Configuring Windows Virtual Machines to Support the Inside View without the eG VM Agent

For the "inside" view, by default, the eG agent communicates remotely with the virtual machines on the Hyper-V server and collects metrics. To establish this remote connection with Windows VMs, eG Enterprise requires that the eG remote agent (on Windows) be configured with domain administrator privileges. Besides, the inside view using flag of all “inside view” tests should be set to Remote connection to a VM (Windows).

In addition, the admin$ share will have to be available on the Windows guests.

If the ADMIN$ share is not available on any Windows-based virtual guest, create the share using the procedure detailed below:

  1. Open the Windows Explorer on the virtual machine, browse for the corresponding Windows directory in the C drive, right-click on it, and select the Sharing option from the shortcut menu.

  2. If the admin$ share does not pre-exist on the Windows guest, then Figure 1 appears indicating the same.


    Figure 1 : The ADMIN$ share does not exist

  3. On the other hand, if the admin$ share pre-exists, Figure 2 appears. In such a case, first, remove the admin$ share by selecting the Do not share this folder option from Figure 2 and clicking the Apply and ok buttons. After this, you will have to repeat step 1 of this procedure to open Figure 1. Then, proceed as indicated by step 3 onwards.


    Figure 2 : Admin$ share pre-exists

  4. To create (or re-create) the admin$ share, select the Share this folder option from Figure 2, and provide admin$ share against the Share name text box (see Figure 3).


    Figure 3 : Creating the ADMIN$ share

  5. Next, to enable the eG agent to communicate effectively with the Windows guest, you need to ensure that the permission to access the admin$ share is granted to an administrative user (domain); also, the credentials of this user should be passed while configuring the eG monitoring capabilities - i.e., while configuring the Hyper-V tests. To grant the access permissions, click on the Permissions button in Figure 3.

  6. By default, the admin$ share can be accessed by Everyone (see Figure 4). To grant access rights to a specific domain administratoar, select the Add button in Figure 4. When Figure 5 appears, select the domain to search from the Look in list. The valid user accounts configured on the chosen domain then appear in the box below. From this box, choose the administrator's account and click on the Add button to add the chosen user account to the box below the Add button.


    Figure 4 : Clicking the Add button


    Figure 5 : Selecting the administrative user to whom access rights are to be granted

  7. Finally, click the ok button. You will then return to Figure 4, where the newly added administrator account will appear (see Figure 6).


    Figure 6 : The administrator account granted access permissions

  8. Select the newly added administrator account from Figure 6, and then, using the Permissions section, grant the administrator Full Control, Change, and Read permissions.

  9. Finally, click the Apply and ok buttons in Figure 6 to register the changes.

  10. Once you return to Figure 6, click on the Security tab (see Figure 7) to define the security settings for the admin$ share.


    Figure 7 : Defining the Security settings for the ADMIN$ share

  11. Here again, you need to add the same administrator account, which was granted access permissions earlier. To do so, click the Add button in Figure 7, pick a domain from the Look in list of Figure 8, select the said administrator account from the domain users list below, and click the Add button (in Figure 8) to add the chosen account. Then, click the ok button in Figure 8.


    Figure 8 : Adding the administrator account

  12. This will bring you back to Figure 7, but this time, the newly added domain administrator account will be listed therein as indicated by Figure 9.


    Figure 9 : The Administrator account in the Security list

  13. Finally, click the Apply and ok buttons in Figure 9.