Monitoring a SharePoint 2010 Environment : Using SharePoint’s Native Reporting Capabilities

2/22/2011 9:08:36 AM
Out-of-the-box, SharePoint 2010 gives administrators access to a default set of reports, some of which are shown in Figure 1, that can analyze traffic patterns or perform diagnostics on an environment.
Figure 1. Examining SharePoint 2010 reports.

The default set of reports can also be extended by third-party utilities or with custom created reports. In addition, SharePoint administrators can customize individual reports to fit their own specific needs.


SharePoint reporting can be further extended using SQL Server Reporting Services running in SharePoint Integration Mode.

Reviewing and Creating Reports

You can view and modify individual reports from the Reporting area of the Monitoring page in the SharePoint Central Admin tool, as shown in Figure 2. From this launching point, a SharePoint administrator can view and modify the settings for administrative reports, diagnostic logs, information management policy usage reports, health reports, usage and health data collection, and web analytics reports.

Figure 2. Viewing the Monitoring page in the SharePoint Central Admin tool.

Reports such as the one shown in Figure 3 can give useful information about a site and its usage and can be instrumental in troubleshooting and monitoring a SharePoint farm.

Figure 3. Viewing a SharePoint 2010 report.

Optimizing Usage Data Collection Log Settings

By default, usage data collection logs, which are used to analyze traffic patterns on SharePoint sites, are stored on the default system volume with the rest of the SharePoint data. Because these files can grow quite large, it is recommended to move them to their own volume or limit their growth. To modify these settings for the farm, click the Configure Usage and Health Data Collection link under the Monitoring section of SharePoint Central Admin, and modify the settings, as shown in Figure 4.

Figure 4. Modifying the usage data collection log location.


The location for the usage collection logs must exist on all SharePoint servers in the farm. This note applies to any other log location setting defined, because these settings apply to every server within the farm.

Modifying Diagnostic Log Settings

Diagnostic logs can be used to determine if there are issues with individual services in SharePoint 2010. Logging for individual services can be turned on or off in the Diagnostic Logging dialog box, as shown in Figure 5.

Figure 5. Viewing diagnostic log settings.

Other settings for diagnostic logs, including which drive the trace files are stored on and how large they can grow, can be modified from this same page, as shown in Figure 6. It is highly recommended to control the growth of trace files, because they can grow large very quickly. In general, enable only those diagnostic files that you need to avoid growing out of control, and it is good practice to change the location that they are written to something other than the system drive where SharePoint is installed.

Figure 6. Modifying the Trace Log default location.

  •  Designing and Implementing Mobility in Exchange Server 2010: Securing Access to ActiveSync with Secure Sockets Layer Encryption
  •  Enabling ActiveSync in Exchange Server 2010
  •  Understanding Mobility Enhancements in Exchange Server 2010
  •  Monitoring a SharePoint 2010 Environment : Using the SharePoint Health Analyzer
  •  Using SharePoint 2010 Management PowerShell for Backup and Restore
  •  Restoring SharePoint Using SharePoint Central Administration
  •  Windows Azure : Static reference data (part 2) - Performance disadvantages of a chatty interface & Caching static data
  •  Windows Azure : Static reference data (part 1) - Representing simple static data in SQL Azure & Representing simple static data in the Table service
  •  Performing Granular Backup Using the SharePoint Central Administration
  •  Using SharePoint Central Administration for Backup and Restore
  •  Backing Up and Restoring a SharePoint Environment : Using the Recycle Bin for Recovery
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Understanding Other Non-Windows Client Access Methods
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Remote Desktop Connection Client for Mac
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Configuring and Implementing Entourage for the Mac
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Mac Mail, iCal, and Address Book
  •  Parallel Programming with Microsoft .Net : Futures - Variations
  •  Parallel Programming with Microsoft .Net : Futures - Example: The Adatum Financial Dashboard
  •  Parallel Programming with Microsoft .Net : Futures - The Basics
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Outlook Express
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Understanding Non-Windows–Based Mail Client Options
    Top 10
    Sony STR-DN1030 – Home Cinema Amplifier
    Spotflux - Enjoy The Privilege Of A US Based IP Address
    Sony KDL-26EX553 – LCD Television
    Protecting Me
    Do Top Twitter Tips
    Canon PowerShot SX240 HS - A Powerful Perfection
    Fujifilm X-Pro1 : Mechanical dials are everywhere
    Sony NEX-F3 Review (Part 3)
    Sony NEX-F3 Review (Part 2)
    Sony NEX-F3 Review (Part 1)
    Most View
    How to beat 2012’s web threats (Part 1)
    Magix Photo Story On DVD MX Deluxe
    2012 Make It Worth ( Part 1)
    Ultrabook vs MacBook (Part 2)
    Programming .NET Security : Asymmetric Encryption Explained (part 1) - Creating Asymmetric Keys
    Windows 7 : Managing and Applying LGPOs (part 3) - Using Local Policies
    Exchange Server 2010 server roles (part 3) - Edge Transport Server role
    Olympus Launches OM-D E-M5
    Microsoft SQL Server 2005 : Report Definition and Design (part 3)
    Will Apple Be The Next Big Name in Gaming? (Part 3)
    IIS 7.0 : Managing Application Pools (part 3) - Advanced Application Pool Configuration, Monitoring Application Pool Recycling Events
    Cloud Application Architectures : Database Management
    Web Security : Seeking Design Flaws - Bypassing Required Navigation, Attempting Privileged Operations
    The best browser hacks (part 1) - Mozilla Firefox
    SharePoint 2010 : Operations Management with the SharePoint Central Administration Tool (part 4) - Reviewing Backup and Restore Settings in SPCA
    SQL Server 2008 : Using the CLR - CLR and Managed Code Explained
    Rollout Strategy in Group Policy of Windows Vista
    Reporting Services with SQL Azure : Deploying the Report & Creating a Subreport
    Vigor 2850n
    The Best Computers You're (Probably) Never Heard Of (Part 2) - Tatung Einstein, Camputers Lynx