Specify Level of Detail in the NAP Tracing Log

Applies To: Windows 7, Windows 8, Windows 8.1, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

Specifying the detail that is recorded in the NAP trace log

  • Using the Windows interface

  • Using a command line

To specify the detail that is recorded in the NAP trace log by using the Windows interface

  1. To open the NAP Client Configuration console, click Start , click All Programs , click Accessories , click Run , type NAPCLCFG.MSC , and then click OK .

  2. Right-click NAP Client Configuration(Local Computer) , and then click Properties .

  3. In the NAP Client Configuration(Local Computer) Properties dialog box, confirm that Enabled is selected.

  4. Under Specify the level of detail at which the tracing logs are written , select Basic , Advanced , or Debug .

Additional considerations

  • To perform this procedure, you must be a member of the Administrators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.

To specify the detail that is recorded in the NAP trace log by using a command line

  1. To open a command prompt, click Start , click All Programs , click Accessories , and then click Command Prompt .

  2. To configure NAP tracing, do one of the following:

    1. To configure NAP tracing so that basic information is recorded, type: netsh nap client set tracing state = enable level = basic

    2. To configure NAP tracing so that advanced information is recorded, type: netsh nap client set tracing state = enable level = advanced

    3. To configure NAP tracing so that debug information is recorded, type: netsh nap client set tracing state = enable level = verbose

Additional considerations

  • To perform this procedure, you must be a member of the Administrators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.

Additional references