{"id":488,"date":"2008-04-14T03:51:27","date_gmt":"2008-04-14T01:51:27","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/"},"modified":"2008-04-14T03:51:27","modified_gmt":"2008-04-14T01:51:27","slug":"monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/","title":{"rendered":"Monitoring disk space utilization growth\/increase with Operations Manager 2007"},"content":{"rendered":"<div class=\"ExternalClassD1EE5D435CFD47ABB742C8E81E47DC13\">\n<div class=\"ExternalClass67F65542CF744492A7B68439D366A6D2\">\n<div class=\"ExternalClass075685462A8242FC8EB7EB8DF5237581\">\n<p>By default, Microsoft Operations Manager includes some monitors \/ rules that have the ability to monitor the disk utilization of system and\/or data disks of your servers (and clients). This is a really nice feature, however there may be reasons why this kind of monitoring would still leave you one step behind of your users. After all, there would be no way to monitor if a set of data on a disk starts growing faster than you would like.\u00a0\u00a0 You would get an alert - sure - but it might be too late already.<\/p>\n<p>Let's say you have a disk on a fileserver, that contains all of the data\/shares of your end users, and all of the homefolders.\u00a0\u00a0 Assuming that the (for example) 300Gb disk contains 260Gb worth of data already. No problems so far, life is good, OpsMgr would not get trigger and alert yet (unless you have changed the default threshold values).<\/p>\n<p>Suppose one of your users starts copying a DVD to his homefolder... the available space would increase with 4Gb.\u00a0 OpsMgr would still not generate an alert.\u00a0 But let's be honest -\u00a0 this would be something you would like to know, right ?\u00a0 If your data folders increase by 4Gb a day, then you would like to know this sooner - even before the \"low level\" threshold gets triggered.<\/p>\n<p>Out of the box, there is no way to do this.\u00a0 So I decided to write a small vbs script, and used the vbscript in an OpsMgr monitor.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Download<\/span><\/strong><\/p>\n<p>You can download a copy of the script here :<br \/>\n[download id=\"4\"]<\/p>\n<p><strong><\/strong>(Check back for updated versions of the script)<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Script basics<\/span><\/strong><\/p>\n<p>The script requires 3 parameters, each separated with a single blank (space), and one optional parameter :<\/p>\n<p><em>Mandatory parameters<\/em><\/p>\n<p>1. The absolute path to the folder (or disk) that needs to be monitored.\u00a0 You can use multiple paths\/folders by separating them using a comma.\u00a0\u00a0\u00a0 So if you want to look at\u00a0 d:\\shares and\u00a0 d:\\homefolders, then the first parameter should be\u00a0 \"d:\\shares\",\"d:\\homefolders\"<\/p>\n<p><em>Note : the current version of script will look at all folders (1 level deep) inside the folder that you've specified as a parameter. So if d:\\shares only contains files, then you should use d:\\\u00a0 as parameter (which would include d:\\shares, as well as all other folders on drive d:)<\/em><\/p>\n<p>2. The timewindow, in hours (integer numeric value)<\/p>\n<p>3. The max amount of growth, in megabytes.<\/p>\n<p><em>Optional parameter<\/em><\/p>\n<p>As 4th parameter, you can specify the folders you want to exclude from the monitoring. You can specify multiple folders, just make sure to use the conventions as with the first parameter ( =&gt; comma separated, no spaces between the individual folders, put each folder path between double quotes\"<\/p>\n<p>Conclusion : if you want to monitor disk space utilization growth on drive d:, which includes all shared folders (under d:\\shares) and all shared homefolders (under d:\\homefolders), and you would allow up to 2Gb growth in 24 hours, and you want to exclude d:\\scripts then you should use this as parameters<\/p>\n<p><span style=\"font-family: Courier New;\">\"d:\\\",\"d:\\shares\",\"d:\\homefolders\" 24 2048 \"d:\\scripts\"<\/span><\/p>\n<p>(Make sure not to put any spaces between the folders, just use double quotes and a comma, no spaces !)<\/p>\n<p>When the script runs, you will get event 951 in the Operations Manager event log on the server that is being monitored. This event indicates that the script was launched.\u00a0 If the script was launched with an invalid number of parameters, you will get a corresponding message in the body of that event log entry<\/p>\n<p>When the script finishes (for the first time), you will get event ID 991, indicating that the script has finished (and has only created baseline information). In all other cases, you will get event ID 990, either containing the text \"GOOD\" when no problems have been detected, or containing some information about the folders that have triggered an alert.<\/p>\n<p>The message that is passed back in a PropertyBag to OpsMgr is stored in the Message variable (see later in this post - see unhealthy &amp; health expressions section)<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Operations Manager Setup<\/span><\/strong><\/p>\n<p>This is how you can use this script as an Operations Manager monitor<\/p>\n<p>Open the Operations Console, Open the \"Authoring\" pane, go to \"Monitors\" and open the Windows 2003 Computers (or any other group that contains computer objects)<\/p>\n<p>Create a new Unit monitor, and select \"Scripting\" - \"Generic\" - \"Timed Script Two State Monitor\"<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-2.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-2-thumb.png\" alt=\"image_2\" width=\"347\" height=\"408\" \/><\/a><\/p>\n<p>Create a new custom Management Pack and select the custom Management Pack as destination MP<\/p>\n<p>Click Next to continue<\/p>\n<p>Specify a good relevant name. You can include the name of the server and the drive\/folder, because you will have create a monitor for each server \/ folderset combination.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-4.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-4-thumb.png\" alt=\"image_4\" width=\"349\" height=\"396\" \/><\/a><\/p>\n<p>Make sure the target is set to Windows Server 2003 Computer (or another group that contains computer objects) and DISABLE the monitor for now<\/p>\n<p>Click next to continue<\/p>\n<p>Run every : 30 minutes may be a good interval to start with.\u00a0 Set to sync at 0:00<\/p>\n<p>Click next to continue<\/p>\n<p>File Name : choose a relevant filename for the script. Don't forget the .vbs extension.<\/p>\n<p>TImeout : choose something below the \"Run every\" interval.\u00a0 25 Minutes may be a good starting point<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-6.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-6-thumb.png\" alt=\"image_6\" width=\"368\" height=\"318\" \/><\/a><\/p>\n<p>Clean the \"Script\" field, and paste the entire script (download link : see earlier in this post) in the \"Script\" field<\/p>\n<p>Click \"Parameters\" and enter your 3 parameters :<\/p>\n<p><span style=\"font-family: Courier New;\">\"d:\\\",\"d:\\shares\",\"d:\\homefolders\" 24 2048<\/span><\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-8.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-8-thumb.png\" alt=\"image_8\" width=\"407\" height=\"190\" \/><\/a><\/p>\n<p>Click OK to close the parameter window<\/p>\n<p>Click Next to continue<\/p>\n<p>Unhealth expression :<\/p>\n<p>Property[@Name='Message']\u00a0\u00a0\u00a0\u00a0 Does not equal\u00a0\u00a0\u00a0\u00a0 GOOD<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-10.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-10-thumb.png\" alt=\"image_10\" width=\"418\" height=\"160\" \/><\/a><\/p>\n<p>Click next<\/p>\n<p>Healthy expression :<\/p>\n<p>Property[@Name='Message']\u00a0\u00a0\u00a0\u00a0 Equals\u00a0\u00a0\u00a0\u00a0 GOOD<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-12.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-12-thumb.png\" alt=\"image_12\" width=\"412\" height=\"155\" \/><\/a><\/p>\n<p>Click next<\/p>\n<p>Map the monitor conditions to health states (default settings will do just fine for now)<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-14.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-14-thumb.png\" alt=\"image_14\" width=\"417\" height=\"154\" \/><\/a><\/p>\n<p>Click next.<\/p>\n<p>Enable the generation of alerts, and let the monitor auto resolve<\/p>\n<p>Create a relevant Alert name (which will be displayed in the alert) and use<\/p>\n<p>$Data\/Context\/Property[@Name='Message']$\u00a0 in the alert description field<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-16.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-16-thumb.png\" alt=\"image_16\" width=\"395\" height=\"288\" \/><\/a><\/p>\n<p>Click \"Create\" to save the monitor<\/p>\n<p>The monitor is still disabled, so we need to create an override to activate the monitor on the server (FILESERVER1 in our example)<\/p>\n<p>Right-click the monitor, choose \"Overrides\" - \"Override the monitor\" - \"For a specific object of Type : Windows Server 2003 Computer\"<\/p>\n<p><a href=\"\/wp-content\/uploads\/2008\/09\/image-18.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2008\/09\/image-18-thumb.png\" alt=\"image_18\" width=\"410\" height=\"129\" \/><\/a><\/p>\n<p>Select the server where the monitored folders reside and click OK<\/p>\n<p>Change the \"enabled\" parameter to \"True\" and save the override<\/p>\n<p>Now wait for the script to kick in.\u00a0 (Look at the event log. You should at least get event ID 951 under \"Operations Manager\" on the target server when the script starts, and event 990 when the script ends)<\/p>\n<p>You can simulate if the script works fine by add files\/data to your folders and see if the growth is noticed by our monitor.<\/p>\n<p>Note : I wrote the script in about 30 minutes, so obviously it has not been tested thoroughly yet. If you find bugs, please don't hesitate to let me know\u00a0 (<a href=\"mailto:peter.ve@telenet.be\">peter.ve@telenet.be<\/a>)<\/p>\n<p>Thanks<\/p><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By default, Microsoft Operations Manager includes some monitors \/ rules that have the ability to monitor the disk utilization of system and\/or data disks of your servers (and clients). This is a really nice feature, however there may be reasons why this kind of monitoring would still leave you one step behind of your users. &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Monitoring disk space utilization growth\/increase with Operations Manager 2007\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[634,26],"tags":[633,632],"class_list":["post-488","post","type-post","status-publish","format-standard","hentry","category-operations-manager","category-windows-server","tag-opsmgr","tag-monitor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Monitoring disk space utilization growth\/increase with Operations Manager 2007 - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoring disk space utilization growth\/increase with Operations Manager 2007 - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"By default, Microsoft Operations Manager includes some monitors \/ rules that have the ability to monitor the disk utilization of system and\/or data disks of your servers (and clients). This is a really nice feature, however there may be reasons why this kind of monitoring would still leave you one step behind of your users. &hellip; Continue reading &quot;Monitoring disk space utilization growth\/increase with Operations Manager 2007&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2008-04-14T01:51:27+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Monitoring disk space utilization growth\\\/increase with Operations Manager 2007\",\"datePublished\":\"2008-04-14T01:51:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/\"},\"wordCount\":1134,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"opsmgr\",\"monitor\"],\"articleSection\":[\"OpsMgr\",\"Windows Server\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/\",\"name\":\"Monitoring disk space utilization growth\\\/increase with Operations Manager 2007 - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2008-04-14T01:51:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2008\\\/04\\\/14\\\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Monitoring disk space utilization growth\\\/increase with Operations Manager 2007\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitoring disk space utilization growth\/increase with Operations Manager 2007 - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/","og_locale":"en_US","og_type":"article","og_title":"Monitoring disk space utilization growth\/increase with Operations Manager 2007 - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"By default, Microsoft Operations Manager includes some monitors \/ rules that have the ability to monitor the disk utilization of system and\/or data disks of your servers (and clients). This is a really nice feature, however there may be reasons why this kind of monitoring would still leave you one step behind of your users. &hellip; Continue reading \"Monitoring disk space utilization growth\/increase with Operations Manager 2007\"","og_url":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2008-04-14T01:51:27+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Monitoring disk space utilization growth\/increase with Operations Manager 2007","datePublished":"2008-04-14T01:51:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/"},"wordCount":1134,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["opsmgr","monitor"],"articleSection":["OpsMgr","Windows Server"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/","url":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/","name":"Monitoring disk space utilization growth\/increase with Operations Manager 2007 - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2008-04-14T01:51:27+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2008\/04\/14\/monitoring-disk-space-utilization-growthincrease-with-operations-manager-2007\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Monitoring disk space utilization growth\/increase with Operations Manager 2007"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":6616,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/488\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}