PATROL Internet Server Manager Technical Brief

Size: px
Start display at page:

Download "PATROL Internet Server Manager Technical Brief"

Transcription

1 PATROL Internet Server Manager Technical Brief

2

3 Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server Manager...3 Availability Monitoring...4 Performance Monitoring...5 Content Delivery Assurance...5 Advanced Monitoring and Administration...6 Web Server Log Monitoring...7 Integration with PATROL Site Monitor...7 Architecture of PATROL Internet Server Manager...8 Internet Client Library: XPC Server...8 Monitored Servers...9 Proxy Servers...9 DNS Servers: The Role of DNS Monitoring...9 Secured Servers...9 What Internet Server Administrators Need to Know...10 Are my Internet servers up and running right now?...10 What kind of response time are my servers providing? Is there a trend toward poorer response time that I should be concerned about?...11 How do increasing load rates affect my Web servers performance and availability?.. 11 What if I just don t have time to check for these errors on a regular basis?...12 I ve used tools in the past that tell me if my server process or service is up and running, but how can I tell me if my backend application servers and databases are doing what they are supposed to do?...12 If my mail servers get backlogged with messages and I don t clear out the queues quickly, my mail server goes down. How can I be proactive in this type of situation?.. 13 How can I monitor my Web server s content to find bad or broken links?...13 Helping you maintain advantage...13

4

5 Why Manage Web Applications? Companies deploy applications to the World Wide Web for two primary reasons. For many companies, the reason is strategic. Companies have transformed their businesses or built businesses around new models as a result of Internet technologies. These companies are using Web applications to drive new revenues. For others, Web applications are tactical in nature. Whether the purpose is to automate the customer-support function or to put expense reporting and the employee travel department online, the end goal is to lower costs through automation. In either case, if the Web applications are not functional or performing satisfactorily, the goal is not met. In the first case, the new business model fails if customers have a poor experience interacting with the company and choose to take their business elsewhere. In the latter case, the company does not achieve its Return of Investment (ROI) goals if employees or customers have a poor experience and choose not to use the Web application. Automation however, can cause companies to lose some of the richness of interactions with their customers. If they are not careful, they can lose touch with the quality of service they are providing. For example, in a grocery store, the manager can see when lines get too long and open another cash register to shorten the customer wait. Not monitoring the user experience of online applications would be analogous to that manager hiding in his office and counting receipts. He would have no understanding of the relationship between store revenues and the quality of service. To assure the performance and availability of Web applications, companies must deploy software to monitor and manage the servers from a software perspective, and also monitor the service they provide from a customer perspective. PATROL Internet Server Manager does this by monitoring key processes in the Internet infrastructure from DNS and mail to Microsoft Internet Information Server (IIS) and Apache. Also, PATROL Internet Server Manager monitors the quality of service these servers provide by connecting to them as users would and measuring response time and availability. What Is PATROL? PATROL is the recognized leader worldwide for automated administrative computing solutions. The PATROL Management Suite of products from BMC Software monitors and manages more applications, databases, middleware products, Internet applications and operating systems than any other solution on the market. PATROL shifts the administrative focus away from managing individual components, such as an application, database, or operating system, to an enterprise-wide view of the entire environment. PATROL operates using three main components: a PATROL Agent, PATROL Knowledge Module (KM), and a PATROL Console. Page 1

