which must be monitored when monitoring and optimizing system efficiency are listed under. These subsystems must be monitored and optimized to tune server efficiency:

  • Reminiscence subsystem: In terms of figuring out the reminiscence that’s getting used, it is advisable to look at bodily reminiscence, and the web page file. Bodily reminiscence pertains to bodily RAM. The web page file pertains to logical reminiscence on the arduous drive.

An important efficiency counters which you need to monitor to detect reminiscence particular points are:

    • MemoryAvailable Bytes: The counter signifies what your obtainable reminiscence capability is. To effectively run a server, it is advisable have at the very least 4MB of reminiscence obtainable. When the reminiscence drops under 4MB, you may want to think about instantly including extra reminiscence.

    • MemoryPages/Sec: With a really helpful counter threshold of 20, this counter signifies the speed at which pages are written to disk, or learn from disk. The counter ought to usually be beneath 20

  • Community subsystem: You’ll be able to assess the efficiency of a pc on the community by monitoring the community interface and the community protocols put in on the pc. You’ll be able to enhance community efficiency by unbinding community adapters that aren’t ceaselessly used, after which upgrading these to excessive efficiency community adapters. Alternatively, you possibly can set up a number of community adapters.

The necessary counters which ought to be tracked to watch the efficiency of the community for attainable bottlenecks are:

    • Community InterfaceBytes Complete/sec; Bytes Despatched/sec; Bytes Acquired/sec: These counters point out the way through which your community adapters are performing in relation to community visitors.

    • ServerBytes Complete/sec; Bytes Acquired/sec; Bytes Despatched/sec: These set of counters signifies the way during which the server is using the community to ship knowledge and obtain knowledge.

    • ServerPool Paged Peak: This counter exhibits the quantity of bodily reminiscence and the utmost paging file measurement. A threshold of the quantity of bodily RAM is ok.

  • Processor subsystem: You must monitor the processors to make sure that processor utilization maintains a suitable degree. The elements that have to be stored in thoughts when monitoring processor exercise are the position of the server and the kind of work being carried out on the server. Think about using much less processor intensive applicatios, or upgrading the processor when a processor bottleneck exists. You possibly can add a processor if the pc helps a number of processors.

A couple of efficiency counters that must be tracked to watch the processor subsystem of the server for bottlenecks are:

    • Processor% Interrupt Time: The counter signifies how typically units similar to community adapters and disk drives generate interrupts by displaying the time period for which the processor receives and providers hardware interrupts within the pattern interval.

    • Processor Interrupts/Sec: This counter exhibits the variety of interrupts that are being acquired from units. A rise within the counter’s worth must be accompanied by a rise in system exercise. If not, you possibly can have an present hardware concern that must be resolved.

    • System Processor Queue Size: This counter exhibits the variety of requests ready in queue to be processed. When you continually have a queue size of over 10 for a processor, you could have an present bottleneck.

  • Disk subsystem: You should use the PhysicalDisk object or the LogicalDisk object to watch disk entry. The PhysicalDisk object pertains to the logical drives on a bodily drive, whereas the LogicalDisk object pertains to a specific logical disk. The velocity of the disk controller and the typical disk entry time has on influence on the velocity at which system requests are dealt with. Disk entry could be described because the time it takes to service requests.

A couple of essential counters which you need to monitor to trace disk efficiency of a server are:

    • Bodily Disk Present Disk Queue Size: The counter signifies the variety of requests that are in queue for disk entry. The counter must be persistently at 1.5 to 2 occasions the variety of spindles which comprise of the bodily disk.

    • Bodily Disk % Disk Time and % Idle Time: These counters point out the share of time that a drive is lively, and the share of time for which the drive is idle. The beneficial threshold for each counters is 90 %.

    • Bodily Disk Disk Reads/Sec and Disk Writes/Sec: These counters present the velocity at which knowledge is written to disk, and skim from disk. The knowledge of those counters might help you in additional effectively balancing the load of your servers. A prolonged delay might be indicative of a tough disk concern. When utilization is near the outlined switch fee of the bodily disk, you may want to think about reducing the load of the server. You might additionally improve to RAID.

    • Bodily Disk Bytes/sec: The Bodily Disk Bytes/sec counter signifies throughput of disk exercise.

