Impersonate User

Use this dialog box from the Monitoring Policy wizard to specify a user account with sufficient permissions to access the network path, which contains the logs that you want to monitor. The network path can be, for example, a UNC path or a file server.

User Name

The name of the user account with sufficient privileges to access the network path.


The password for the user account being used to access the network path.

Confirm Password

Re-type the password for the user account.

Associated Client

Provides a list of client computers from which you can access the network path.

Content maps to filer

Use this option if the logs that you want to monitor reside on a file server, for example, a NetApp file server.