Syskit Monitor
Try it for FreeContact UsProduct Site
  • Syskit Monitor
  • Product Updates
    • Syskit Monitor 9.1.0 - Release Note
    • Syskit Monitor 9 – The monster has awoken!
    • Syskit Monitor 8.4.0 - Release Note
    • Syskit 2012 R2 8.3.0 - Release Note
    • Syskit 2012 R2 8.2.0 Release Note
    • Syskit 2016 R2 8.0.1 - Release Note
    • Syskit 2016 R2 – Monitor and script all the things!
  • Requirements
    • System Requirements
    • User Permission Requirements
    • Pre Installation Requirements
  • Installation and Configuration
    • Install Wizard
      • Install Syskit Monitor
      • Install Syskit Monitor Data Collector
    • Configuration Wizard
      • Configure Syskit Monitor
      • SQL Permissions
        • Create a SQL Server Login
        • Create a SQL Server Database
        • Create a Service User Login Permission
        • Connect an Existing Database
    • Upgrade to the Latest Version
    • Uninstall Wizard
  • Editions
    • Editions
  • Activation
    • Activation Privacy Statement
    • Online and Offline Activation
    • Activation FAQ
  • Get to Know Syskit Monitor
    • Quick Start Guide
    • Administration
      • Servers and Groups
      • Monitoring Templates
      • PowerShell Scripts
    • Backstage Screen
      • Manage Data Gathering
      • Help Screen
      • Configuration
        • Configure
        • Options
      • Syskit Monitor Web App
    • Dashboards
      • Sessions Dashboard
      • Performance Dashboard
    • Reports
      • User Reports
      • Application Reports
      • Performance Reports
        • System Overview
        • Computer Performance
        • Application Performance
        • User Performance
      • Gateway Reports
      • License Reports
      • Event Log Reports
      • Inventory Reports
        • Hardware and Software
        • Powershell Reports
        • Compare Wizard
      • Custom Reports
  • Common Tasks with Syskit Monitor
    • Monitoring Windows Server and Application Performance
    • Monitoring and Restarting Stopped Windows Services
    • Real Time Alerting
    • Monitoring User Activities and Application Usage
    • Monitoring RD Gateway Connections
    • File System Auditing
    • Malicious IP Blocking
    • Computer Inventory
  • How To
    • Custom Reports
      • Create Custom Report
      • Create SQL Custom Report
      • Create an Alert
    • Users
      • Add Users Manually
      • Add Users From Active Directory
      • Manage Security Permissions
    • Dashboards
      • Create a Custom Dashboard
      • Edit Dashboards
      • Add Formatting Condition to Metrics
    • Reports
      • Export Report to Excel
      • Configure Cost Overview Report
      • Configure Report Subscriptions
      • Create Customized Report Views
    • Computers
      • Add/Remove or Delete Computer from Monitoring
      • Add Citrix Servers to Monitoring
    • Monitoring Templates
      • Predefined Monitoring Templates
      • Template Wizard
      • Import / Export Monitoring Template
      • Download Templates
    • Powershell Scripts
      • PowerShell Wizard
      • Manage Scripts
      • Import / Export PowerShell Script
      • Import and Use PowerShell Script Modules
      • Download Scripts
    • Service Accounts
      • Add Service User to Local Administrators Group via Group Policy
      • Add Service User to Local Administrators Group Manually
    • Audit Events
      • Enable Folder Auditing
      • Configure Audit Logon Events
      • Configure Syskit Monitor server to support the Block Malicious IP Addresses feature
    • Citrix Xenapp
      • Allow Remote RPC on Xenapp
      • Monitor Citrix Published Applications
      • Configure Syskit Monitor for Citrix XenApp 5 Published Application monitoring
      • Configure Syskit Monitor for Citrix XenApp 6.x Published Application monitoring
      • Configure Syskit Monitor for Citrix XenApp 7.x Published Application monitoring
    • Performance Counters Management
    • Manage Syskit Monitor Data Collector
    • Move database to new server
    • Exclude installation folder from antivirus scanning
  • FAQ
    • FAQ
  • Troubleshooting
    • SQL Server Connection
    • SQL Server Express 2012 LocalDB
    • How to resolve the Offline and Unauthorized computer states
    • Network Ports
    • Fixing WMI to work with Syskit Monitor
    • Enable-PSRemoting for untrusted domains to work with Syskit Monitor
    • Configuring CredSSP for use with PowerShell in Syskit Monitor
    • Installation Issues
    • User States
    • User Connections
    • Miscellaneous
Powered by GitBook
On this page
  • Account setup
  • SQL Server setup

Was this helpful?

  1. Requirements

User Permission Requirements

This article discusses the necessary Service Account you need in order to run the Syskit Monitor in various environments and describes deployment scenarios that affect account requirements.

PreviousSystem RequirementsNextPre Installation Requirements

Last updated 1 year ago

Was this helpful?

Please read this article before choosing your service account.

You can configure Syskit Monitor to run under designated domain account or local user on a particular computer. When prompted for the Service Account under Syskit Monitor Service credentials, enter a dedicated service user. It must have the proper permission to collect the required activity data and proper privileges to store data to your database.

Please note! As a best practice, we recommend setting a service user that is in the Adminstrators or Domain Admins group.

We recommend using the domain account as the service account. In order for the account to be eligible for running the Syskit Monitor service, it must have administrative privileges and must have the permission.

Account setup

  • Service Account: Domain account

  • Setup User Account:

    • This account must be a member of the Local Administrators security group on each server you plan to monitor.

    • It must have the Logon as a service permissions defined on a domain level.

This is the recommended method for most scenarios.

There are two ways to add a service user to the Local Administrators security group. You can configure this or via .

Please note! If the software is installed on a non-domain joined machine, the service account name should be entered in the following form: machine_name\username.

SQL Server setup

  • You can use the Windows Authentication to access the database – the service user will be used for authentication on the SQL Server (recommended).

  • SQL Server Authentication should be used only when Windows Authentication is not possible. This scenario is supported through the Syskit Monitor Configuration Wizard.

If you plan to use Windows authentication, we recommend using our Configuration Wizard to create and configure the Syskit Monitor database. The Active Directory (Windows service) user running the configuration wizard needs to have dbcreator and securityadmin privileges on the SQL Server to create and configure the database.

See to learn more about Syskit SQL server database requirements. See article to learn more on how to change the Service Account or Syskit Monitor database.

Proceed to: .

Logon as a service
manually
Group Policy
SQL Permissions
Configure
Pre-Installation Requirements