6 The PATROL Agent The PATROL Agent is a single process that is typically installed on all hosts that are managed by PATROL products. The PATROL Agent has the responsibility for managing all applications and resources that are known to it, and will do so without manual intervention. The PATROL Agent is both intelligent and autonomous. PATROL intelligence is the ability to have its knowledge updated while still resident in memory. That is, the agent does not need to be stopped and restarted to accept changes, additions, and deletions of information or knowledge. PATROL autonomy means that once instructed when, what, and how to do something, the PATROL Agent does not need to communicate outside of itself to get the task done. All configuration, parameters, thresholds, recovery actions, and events are stored locally in a binary file located in the PATROL directory tree. The PATROL Agent has an event management Application Program Interface (API) that is bidirectional. Events can be inserted into the agent and passed from it to other console environments, such as third-party alerting systems. Also, the PATROL Agent has the ability to communicate with any SNMP-based framework through its SNMP API. PATROL Knowledge Modules Knowledge Modules (KMs) are individual groups of knowledge libraries that contain information about a system or application that the PATROL Agent is managing. A KM is essentially a wrapper around some specific application or system resource that will be managed. Individual tasks within a KM are typically application routines, compiled programs, operating system commands, and PATROL Scripting Language (PSL) scripts. It is the PATROL Knowledge Modules that send the PATROL Agent its instructions and make it capable of managing diverse environments. As their name suggests, KMs are modular in nature, and the number and types of KMs that are loaded on an agent depend upon what services and applications you wants to manage on the system of interest. The loaded KMs provide the PATROL Agent the ability to automatically discover and manage all of the known applications, databases, and system components on the server. The agent continuously gathers information and statistics from the KMs and, when indicated, it executes a set of recovery actions. Recovery actions attempt to correct a problem, notify someone who can, or produce supporting reports that help operators to decide how to solve the problem. The PATROL Console The PATROL Console graphically depicts all applications, databases, middleware, and messaging systems, and the underlying resources that are monitored by PATROL. Page 2

7 The information and statistics gathered by the PATROL Agent are displayed on the PATROL Console in the form of alerts, graphs, and reports. The PATROL Agent can also accept requests from one or more consoles, initiate actions based on those requests, and it can do so without connecting to a console PATROL Console diagram The PATROL Console does not poll for events, but instead communicates with the PATROL Agent through the PATROL API. The PATROL Agent knows which connected consoles are registered for which events. PATROL Internet Server Manager PATROL Internet Server Manager provides Web server administrators and other systems administrators with a single tool that can monitor and manage all of the major types of Internet servers. When installed on an applicable system, the product discovers and monitors all Internet servers present on that system. Also, you can install PATROL Internet Server Manager onto a dedicated system in the network from which it can monitor a number of important Internet servers in the company from one central point. Out of the box, PATROL Internet Server Manager monitors all important performance metrics of discovered servers. As you progress in your management needs, you can easily configure the product to produce deeper usage statistics and perform automated recovery actions. PATROL Internet Server Manager supports all of the popular Unix operating systems on the market today, including Linux and Enterprise Linux for the IBM z/series mainframe. The product also supports Microsoft Windows NT and Windows 2000 servers. With PATROL Internet Server Manager you do not need different monitoring tools for the many Page 3

8 different servers in your heterogeneous environment leverage the BMC Software experience in operating systems and use this one product for all of your Internet management needs. Availability Monitoring PATROL Internet Server Manager monitors the availability of most major Internet server types. The Internet server protocols supported by PATROL Internet Server Manager are listed in the following table: Supported Internet servers and protocols Supported Server Type Web servers Secured Web servers Proxy servers FTP servers Domain Name Servers Mail servers Directory servers News and collaboration servers Chat and messaging servers Supported Protocol HTTP HTTPS HTTP and HTTPS FTP DNS SMTP, IMAP and POP3 LDAP NNTP IRC PATROL Internet Server Manager monitors the Internet servers and protocols by simulating a user accessing your site. The product connects to the monitored server using the server s native protocol, and then makes a request in the same manner as a standard client would. This ensures that the results of PATROL Internet Server Manager s monitoring always reflect actual availability of Internet servers as experienced by your users. For the supported servers listed in the preceding table, PATROL Internet Server Manager maintains several critical data parameters that allow you to quickly determine the current availability of your servers. When this product is used in combination with the PATROL Console or another similar tool, you can quickly analyze historical data on availability, which can indicate times of the day or week when failures occur or when service level agreements are not met. For each server that you monitor (locally or remotely) the product reports: Page 4

