Click OK to close the properties window.Click Yes to the Security warning dialog box.In the Permissions tab, click on Replace permissions entries on all child objects with entries shown here that apply to child objects.At the bottom of the Security tab, click on Advanced.Select Read & Execute from the Permissions box.Select the IUSR_ COMPUTERNAME from the list.Click OK to close the select users or groups window.Type in IUSR_ COMPUTERNAME or click Advanced.Right click on the folder C:Inetpubwwwrootcacti and select Properties.Both IUSR_ and IIS_WPG users will also need read permissions on C:Inetpubwwwrootcacti and its subfolders.Click on Read & Execute in the Permissions box.Right click on cmd.exe and select Properties.
For slightly improved security, one can specify a separate custom User account which would be used for the /This way, only a security vulnerability in Cacti's code could exploit cmd.exe and not all sites on the IIS server. Yes, this can be a large security hole, but it's required so RRDTool can be launched for graphing by the anonymous web account. Give the COMPUTERNAMEIUSR_ and COMPUTERNAMEIIS_WPG users Read & Execute permissions to the file C:Windowssystem32cmd.exe.It's up to the system admin to utilize Microsoft IIS, Apache, or something else. The MySQL database is an example of such a prerequisite.Ĭacti functions with any web server which utilizes PHP and MySQL. Most of the prerequisites that are already available on a Linux platform need to be installed on a Windows system. The installation of Cacti on a Windows system is quite different from Linux.