    • Bodily Disk Avg. Disk Bytes/Switch: This counter tracks the typical variety of bytes that are both moved to or from a disk when disk reads and writes happen. A program is usually accessing the drive ineffectually when the counter’s worth is over 2KB.

Understanding ISA Server Efficiency Objects and Counters

ISA Server supplies the ISA Server Efficiency Monitor software to research ISA Server efficiency. The ISA Server Efficiency Monitor is put in whenever you set up ISA Server.

Once you entry the ISA Server Efficiency Monitor, the next instruments are displayed:

System Monitor may be displayed in a graph, histogram, or report format. System Monitor makes use of objects, counters and situations to watch the system. An object may be described as a set of counters that’s related to a system useful resource or service which produce the info you possibly can assess. When an object executes a perform, its related counters are up to date. A counter may be considered a knowledge reporting element in an object. The counter represents knowledge for a specific element of the system or service. Every object subsequently has a set of counters that monitor specific info on the efficiency object.

The ISA Server Efficiency Monitor is preconfigured with the ISA Server objects and counters listed under:

  • ISA Server Cache object incorporates 6 counters.

  • ISA Server Firewall Service object accommodates eight counters.

  • ISA Server Packet Filter object incorporates 1 counter.

  • Net Proxy Service efficiency object incorporates 6 counters.

The ISA Server Bandwidth Management efficiency object accommodates the counters listed under. None of those counters are preloaded in System Monitor:

  • Precise Inbound Bandwidth; tracks and signifies precise inbound bandwidth.

  • Precise Outbound Bandwidth; tracks and signifies precise outbound bandwidth.

  • Assigned Connections; screens the variety of connections which have an assigned bandwidth precedence.

  • Assigned Inbound Bandwidth; screens assigned inbound bandwidth.

  • Assigned Outbound Bandwidth; screens assigned outbound bandwidth.

The ISA Server Cache efficiency object accommodates the counters listed under. Some are preloaded in System Monitor and others usually are not.

  • Lively Refresh Bytes Price (KB/ Sec); for lively caching, the item tracks the speed at which bytes of knowledge are retrieved from the Web to refresh URLs within the cache.

  • Lively URL Refresh Price (URL/ Sec); for lively caching, the item tracks the speed at which cached URLs are retrieved from the Web to refresh cache content material.

  • Disk Bytes Retrieved Fee (KB/ sec); tracks the speed at which bytes of knowledge are retrieved from the disk cache.

  • Disk Cache Allotted Area (KB); tracks the area utilized by the disk cache.

  • Disk Content material Write Price (Writes/ Sec); tracks the variety of writes, to the disk cache to retailer URL content material.

  • Disk Failure Fee (Fail/Sec); tracks the variety of enter/output (I/O) failures per second.

  • Disk URL Retrieve Fee (URL/ Sec); tracks the variety of URLs per second, despatched to shoppers from the disk cache.

  • Max URLs Cached; tracks the utmost variety of URLs saved within the cache.

  • Reminiscence Bytes Retrieved Price(KB/Sec); tracks the speed at which bytes of knowledge are retrieved from the reminiscence cache.

  • Reminiscence Cache Allotted Area(KB); tracks the area utilized by the reminiscence cache.

  • Reminiscence URL Retrieve Fee (URL/ Sec); tracks the variety of URLs per second, despatched to shoppers from the reminiscence cache.

  • Reminiscence Utilization Ratio % (%); signifies the ratio between the quantity of cache fetches from the reminiscence cache as a proportion of complete cache fetches.

  • Complete Actively Refreshed URLs; signifies lively caching efficiency by displaying the collective variety of URLs within the cache which were actively refreshed from the Web.

  • Complete Bytes Actively Refreshed (KB); signifies lively caching efficiency by displaying the collective variety of bytes within the cache which were actively refreshed from the Web.

  • Complete Disk Bytes Retrieved (KB); signifies the collective variety of disk bytes which were retrieved from the disk cache.

  • Complete Disk Failures; signifies the variety of occasions that the Net Proxy service did not learn/write to the disk cache as a result of to an enter/output (I/O) failure.

  • Complete Disk URLs Retrieved; tracks the collective variety of URLs which were retrieved from the disk cache.

  • Complete Reminiscence Bytes Retrieved (KB); tracks the collective variety of reminiscence bytes which were retrieved from the reminiscence cache.

  • Complete Reminiscence URLs Retrieved; tracks the collective variety of URLs which were retrieved from the reminiscence cache.

  • Complete URLs Cached; tracks the collective variety of URLs which were cached.

  • URL Commit Fee (URL/Sec); exhibits the velocity at which URLs are cached.

  • URLs in Cache; tracks the present variety of URLs within the cache.

The ISA Server Firewall service efficiency object accommodates th counters listed under. Some are preloaded in System Monitor and others are usually not.

  • Accepting TCP Connections; tracks the variety of connection objects ready for TCP connections from Firewall shoppers.

  • Lively Periods; tracks the variety of lively periods for the Firewall service.

  • Lively TCP Connections; tracks the variety of lively TCP connections sending knowledge.

  • Lively UDP Connections; tracks the variety of lively UDP connections sending knowledge.

  • Obtainable Employee Threads; tracks the variety of Firewall employee threads.

  • Again-connecting TCP Connections; tracks the variety of TCP connections ready for an inbound join name to finish.

  • Bytes Learn/sec; tracks the variety of bytes per second, learn by the data-pump.

  • Bytes Written/sec; tracks the variety of bytes per second, written by the data-pump.

  • Connecting TCP Connections; tracks the variety of pending TCP connections.

  • DNS Cache Entries; tracks the present variety of DNS area identify entries cached because of the Firewall service.

  • DNS Cache Flushes; tracks what number of occasions the DNS area identify cache was flushed by the Firewall service.

  • DNS Cache Hits; tracks the variety of occasions a DNS area identify was situated by the Firewall service within the DNS cache.

  • DNS Cache Hits %; tracks the DNS domains serviced by the DNS cache as a proportion of the full DNS entries retrieved by the Firewall service.

  • DNS Retrievals; signifies the whole variety of DNS domains which have been retrieved by the Firewall service.

  • Failed DNS Resolutions; exhibits the variety of failures for gethostbyname and gethostbyaddr software programming interface (API) calls.

  • Kernel Mode Knowledge Pumps; tracks the variety of Kernel mode knowledge pumps created by the Firewall service.

  • Listening TCP Connections; tracks the variety of connection objects that are ready for TCP connections from distant Web computer systems.

  • Non-connected UDP mappings; tracks and exhibits the variety of mappings obtainable for UDP connections.

  • Pending DNS Resolutions; signifies the variety of pending gethostbyname and gethostbyaddr API calls.

  • SecureNAT Mappings; exhibits the variety of mappings created by SecureNAT.

  • Profitable DNS Resolutions; signifies the variety of efficiently returned gethostbyname and gethostbyaddr API calls.

  • TCP Bytes Transferred/sec by Kernel Mode Knowledge Pump; signifies the variety of TCP bytes transferred by the Kernel mode data-pump.

  • UDP Bytes Transferred/sec by Kernel mode Knowledge Pump; signifies the variety of UDP bytes transferred by the Kernel mode data-pump.

  • Employee Threads; exhibits the variety of lively Firewall employee threads.

The ISA Server Packet Filter efficiency object incorporates the counters listed under. Some are preloaded in System Monitor and others usually are not.

  • Packets Dropped Because of Filter Denial; screens the entire variety of packets dropped because of dynamic packet filtering rejecting the info.

  • Packets Dropped On account of Protocol Violations; screens the full variety of packets dropped on account of protocol violation.

  • Complete Dropped Packets; tracks the entire variety of dropped packets.

  • Complete incoming connections; signifies the entire variety of connections made via filtered interfaces.

  • Complete Misplaced Logging Packets; tracks and exhibits the variety of dropped packets which couldn’t be logged.

The ISA Server Net Proxy service efficiency object accommodates the counters listed under. Some are preloaded in System Monitor and others aren’t.

  • Array Bytes Acquired/Sec (Enterprise); screens the speed that knowledge bytes are acquired from the opposite ISA Server computer systems in the identical ISA Server array.

  • Array Bytes Despatched/Sec (Enterprise); screens the speed that knowledge bytes are despatched to the opposite ISA Server computer systems in the identical ISA Serverarray.

  • Array Bytes Complete/Sec (Enterprise); exhibits the whole price for all knowledge bytes handed between the ISA Server pc and the opposite members of the identical ISA Server array.