9 server status One stoplight-style icon provides current server availability information. server downtime This information tells you how long your server has been down so that you can track time to repair. server status code For most server types, the product reports the actual response codes returned from the monitored server, allowing you to customize recovery actions or automated notifications in a way that makes sense for your application. Performance Monitoring PATROL Internet Server Manager collects and reports the response time for all of the requests it sends to the local or remote monitored servers. The collected data is stored in the PATROL Agent history database, giving you the ability to examine how response time varies by the time of day or week and enabling you to determine whether you are meeting your service level agreements for a monitored server. Content Delivery Assurance PATROL Internet Server Manager offers an expanded depth of capabilities when monitoring your local or remote Web servers. In addition to monitoring the Web server response time and returned status code, you can configure the product to look for text patterns in the page and generate an alert if they are not present. As an alternative, you can configure the product to generate an alert if certain text is present within a returned page (such as ODBC Error ). To facilitate content delivery assurance with PATROL Internet Server Manager, you can create advanced queries that make up transactions to be tested against your local or remote Web server. You can accept and reuse cookies, post form data, and perform Web server authentication to simulate as closely as possible the actual paths that your customers take while they are working with your site. Because most Web sites consist of more than just a Web server there are usually application servers creating the content and middleware providing database connectivity, sometimes all the way back to the mainframe it is important to have a means of verifying the end-to-end availability of the interconnected components. The content checking capability of PATROL Internet Server Manager is a simple way to verify this end-to-end connectivity. By using the URL monitoring feature to make a query by posting data to a form on a Web page, you can verify the content of the returned page to ensure that the query worked as you expected. If the appropriate content is found, then you have just validated a roundtrip transaction all the way to the database. Not only did the Web server return a page in a Page 5

10 measured number of milliseconds, but it connected to the application server, back to the database, and it pulled the requested record, verifying end-to-end availability of the application. How many times have you encountered a SQL Error while working through a Web site on the Internet? You can configure PATROL Internet Server Manager to alert you or your database administrator (or both) when the Web server returns this particular content. Or suppose you are experiencing network issues and not all Web server data is making it to your clients. For example, the HTML pages end prematurely. You can configure the KM to look for a final footer segment that customers will see only when the complete page is delivered. If Internet Server Manager does not see this content, then you will be alerted to this failure. Advanced Monitoring and Administration PATROL Internet Server Manager offers additional monitoring and administration capabilities for a subset of the server types that it supports. Web Servers Enable PATROL Internet Server Manager s Web server log monitoring to learn detailed information about the traffic to your site, then correlate this information with response time and availability data to predict how your Web site will perform in the future. For more information, see Web Server Log Monitoring. Configure PATROL Internet Server Manager to monitor your SSL servers and to alert you before your certificates expire. Unix Sendmail PATROL Internet Server Manager can keep track of the message rates your mail server processes. Use this data with your response time and availability data to understand future capabilities of your server. Keep track of active and deferred messages in your mail queues; let PATROL Internet Server Manager alert you before these queues reach levels that lead to mail server outages. Track messages being relayed to other queuing servers. Domain Name Servers (DNS) PATROL Internet Server Manager can track of the request rates for five types of DNS requests, letting you plan future DNS server deployments. Note This applies only to BIND 4.x and 8.x on Unix. Configure the product to make user-defined DNS requests on a regular basis, then check the results for appropriateness of content and time-to-response. For more information see, DNS Servers: The Role of DNS Monitoring. Page 6

11 FTP Servers Configure PATROL Internet Server Manager to log on to your FTP server so that you can catch problems not seen by only checking for service availability or port scan response. Web Server Log Monitoring Sometimes knowing that your Web site has failed or is not responding rapidly is not sufficient; you want to know about the problems your customers are experiencing before they cause outages to your servers. Using PATROL Internet Server Manager to monitor your Web server s access logs, you can see when users encounter errors such as the unavoidable 500 Server Error or 404 Page Not Found. You can examine the results of Web server log monitoring in concert with availability and performance monitoring to identify actual causes of service failures, and you can often ascertain exactly which users were affected by these failures. PATROL Internet Server Manager automatically collects statistical data for common errors when you choose to activate the product s Web server log monitoring capabilities. You can also create your own expressions to detect other specific patterns in the access log, such as particular client IP addresses or certain types of URL requests. Each of the search patterns that you provide and each one that is offered out-of-the-box is called a statistic set. Each statistic set has a group of parameters that tabulate the rate (requests per second, minute, or hour), the peak rate, and the number of times a log file entry matched the search pattern. Using the agent history database provided with PATROL Agent, you can review this data at any time to analyze past performance. The product also keeps important real-time data on the top N occurrences of each statistic set. You can track up to 100 real-time instances. With top N reporting you can see the most popular pages users are accessing see the clients who are accessing your site the most track the Web browsers used to access your sites see what the current experience of 404 or 500 (or other user-defined) errors is on your site. You can use this feature to determine which pages are causing these failures and to take quick corrective action. Integration with PATROL Site Monitor Because you typically have more than one Web server that makes up your Internet site, PATROL Internet Server Manager offers you the capability to see management data from multiple servers together in a site view by using the PATROL Site Monitor component. PATROL Site Monitor takes data from the various PATROL Internet Server Manager installations in your environment and categorizes this data in a domain view. For example, Page 7

