Microsoft wbem cimom




















No restart of the WMI service is necessary. For more information about setting the log file properties, see the online Help for the WMI Control application. When logging for WMI core components is enabled, logging is also enabled for any provider with logging capabilities.

Full path and file name of the log file. A bit logical mask that defines the type of debugging output generated by the provider. This value is provider-dependent. The default value is 0 zero.

Maximum file size, in bytes, of the log file. The disk space required for the log file is twice the value of MaxFileSize. The default value is 65, Privacy policy. For more information, see the update history for the cumulative update of Windows Server R2 and Windows Server Before the implementation of the new functionality, there was the potential for a query that uses a large amount of memory to cause a deadlock condition in WMI if a client does not retrieve the results.

In this case, if the offending query causes total memory usage to reach the threshold of MB, all other queries are throttled not executed until the memory pressure decreases. However, if the client is unable to retrieve the data, this condition cannot be resolved until WMI or the computer is restarted. All providers that are listed in this key always run in compatible mode. This key is empty by default. If a provider is listed both in the SecuredHostProviders key and in the CompatibleHostProviders key, the provider is run in secure mode.

The CompatibleHostProviders key provides application compatibility for third-party applications if the DefaultSecuredHost key is set to 1 and the provider is known to not function in secure mode. By default, this value is set to zero and all third-party providers are run in compatible mode.

Administrators can make their computer more secure by default by setting the DefaultSecuredHost value to 1. The DefaultSecuredHost value does not affect the other registry keys. The providers that are listed in the SecuredHostProviders key remain in secure mode, and the ones that are listed in the CompatibleHostProviders key remain in compatible mode. The following list lists the possible registry settings and the associated running modes for a provider.

For more information, see Group Policy Management Console. The following procedures illustrate how to manage secure and compatible mode settings by using group policy preferences. For more information about group policy preferences, see the Group Policy Preferences Overview. Right-click and select New This action presents a user interface where you can enter registry information.



0コメント

  • 1000 / 1000