

- #Disable windows licensing monitoring service update
- #Disable windows licensing monitoring service full
If access to those resources have been resolved, the Access Level can be set to Full Access in the Monitoring Service Connection Properties at the target level in the Navigator pane. This suspends attempts to access resources that are required for some functionality like the Disk Space and Activity tabs, and Windows Metrics on the Performance Analysis Dashboard. In these circumstances, a target may be added with Limited Access. This is occasionally the case for cloud based or hosted servers. You may wish to monitor an instance where OS level metrics through WMI and/or the Windows Performance Library are inaccessible.
#Disable windows licensing monitoring service update
Changing the Monitoring Service CredentialsĪfter the initial installation, the Service Configuration Utility is used to update or change the credentials of the SQL Sentry monitoring service account. See the Microsoft Azure SQL Database and Data Warehouse Security article for account and firewall information required to monitor these target types. Important: Adding the service account to the local Windows Administrators group for the SQL Sentry database server doesn't automatically grant the service user access to the SQL Sentry database.

If the monitoring service does not have Windows Administrator privileges, instance level metrics can still be collected using the Limited Access option. The account must also have Windows Administrator privileges on any computer with a watched Windows Task Scheduler instance to collect system level performance metrics with SQL Sentry Performance Analysis.See the Update to change permissions for running sp_readerrorlog and sp_enumerrorlogs in SQL Server article from Microsoft for additional information.

The securityadmin server role may be required to guarantee the collection of SQL Agent Log events, depending on the exact SP/CU of the SQL Server version.This automatically adds membership to the SQLAgentReaderRole and SQLAgentUserRole.They must be a member of the SQLAgentOperatorRole role on the msdb database.They must, at a minimum, be a principal on the SQL Server target with the Control server permission granted.If the monitoring service account and interactive user do not have sysadmin privileges, then:.We do not support watching targets on SQL Server version 2008 R2 or earlier without sysadmin privileges in any version of SQL Sentry. Important: Prior to version 19.1.1, the account must have sysadmin privileges on each watched SQL Server.