  • Cache Hit Ratio %; exhibits the variety of Net Proxy shopper requests served from the cached as a proportion of the entire variety of the Net Proxy shopper requests handed to the ISA Server pc. This counter measures Net Proxy shopper requests serviced from when the Net Proxy service was final began.

  • Cache Operating Hit Ratio (%); exhibits the requests served from the cache as a proportion of complete profitable requests serviced. This counter measures the final 10,000 requests serviced.

  • Shopper Bytes Acquired/sec; signifies the speed that knowledge bytes are being acquired from Net Proxy shoppers.

  • Shopper Bytes Despatched/Sec; signifies the speed at which knowledge bytes are being transmitted to Net Proxy shoppers.

  • Shopper Bytes Complete/Sec; exhibits the whole price for all knowledge bytes handed between the ISA Server pc and Net Proxy shoppers.

  • Present Array Fetches Common (Milliseconds/Request); signifies, in milliseconds, the time wanted to service a Net Proxy shopper request that’s fetched by means of a special array member server.

  • Present Common Milliseconds/Request; signifies, in milliseconds, the typical time wanted to service a Net Proxy shopper request.

  • Present Cache Fetches Common (Milliseconds/Request); exhibits in milliseconds, the time wanted to service a Net Proxy shopper request.

  • Present Direct Fetches Common (Milliseconds/Request); exhibits in milliseconds, the time wanted to service a Net Proxy shopper request to the Net server or upstream proxy.

  • Present Customers; exhibits the shoppers at present utilizing the Net Proxy service.

  • DNS Cache Entries; signifies the variety of DNS area identify entries cached by the Net Proxy service.

  • DNS Cache Flushes; exhibits the variety of occasions that the Net Proxy service cleared/flushed the DNS area identify cache.

  • DNS Cache Hits; exhibits the variety of occasions that the DNS area identify was situated within the DNS cache by the Net Proxy service.

  • DNS Cache Hits %; tracks the variety of DNS domains serviced by the DNS cache as a proportion of the entire DNS entries retrieved by the Net Proxy service.

  • Failing Requests/Sec; tracks the speed at which Net Proxy shopper requests have some type of error.

  • FTP Requests; signifies the variety of FTP requests which have been handed to the Net Proxy service.

  • Gopher Requests; signifies the variety of Gopher requests which have been handed to the Net Proxy service.

  • HTTP Requests; signifies the variety of HTTP requests which have been handed to the Net Proxy service.

  • HTTPS Periods; signifies the variety of HTTPS secured periods serviced by a SSL tunnel.

  • Most Customers; exhibits the utmost variety of customers which have concurrently related to the Net Proxy service.

  • Requests/Sec; exhibits the speed of incoming requests made to the Net Proxy service.

  • Reverse Bytes Acquired/sec; exhibits the speed at which knowledge bytes are acquired by the Net Proxy service from Net publishing servers for incoming requests.

  • Reverse Bytes Despatched/sec; exhibits the speed at which knowledge bytes are despatched by the Net Proxy service to Net publishing servers for incoming requests.

  • Reverse Bytes Complete/sec; exhibits the entire fee at which knowledge bytes are being handed between the Net Proxy service and Net publishing servers for incoming requests.

  • Website Entry Denied; signifies the variety of Web websites to which the Net Proxy service was denied entry.

  • Website Entry Granted; signifies the variety of Web websites to which the Net Proxy service was granted entry.

  • SNEWS Periods; exhibits the variety of SNEWS periods serviced by the SSL tunnel.

  • SSL Shopper Bytes Acquired/Sec; signifies the speed that SSL knowledge bytes are being acquired from secured Net Proxy shoppers by the Net Proxy service.

  • SSL Shopper Bytes Despatched/Sec signifies the speed that SSL knowledge bytes are being despatched to secured Net Proxy shoppers from the Net Proxy service.

  • SSL Shopper Bytes Complete/Sec; signifies the whole fee for all bytes handed between the Net Proxy service and secured Net Proxy shoppers.

  • Thread Pool Lively Periods; signifies the variety of periods being serviced by the thread pool threads.

  • Thread Pool Failures; signifies the variety of requests being rejected because of the thread pool being full.

  • Thread Pool Measurement; signifies the present variety of threads within the thread pool.

  • Complete Array Fetches (Enterprise); signifies the whole variety of Net Proxy shopper requests which was served by requesting the info from a unique ISA server within the ISA Server array.

  • Complete Cache Fetches; exhibits the entire variety of Net Proxy shopper requests which were served by means of cached knowledge.

  • Complete Failed Requests; exhibits the full variety of requests which weren’t processed by the Net Proxy service due to errors.

  • Complete Pending Connects; signifies the full variety of pending connections to the Net Proxy service.

  • Complete Reverse Fetches; signifies the whole variety of incoming requests to the Net Proxy service that was served by requesting knowledge from Net publishing servers.

  • Complete SSL Periods; signifies the entire variety of SSL periods serviced by the SSL tunnel.

  • Complete Profitable Requests; signifies the entire variety of requests which have efficiently been processed by the Net Proxy service.

  • Complete Upstream Fetches; signifies the entire variety of requests which was served by means of Web knowledge or from a chained proxy pc.

  • Complete Customers; exhibits the whole variety of customers which related to the Net Proxy service.

  • Unknown SSL Periods; signifies the whole variety of unknown SSL periods serviced by a SSL tunnel.

  • Upstream Bytes Acquired/Sec; signifies the speed that knowledge bytes are being acquired by the Net Proxy service from servers residing the Web or from a chained proxy pc to service requests.

  • Upstream Bytes Despatched/Sec; signifies the speed that knowledge bytes that are being transmitted from the Net Proxy service to servers residing the Web or to a chained proxy pc to service requests.

  • Upstream Bytes Complete/Sec; signifies the speed that knowledge bytes are being handed between the Net Proxy service and servers residing the Web or the chained proxy pc.

The H.323 Filter efficiency object incorporates the counters listed under. None are preloaded in System Monitor.

  • Lively H.323 Calls; signifies the variety of lively H.323 calls.

  • Complete H.323 Calls; signifies complete the variety of lively H.323 calls processed by the H.323 filter from when the ISA Server pc final began.

The SOCKS Filter efficiency object incorporates the counters listed under. None are preloaded in System Monitor.

  • Lively Connections; signifies the variety of present lively connections passing knowledge.

  • Lively Periods; signifies the variety of lively SOCKS periods.

  • Bytes Learn/sec; signifies in seconds, the variety of bytes learn on SOCKS connections.

  • Bytes Written/sec; signifies in seconds, the variety of bytes written on SOCKS connections.

  • Connecting Connections; signifies the variety of SOCKS connections ready for a distant pc connection.

  • Listening Connections; signifies the variety of SOCKS connection objects ready for a distant pc connection.

  • Pending DNS Resolutions; signifies the pending DNS identify decision requests.

  • Profitable DNS Resolutions; signifies the variety of identify decision requests being resolved per second.

The best way to add efficiency counters

  1. Open ISA Server Efficiency Monitor.

  2. Proper-click the System Monitor node and choose Add Counters.

  3. Choose which object you need to monitor within the Performnce Object field.

  4. If you wish to monitor all counters for the thing which you’ve chosen, choose the All Counters choice.

  5. If you wish to solely monitor particular counters, choose the Choose Counter choice after which select the counter.

  6. If you wish to monitor all situations of the item, choose the All Situations choice.

  7. If you wish to solely monitor particular situations, choose the Choose Situations choice after which select the occasion.

  8. Click on the Add button.

  9. Click on Shut.

How one can view log information knowledge

  1. Open ISA Server Efficiency Monitor.

  2. Choose the System Monitor node

  3. Choose the View Log File knowledge button.

  4. Choose the log file you need to view after which click on Open.

The right way to create a counter log to log ISA Server efficiency knowledge

  1. Open ISA Server Efficiency Monitor.

  2. Broaden the Efficiency Log and Alerts node.

  3. Choose the Counter Logs folder.

  4. Proper-click within the particulars pane after which choose New Log Settings from the shortcut menu.

  5. Enter a reputation for the log within the Identify textbox.

  6. Click on OK.

  7. On the Basic tab, click on the Add button.

  8. Select the counter so as to add, click on Add after which click on Shut.

  9. Click on the Log Information tab.

  10. Specify the situation for storing log knowledge.

  11. Click on the Schedule tab.

  12. Outline the schedule for logging.

  13. Click on OK.

  14. To start out logging instantly, right-click the precise counter log and click on Begin from the shortcut menu.

  15. To cease logging, right-click the counter log once more and choose Cease from the shortcut menu.

About the author

Admin