Windows 7 / Getting Started

Configuring a Data Collector Set

To access the properties for a DCS, right-click the name of the DCS and select Properties from the shortcut menu. All of the properties for a data collector are configured from this interface. Properties available on each tab include the following:

  • General Configure the data collector description, any keywords that are desired for search purposes, and the Run As properties that determine under what user context this DCS will run. Click Change to change the user context for the collector. The default is the Local System account.
  • Directory Configure the root directory for the DCS and specify a separate subdirectory if desired. The default is %SystemDrive%\perflogs\<Data Collector Set name>. You can also specify the format of the subdirectory name based on the following options:
    • Date and time Choose from the available subdirectory name formatting options that are displayed.
    • Computer name You can also prefix the subdirectory with the computer name by selecting the Prefix Subdirectory With Computer Name check box.
    • Serial Number You can use the Serial Number format (N) to create a unique subfolder name each time the DCS is started. This allows multiple logs of the same data collectors to be saved within different subfolders in the parent DCS folder. You can edit the serial number only in the Data Collector Set Properties, but the serial number format may also be specified to be used by individual data collectors. The default DCS subdirectory naming convention is NNNNNN, which results in DCS subfolders named 00000x (where x is the serial number).
      For example, a DCS with a serial number of 8 that was run on January 31, 2003 at 4:20 A.M. would have the following results based on the selected subdirectory name format:
      Subdirectory name format: yyyyMMddNNNN; Actual subdirectory name: 200301310008
      Subdirectory name format: yyDDD NN; Actual subdirectory name: 03031 08
      Subdirectory name format: MMMM MM\, yyyy \a\t h mmtt \- N; Actual subdirectory name: January 31, 2003 at 4 20 AM - 8
  • Security Specify security parameters on the DCS. Default permissions are granted to SYSTEM, Administrators, Performance Log Users, and the data collector creator/owner.
  • Schedule Configure the beginning date, expiration date, and launch time and day. Click Add to configure a schedule.
  • Stop Condition Define when the data collection will stop. Options available on this tab include the following:
    • Overall Duration Configures the log to stop after a defined duration in seconds, minutes, days, hours, or weeks.
    • Limits Defines limits for the log size or duration and whether to restart the DCS when those limits are reached. You can set the time duration or maximum size limit.
  • Task Configure a specific task to run when a DCS stops. The specified task must be an existing Task Scheduler task. You can also specify the task arguments and the working directory.

Note You can also view and edit the properties of each data collector within a DCS by using the shortcut menus for each data collector. The configuration settings for a data collector vary depending upon whether the data collector is used for collecting performance counter, event tracing, or registry information.

[Previous] [Contents] [Next]

In this tutorial:

  1. Windows 7 Desktop Maintenance
  2. Performance Monitoring
  3. Improvements to Performance Monitoring in Windows 7
  4. Using Performance Monitor
  5. Real-Time Performance Monitoring
  6. Performance Monitor Logging
  7. Creating a Data Collector Set
  8. Configuring a Data Collector Set
  9. Using Data Manager to View Performance Data
  10. Starting and Stopping Data Logging
  11. Viewing Performance Data
  12. Comparing Performance Monitor Logs
  13. Performance Monitor User Rights
  14. Remote Data Collection
  15. Using Windows PowerShell for Performance Monitoring
  16. Resource Monitor
  17. Overview Tab
  18. CPU Tab
  19. Memory Tab
  20. Disk Tab
  21. Network Tab
  22. Reliability Monitor
  23. How Reliability Monitor Works
  24. Windows Performance Tools Kit
  25. Event Monitoring
  26. Understanding the Windows Event Architecture
  27. Channels
  28. Improvements to Event Monitoring in Windows 7
  29. Using Event Viewer
  30. Understanding Views
  31. Viewing Event Logs
  32. Saving Event Logs
  33. Configuring Event Subscriptions
  34. Considerations for Workgroup Environments
  35. Creating a New Subscription
  36. Using the Windows Events Command-Line Utility for Event Monitoring
  37. Using Windows PowerShell for Event Monitoring
  38. Using Task Scheduler
  39. Improvements to Task Scheduler in Windows 7
  40. Understanding Tasks
  41. Understanding the Task Scheduler Architecture
  42. Understanding Task Scheduler Security
  43. Credentials Management
  44. Securing Running Tasks
  45. Understanding AT and Task Scheduler v1.0 Compatibility Modes
  46. Understanding the Task Scheduler Snap-in
  47. Understanding Default Tasks
  48. Creating Tasks
  49. Defining Triggers
  50. At Startup Trigger
  51. On Connection To AND Disconnect From User Session Triggers
  52. On Workstation Lock AND Unlock Triggers
  53. Defining Actions
  54. Defining Conditions
  55. Defining Settings
  56. Managing Tasks
  57. Viewing History
  58. Using SchTasks.exe for Creating and Managing Tasks
  59. Task Scheduler Events
  60. Troubleshooting Task Scheduler
  61. Tasks Won't Run If the Service Is Not Started
  62. The Task Will Run Only When a Certain User Is Logged On
  63. The Task Action Failed to Execute
  64. Interpreting Result and Return Codes
  65. Understanding the Windows System Assessment Tool
  66. Understanding WinSAT Assessment Tests
  67. Examining the WinSAT Features Assessment
  68. Running WinSAT from the Command Line
  69. Understanding WinSAT Command Exit Values
  70. Running WinSAT Using Performance Information and Tools
  71. System Capabilities Section
  72. OEM Upsell And Help Section
  73. Understanding Windows Error Reporting
  74. Overview of Windows Error Reporting
  75. How WER Works
  76. Store Management System
  77. ReportArchive Folder
  78. WER Service
  79. Understanding the Error Reporting Cycle
  80. Understanding WER Data
  81. Configuring WER Using Group Policy
  82. Configuring WER Using the Action Center