12 if your company s external Web site ( is actually a farm of five Web servers, you can see composite domain-level data with PATROL Site Monitor. With this view, you can gain a quick understanding of how your site is performing and the availability status of your site as a whole, while being able to quickly identify individual problem spots. Architecture of PATROL Internet Server Manager PATROL Internet Server Manager acts as a normal Internet client while performing its monitoring. This ensures that the information provided to you by the product most closely reflects the actual experience of your users. PATROL Internet Server Manager uses an Internet client library called an XPC server. XPC (External Program Call) is the way the PATROL Agent communicates with external programs. Internet Client Library: XPC Server The following graphic illustrates the architecture of PATROL Internet Server Manager with respect to monitoring local and remote Internet servers. The XPC server is a process that runs persistently on your system waiting for requests from the PATROL Agent. These requests are initiated by PSL processes, which form the backbone of all PATROL monitoring. The PSL processes tell the XPC server to request an Internet resource and wait for the response. The XPC server makes an actual client connection to the monitored resource and returns the raw data from the monitored server. The PSL process then interprets this data and posts the results into the PATROL Agent namespace. You then use a PATROL Console or other event manager to access these results. Internet client library architecture Web Server KM Instance PSL Process Mail Server KM Instance DNS Server KM Instance PATROL Agent XPC Server Client.xpc NT or Unix Process HTTP(S) SMTP DNS Web Server Mail Server DNS Server PSL Process PSL Process Page 8

13 Monitored Servers Because PATROL Internet Server Manager acts just as a normal Internet client would, the product can monitor any type of server that adheres to the standard protocol for that server type. If all you need is response time and availability information from these servers, you can take advantage of PATROL Internet Server Manager s lightweight XPC server to monitor many different servers on your network from a single management node. This mode of operation can offer quicker time to value, because you have to install the product on only one system. Proxy Servers PATROL Internet Server Manager operates seamlessly in your existing environment, using proxy servers where necessary to give you the greatest possible flexibility in remote monitoring. When you configure the product to monitor a remote host, you have the option of routing the request through a proxy server, including adding a user name and password for authentication. PATROL Internet Server Manager also monitors proxy servers directly. You can install the product on the proxy server itself to take advantage of recovery actions such as automated restart, or you can monitor the proxy server remotely. DNS Servers: The Role of DNS Monitoring PATROL Internet Server Manager offers monitoring capabilities that enable DNS administrators to manage their DNS servers at a very granular level. Also, PATROL Internet Server Manager automatically monitors any DNS servers your Web server is configured to use. All Internet servers depend on Domain Name Service lookups for various tasks. For example, your Web server may contact database servers or Web application servers residing inside your firewall to service user requests. You will want to make sure these DNS lookups are responding appropriately and in a timely fashion. You can also create specific queries to perform against specific DNS servers, so you can tailor your monitoring to make sure the queries you need are responding correctly, with the proper content. Secured Servers PATROL Internet Server Manager can communicate with your secured Web servers by using the same SSL technology as your users Web browsers. The product supports the latest encryption levels, including 128-bit encryption, subject to export restrictions. This product also reports the number of valid days remaining on your SSL server s certificate, Page 9

14 warning you when the expiration date approaches. This will help you prevent the costly embarrassment of an expired SSL certificate when users attempt to access an application on your secure Web server. What Internet Server Administrators Need to Know The questions that follow are often asked by those responsible for Internet servers on a daily basis and these are questions that PATROL Internet Server Manager can help you answer. Some of the questions are followed by a list of parameters, in the product, that provide the needed information.with these parameters, you can view current, real-time status or you can use the PATROL Agent history to view past data. Use the PATROL Console to plot the data points from multiple data sources into a single graph, enabling you to gain a quick comprehensive understanding of the health of your servers. Are my Internet servers up and running right now? Use PATROL Internet Server Manager Status Parameters Relevant product parameters: httpstatus nntpstatus imapstatus smtpstatus pop3status ldapstatus dnsstatus ftpstatus ircstatus Think of these parameters as your one-stop shop when you need to understand whether specific Internet servers are up and running. You can examine this data at the server level in PATROL Internet Server Manager, or at the site level with PATROL Site Monitor. When viewed in the PATROL Console, these parameters appear as stoplights, giving you a quick visual understanding of your site s status. This data also triggers exception events that allow for lights-out management when used with PATROL Enterprise Manager or other event management consoles. Page 10

15 What kind of response time are my servers providing? Is there a trend toward poorer response time that I should be concerned about? Use PATROL Internet Server Manager Response-time Parameters Relevant product parameters: httpresponsetime nntpresponsetime imapresponsetime smtpresponsetime pop3responsetime ldapresponsetime dnsresponsetime ftpresponsetime ircresponsetime These parameters give you a highly granular view of response-time measurements for your monitored servers. Because PATROL Internet Server Manager monitors your servers by making actual connections to them in the same way as your customers do, the data reported here is of the utmost value to you in understanding customer experience. Since the data is measured and reported to you in milliseconds, you can detect minute differences in response time trends. You also will be able to compare response-times of individual servers that make up a server farm, adjusting the performance of those servers that need it until all servers are performing optimally. How do increasing load rates affect my Web servers performance and availability? Correlate the status and response-time parameters listed above with the data reported by the Web server log monitoring components. As a Web server administrator, your primary job is not to respond to and correct Web server failures, but to prevent Web server failures. Because PATROL Internet Server Manager collects performance and availability data for your servers both from the client perspective and by analyzing log files, you can match trends in server response time with trends in server load. For example, you can place the httpresponsetime parameter for one of your Web servers into the same graph as the requestratepermin (per-minute rate of requests processed by the Web server) parameter to see how increasing loads on your Web server affect overall customer experience in response-time changes. Using the PATROL Agent history, you can examine historical data to predict how increased load over time will affect server response. Use this data to plan new Web server deployments so that you will not be caught off-guard by unexpected performance problems. Page 11

16 What if I just don t have time to check for these errors on a regular basis? Activate PATROL Internet Server Manager s Web Server Error Log Reporting As a busy Web server administrator in charge of dozens of Web servers you do not have the time to check each one for error messages that can indicate problems that might occur in the future. Set up PATROL Internet Server Manager s Web server error log reporting to alert you when error conditions of your definition occur, immediately as they occur. This product is preconfigured to understand the typical error events that can occur with Netscape/iPlanet and Apache servers, so in most cases you will not need to configure the product to activate this real-time monitoring. In many customer environments you may be aware of specific non-standard error messages that eventually lead to outages at your site. With PATROL Internet Server Manager, you can easily configure the product to look for your choice of these errors and to alert you when they occur. You can view this information in the PATROL Console or use the product s event triggers to alert operations staff as these critical errors occur. I ve used tools in the past that tell me if my server process or service is up and running, but how can I tell me if my backend application servers and databases are doing what they are supposed to do? Use PATROL Internet Server Manager s Web Server Content Checking Features When it s not enough to know if your server is responding to basic client requests, configure PATROL Internet Server Manager to monitor those pages on your site that require dynamic content from an application server or database. Then configure the product to look for specific text or text patterns that must or must not be found in the final response. For example, you can tell the product to look for the phrase ODBC error and to alarm when this condition occurs. Without this type of monitoring, you may not be aware of these failures until one of your customers calls you to complain, and then it is too late the damage to your reputation is done. With PATROL Internet Server Manager, you can learn of these problems before they affect a wide number of your end users. Page 12

17 If my mail servers get backlogged with messages and I don t clear out the queues quickly, my mail server goes down. How can I be proactive in this type of situation? Monitor your mail server s queue depth PATROL Internet Server Manager can examine the message queue for your Sendmailbased mail servers and regularly report to you the number of active and deferred messages in the queue. You decide the acceptable level of queued messages for your environment and then let PATROL Internet Server Manager notify you when these levels are reached. In this way, you can take corrective action on your queues before your mail servers fail and users call you to complain. If your internal mail server receives messages for another mail server that is prone to failures in your site, you can configure PATROL Internet Server Manager to report the number of deferred messages bound for that troublesome queue on a regular basis. Using the PATROL Agent s history and reporting capabilities, you can gain a quick understanding of how many messages are processed for that remote mail server. How can I monitor my Web server s content to find bad or broken links? Use PATROL Internet Server Manager Web Server Link Checking Features You can configure the link checking capability of PATROL Internet Server Manager to traverse some or all links on the designated Web site and report which links are bad. Helping you maintain advantage BMC Software Professional Services helps your company maintain its competitive advantage through a comprehensive suite of services that includes service level management consulting, installation, implementation, configuration, and customization. Our professional services and education offerings are designed to ensure the ongoing availability of critical business applications, maximize product potential, reduce project risk, deliver IT value to your business, and improve your operations. For more information about BMC Software Professional Services, visit Page 13

18 About BMC Software BMC Software, Inc. [NYSE: BMC], is the leading provider of enterprise management solutions. The company focuses on Assuring Business Availability for its customers by helping them proactively improve service, reduce costs and increase value to their business. BMC Software solutions span enterprise systems, applications and databases. Founded in 1980, BMC Software has offices worldwide and is a member of the S&P 500, with fiscal year 2002 revenues of approximately $1.3 billion. Visit to learn more. Page 14

19 For more information visit BMC Software on the Web at BMC Software, the BMC Software logos and all other BMC Software product or service names are registered trademarks or trademarks of BMC Software, Inc. All other registered trademarks or trademarks belong to their respective companies. Copyright 2002, BMC Software, Inc. All rights reserved. August 30,

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

WHITE PAPER September 2012. CA Nimsoft Monitor for Servers

WHITE PAPER September 2012. CA Nimsoft Monitor for Servers WHITE PAPER September 2012 CA Nimsoft Monitor for Servers Table of Contents CA Nimsoft Monitor for servers 3 solution overview CA Nimsoft Monitor service-centric 5 server monitoring CA Nimsoft Monitor

More information

Active Directory Monitoring With PATROL

Active Directory Monitoring With PATROL Active Directory Monitoring With PATROL Contents What is Active Directory?...1 Why Monitor?...1 Active Directory and PATROL...2 Critical Active Directory Components to Monitor...3 Address Book...3 Domain

More information

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business Protect your business Enterprise Monitoring, Notification & Reporting Services echomountain 1483 Patriot Blvd Glenview, IL 60026 877.311.1980 sales@echomountain.com echomountain Enterprise Monitoring,

More information

MSP End User. Version 3.0. Technical Solution Guide

MSP End User. Version 3.0. Technical Solution Guide MSP End User Version 3.0 Technical Solution Guide N-Compass Remote Networking Monitoring Architecture How Does N-Compass Help Small & Medium Businesses? Proactive IT management The ability to do predictive

More information

Installation Guide NetIQ AppManager

Installation Guide NetIQ AppManager Installation Guide NetIQ AppManager April 2016 www.netiq.com/documentation Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.

More information

IBM Tivoli Monitoring for Network Performance

IBM Tivoli Monitoring for Network Performance Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination

More information

Monitoring Microsoft Exchange to Improve Performance and Availability

Monitoring Microsoft Exchange to Improve Performance and Availability Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool

MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool TECHNOLOGY DETAIL MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool INTRODUCTION Storage system monitoring is a fundamental task for a storage administrator.

