Chatta subito con l'assistenza
Chat con il supporto

Spotlight on SAP ASE 2.12 - User Guide

Spotlight on SAP ASE
Background Information Desktop Features Connect to SAP ASE Spotlight® on SAP ASE Drilldowns Spotlight® on SAP ASE Alarms Glossary
Spotlight Basics
Spotlight Connections Monitor Spotlight Connections Alarms Charts, Grids And Home Page Components View | Options Troubleshooting
Spotlight History Spotlight on Windows
Connect to Windows Systems Background Information Home Page Alarms Drilldowns View | Options Troubleshooting
Spotlight on Unix About us Third-party contributions Copyright

Open Connections Page

The Open Connections sub-page provides details about the connections currently established to the shared resources shown on the Shares page of the Network drilldown.

To open the Open Connections subpage

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | Shares.

  3. Double click on the resource in the grid.
  4. Click Open Connections.

For each shared resource, information on its open connections is displayed in the columns of a single table (grid).

Column Description

Share

The name of the shared resource.

Computer

The remote machine connected to the shared resource.

User

The user logged in to the remote machine.

Type

The type of device that provides the shared resource (for example, Disk or Printer)

Open Files

The number of files currently open on the shared resource.

Elapsed Time

The length of time that the user on the remote machine has been connected to the shared resource.

 

Related Topics

Permissions Page

The Permissions page lists the trustees assigned to the shared resource currently chosen in the Shares page of the Network drilldown, together with the rights granted or denied to the trustees.

Note: Microsoft defines a trustee as:

"The user account or group account to which an access control entry (ACE) applies. Each ACE in an access control list (ACL) has one security identifier (SID) that identifies a trustee. User accounts include accounts that users or programs such as Windows services use to log on to the local computer. Group accounts cannot be used to log on to a computer, but are useful in ACEs to allow or deny a set of access rights to one or more user accounts."

To open the Permissions page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | Shares.

  3. Double click on the resource in the grid.
  4. Click Permissions.

For each shared resource, information on its assigned permissions is displayed in the columns of a single table (grid).

Note: Not all of these columns will be visible by default. To view hidden columns, right-click a column heading and choose Organize Columns... from the shortcut menu. See Show, Hide & Order Columns for more information.

Column Description

User

The name of the trustee identified by the User SID.

User Type

The trustee can be one of the following types of user:

  • UNKNOWN — The trustee type is unknown, but not necessarily invalid.
  • USER — A Windows user account.
  • GROUP — A Windows group account.
  • DOMAIN — A domain.
  • ALIAS — A unique SID with a specified User alias.

    Example, BUILTIN\Administrators can have different local names on different resources:

    • serverA\Administrators on server A
    • serverB\Administrators on server B
  • KNOWN GROUP — A well known group (for example, the Authenticated Users or Everyone groups, which are available on all Windows systems).

Grant

The access types (READ ONLY, CHANGE, FULL CONTROL) that have been granted to the current trustee.

Deny

The access types that have been specifically DENIED to the current trustee. Deny rights take precedence over Grant rights.

Full Name

The full name of the trustee. Hide this column if you do not need this information, as Spotlight obtains it by querying the domain controller for the remote machine; this may cause a significant delay when refreshing data. See Show, Hide & Order Columns for more information.

Share

The name of the shared resource.

User SID

The security identifier for the current trustee of the shared resource. Every account on a network is issued a unique SID when the account is first created.

 

Related Topics

Open Ports Page

The Open Ports page is not available if the Windows SNMP protocol is not installed on:

  • The Windows machine under diagnosis, AND
  • The machine running the Spotlight client.

Installing The SNMP Protocol

The open communication ports on a Windows machine are not necessarily in use. They may be the inadvertent consequence of a now-stopped service or some other application, or they may have been opened by a virus.

The Open Ports page on the Network drilldown summarizes the status of all the communication ports on the machine under diagnosis. Each row in the table (grid) represents an open port, and the columns in the grid display the properties associated with it.

To open the Open Ports page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | Open Ports.

Note: In the Open Ports page, the term local refers to the Windows machine under diagnosis. Remote refers to any machines connected to a port on the diagnosed (local) machine.

Column Description
Protocol The communication protocol associated with the open port (for example, TCP or UDP).
Local Address The address of the diagnosed machine.
Local Port The registered name of the port on the diagnosed machine, if available. Otherwise it is the number of the port on the diagnosed machine.
Remote Address The IP address of a remote host connected to the specified local port.
Remote Port The port number by which the specified remote host is connected to the local port.
Status The current status of the network connection between the two machines (for example, Listening, Established, or Time_wait.)

 

Related Topics

cLAN Gigabit Page

The cLAN Gigabit page of the Spotlight on Windows Network drilldown shows recent activity to and from the current system via cLAN Gigabit cards.

Note: The cLAN Gigabit network interface card (NIC) enables high-speed communications across a network. This page in the Network drilldown is enabled only if the current network contains one or more of these cards.

To open the cLAN Gigabit page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | cLAN Gigabit.

Charts on the cLAN Gigabit page

Notes:

  • Click an item in the legend to highlight its series (line) in the chart. Click a second time to return the series to its normal appearance.
  • Move the mouse pointer over an item in the legend to view the current value for that series within the chart.
Chart Description
Total MB in/out

Sent — The rate at which megabytes are sent over cLAN Gigabit network cards from this machine.

Received — The rate at which megabytes are received by this machine from cLAN Gigabit network cards.

Frames per second

Sent — The rate at which frames are sent over cLAN Gigabit network cards from this machine.

Received — The rate at which frames are received by this machine from cLAN Gigabit network cards.

Interrupts per second

Async sent — The rate at which interrupt requests are sent by the cLAN network cards (such as those to CPUs).

Async received — The rate at which interrupt requests are received by the cLAN network cards.

Errors

Note: This chart does NOT show the rate of errors detected, but the number of errors detected since the chart was last refreshed.

VPI/VCI Rx errors — The number of receive errors in VCI (Virtual Channel Identifier) and VPI (Virtual Path Identifier) packets.

Rx NIB congestion — The number of receive errors originating from the NIB (Network Interface Board).

Rx Cell Drop — The number of received packets dropped for any reason.

Received HEC Errors — The number of received packets with HEC (Header Error Control) errors.

Received 10b characters — The number of invalid 10 bit characters received.

 

Related Topics

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione