Use this dialog box from the Monitoring Policy wizard to specify a user account with sufficient permissions to access the network path, which contains the logs that you want to monitor. The network path can be, for example, a UNC path or a file server.
The name of the user account with sufficient privileges to access the network path.
The password for the user account being used to access the network path.
Re-type the password for the user account.
Provides a list of client computers from which you can access the network path.
Content maps to filer
Use this option if the logs that you want to monitor reside on a file server, for example, a NetApp file server.