More information

WHITE PAPER. Best Practices for Configuring PATROL for Microsoft Exchange Servers

WHITE PAPER. Best Practices for Configuring PATROL for Microsoft Exchange Servers WHITE PAPER Best Practices for Configuring PATROL for Microsoft Exchange Servers Contents INTRODUCTION..................................................... 3 PATROL SECURITY....................................................

More information

IBM Tivoli Monitoring for Applications

IBM Tivoli Monitoring for Applications Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture

Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager Best Practices and Reference Architecture WHITE PAPER Table of Contents Introduction.... 1 Why monitor PlateSpin Protect

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012 Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

HP-UX 11i software deployment and configuration tools

HP-UX 11i software deployment and configuration tools HP-UX 11i software deployment and configuration tools Simplifying management of servers in a virtualized environment Introduction... 2 Simplifying management in dynamic, virtualized environments... 2 HP-UX

More information

Firewall Builder Architecture Overview

Firewall Builder Architecture Overview Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

How to Migrate to MailEnable using the Migration Console

How to Migrate to MailEnable using the Migration Console How to Migrate to MailEnable using the Migration Console Contents 1. OVERVIEW... 2 2. MAILENABLE MIGRATION CONSOLE... 2 3. SELECT THE MIGRATION APPROACH... 2 Server Migration... 2 Domain Migration... 3

More information

Diagnostic Manager. User Guide. Publication Date: September 04, 2015

Diagnostic Manager. User Guide. Publication Date: September 04, 2015 Diagnostic Manager Publication Date: September 04, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,

More information

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236. Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed

More information

Monitoring can be as simple as waiting

Monitoring can be as simple as waiting Proactive monitoring for dynamic virtualized environments By David Weber and Veronique Delarue Virtualization can significantly increase monitoring complexity. By using BMC ProactiveNet Performance Management,

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

WEB SERVER MONITORING SORIN POPA

WEB SERVER MONITORING SORIN POPA WEB SERVER MONITORING SORIN POPA Keywords: monitoring systems, web server, monitoring process Sorin POPA, Associate Professor, PhD. University of Craiova Abstract. This paper introduces web-server monitoring,

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

CSS ONEVIEW G-Cloud CA Nimsoft Monitoring

CSS ONEVIEW G-Cloud CA Nimsoft Monitoring CSS ONEVIEW G-Cloud CA Nimsoft Monitoring Service Definition 01/04/2014 CSS Delivers Contents Contents... 2 Executive Summary... 3 Document Audience... 3 Document Scope... 3 Information Assurance:... 3

More information

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0 GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8

More information

Application Performance Monitoring for WhatsUp Gold v16.1 User Guide

Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Contents Table of Contents Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application

More information

Ensure Continuous Availability and Real-Time Monitoring of your HP NonStop Systems with ESQ Automated Operator

Ensure Continuous Availability and Real-Time Monitoring of your HP NonStop Systems with ESQ Automated Operator Ensure Continuous Availability and Real-Time Monitoring of your HP NonStop Systems with ESQ Automated Operator Open networks and connectivity give rise to increasingly complex environments and growing

More information

Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world!

Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world! + Welcome to The Sentry-go Monitoring System v6 Monitoring made quick & easy! Be Proactive, Not Reactive! 3Ds (UK) Limited http://www.sentry-go.com Welcome to Sentry-go Sentry-go is a quick & easy to use

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

VERITAS Cluster Server Traffic Director Option. Product Overview

VERITAS Cluster Server Traffic Director Option. Product Overview VERITAS Cluster Server Traffic Director Option Product Overview V E R I T A S W H I T E P A P E R Table of Contents Traffic Director Option for VERITAS Cluster Server Overview.............................................1

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

Red Hat Network: Monitoring Module Overview

Red Hat Network: Monitoring Module Overview Red Hat Network: Monitoring Module Overview Red Hat has built the next generation of systems management software presenting both highgrowth businesses and service providers with a simple, scalable and

More information

Controlling Web Access with BMC Web Access Manager WHITE PAPER

Controlling Web Access with BMC Web Access Manager WHITE PAPER Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker White Paper Publication Date: June 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Overview EventTracker

More information

Application Performance Monitoring for WhatsUp Gold v16.2 User Guide

Application Performance Monitoring for WhatsUp Gold v16.2 User Guide Application Performance Monitoring for WhatsUp Gold v16.2 User Guide C o n t e n t s CHAPTER 1 Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

CA Workload Automation Agents for Mainframe-Hosted Implementations

CA Workload Automation Agents for Mainframe-Hosted Implementations PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents for Mainframe-Hosted Operating Systems, ERP, Database, Application Services and Web Services CA Workload Automation Agents are

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities

More information

FileMaker Server 13. Getting Started Guide

FileMaker Server 13. Getting Started Guide FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended

More information

WHITE PAPER. Domo Advanced Architecture

WHITE PAPER. Domo Advanced Architecture WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Application Performance Management for Enterprise Applications

Application Performance Management for Enterprise Applications Application Performance Management for Enterprise Applications White Paper from ManageEngine Web: Email: appmanager-support@manageengine.com Table of Contents 1. Introduction 2. Types of applications used

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Microsoft Lync Server 2010

Microsoft Lync Server 2010 Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Borland Silk Performer Synthetic Transaction Monitoring for BMC Software

Borland Silk Performer Synthetic Transaction Monitoring for BMC Software DATASHEET Borland Silk Performer Synthetic Transaction Monitoring for BMC Software Proactively detect and quickly solve user-impacting business transactions issues before they negatively impact business

More information

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions. Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Insight Inquire Symantec i 3 Application Availability and Performance Management Solution

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Insight Inquire Symantec i 3 Application Availability and Performance Management Solution WHITE PAPER: ENTERPRISE SOLUTIONS Symantec Insight Inquire Symantec i 3 Application Availability and Performance Management Solution Formerly Veritas i 3 Insight Inquire White Paper: Symantec Enterprise

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

SapphireIMS 4.0 BSM Feature Specification

SapphireIMS 4.0 BSM Feature Specification SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Configuring Failover

Configuring Failover Configuring Failover 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Detailed Revision History: Advanced Internet System Management (v5.07)

Detailed Revision History: Advanced Internet System Management (v5.07) Detailed Revision History 1 Detailed Revision History: Advanced Internet System Management (v5.07) This detailed revision history document identifies the differences in Advanced Internet System Management

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

hp OpenView internet services 4.5

hp OpenView internet services 4.5 hp OpenView internet services 4.5 product brief meet compelling business needs More than ever, companies are conducting business using the Internet or an intranet. Service providers offer Internet access

More information

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking Track transactions end to end across your enterprise to drive fast response times and help maintain high customer satisfaction IBM Tivoli Composite Application Manager for Response Time Tracking Highlights

More information

User Guide Secure Configuration Manager

User Guide Secure Configuration Manager User Guide Secure Configuration Manager January 2015 www.netiq.com/documentation Legal Notice NetIQ Secure Configuration Manager is protected by United States Patent No(s): 5829001, 7707183. THIS DOCUMENT

More information

SapphireIMS Business Service Monitoring Feature Specification

SapphireIMS Business Service Monitoring Feature Specification SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission

More information

User-ID Best Practices

User-ID Best Practices User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers

More information

Version 14.0. Overview. Business value

Version 14.0. Overview. Business value PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Exporting IBM i Data to Syslog

Exporting IBM i Data to Syslog Exporting IBM i Data to Syslog A White Paper from Safestone Technologies By Nick Blattner, System Engineer www.safestone.com Contents Overview... 2 Safestone... 2 SIEM consoles... 2 Parts and Pieces...

More information

User Identification (User-ID) Tips and Best Practices

User Identification (User-ID) Tips and Best Practices User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using

More information

IBM Tivoli Composite Application Manager for WebSphere

IBM Tivoli Composite Application Manager for WebSphere Meet the challenges of managing composite applications IBM Tivoli Composite Application Manager for WebSphere Highlights Simplify management throughout the life cycle of complex IBM WebSphere-based J2EE

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Operations Center 5.0 March 3, 2014 Legal Notices THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information