![]() When using the Processes tab to troubleshoot be aware that you can add extra columns, for example Virtual Memory, IO Reads and Writes. Other viruses have more innocuous names like Tlntsvr.exe and Wina.exe, so this is why I urge you to know the Processes Image names. Here was a case where I needed to check the registry as the blaster virus cunningly re-infects those who are not diligent. How about msblast.exe? Was this a game that my nephew had installed on my XP machine? Well I tried a search in Google and up came W32/BlasterA virus. At first I thought my machine has been infected by a virus, but no, it was actually my virus checker which had installed itself as a process. Returning to the theme of identifying rogue programs, what would think if you saw Avgserv and Agvcc32 amongst the image names? When I saw these processes, I must admit my heart missed a beat. Incidentally, PowerShell can identify which processes are in which svchosts. The interesting fact about all these svchost is that certain services would fight if put together in the same Image Name process, therefore, the operating system separates incompatible services and puts them in separate svchosts. Could you have been infected 7 times by a strange virus? No, svchost is the generic name for an image shared by the operating systems services, for example, Alerter, Net Logon, Print Spooler. Moreover, by identifying the ‘good guys’ you will learn how applications such as Exchange and SQL interact with the operating system.Īt first a process called svchost seems suspicious. The Process Tab is a key place in the Task manager for the support professional to investigate, in fact the more ‘Image Names’ that you can identify the better techie you are.īy matching Image Names more processes to programs, the easier it is detect impostors such as viruses. With Task Manager (taskmgr) I like to remove the tick which says ‘ Always on top’. One of the joys of using any new program is setting the preferences. However, in Vista there is a trend to empower users where the task has no security implications.Īnother use of the Applications Tab is to discover the underlying Image Name of a program, simply right-click and then select: Go to Process. I admit that this tip may not work if Group Policy prevents the users launching Task Manager. Assuming that your group policy allows users access to this tab, why not send out an email reminding users of how to use this Applications tab when their machine hangs and programs are ‘Not Responding’. No doubt you have already used task manager’s Application Tab to end process for programs that hang or do not respond. Topics for Task Managerin Windows Server 2003 An application tab for zapping programs, a process tab for checking for viruses, a performance tab to calculate pagefile and now a network utilization tab to see how much activity there is on the LAN or WAN. (As ever Microsoft provide at least 3 ways of doing everything, thus in addition to Run taskmgr, you can also right-click the grey bar at the bottom of your screen and select Task Manger.)Įach of Task Manager’s five tabs has it’s own personality, I recommend that you get to know the capabilities of each one. If you have long fingers, try launching it with just your left hand. Let us start with a flashy way of executing the Task manager with: CTRL +SHIFT +ESC. There will be occasions when you just need a quick piece of system information, calling for your task manager can be just as effective as creating performance logs but much faster. When it comes to checking a Windows Server, do not neglect the trusty Task Manager. ![]() ![]() Introduction to Windows Server 2003 Task Manager
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |