ProactiveWatch System Administrators Guide

Size: px
Start display at page:

Download "ProactiveWatch System Administrators Guide"

Transcription

1 ProactiveWatch System Administrators Guide 2012 ProactiveWatch, Inc. All Rights Reserved. V120323

2 Table of Contents Table of Contents 1 I. ProactiveWatch Technical Architecture 1 II. Installing ProactiveWatch 2 Installing and Accessing the ProactiveWatch Explorer 2 III. Cancelling a Customer 3 IV. Operating the ProactiveWatch Explorer 3 Customizing the Explorer to Display (Only) What You Want To See 4 Customer Views 4 Customizing the Columns Displayed in the Grid View 5 Adding or Changing Grouping 6 The Alarms View Working Alarms 7 The Alarm History 8 The Work Alarms Screen 9 V. Monitoring Templates How To Change and Add Monitoring Functionality _ 10 Monitors in Base Templates, Add-On Templates and Extensions 11 Changing the Monitoring Settings in a Template 12 Assigning Monitoring Templates to Workstations, Servers and Network Devices 13 VI. Default ProactiveWatch Monitoring Templates and Features 14 Differences in Monitors between Agent Types 14 How the Default Monitors Work in ProactiveWatch 15 VII. Default (Out-of-the-Box) Network Device Monitoring 16 VIII. Optional Monitors in ProactiveWatch 17 IX. Monitoring Extensions 19 Displaying Extension Monitor Status in the Explorer Grid View 20 Customizing and Configuring Extensions 22 MS Exchange Extension Configuration and Monitoring Details 23 MS Update Extension Configuration and Monitoring Details 26 Symantec Anti-Virus Extension Configuration and Monitoring Details 27 Symantec Backup Exec Extension Configuration and Monitoring Details 28 X. Managing Alarms in ProactiveWatch 29 Exclusions in Manage Alarms 30 Marked As Normal in Manage Alarms 30

3 XI. Notification Rules 32 XII. Analytical Tools in the ProactiveWatch Explorer 33 Show Issues 33 View Metrics 33 Creating a Time and Date Based Snapshot 34 System Compare 35 Application Compare 35 Event Log Analyzer 36 Distribution Graph 36 Trend Graph 37 Multi-User Impact Analysis 37 XIII. Updating Agents and Gateways to Future Versions 38 XIV. Integration with LogMeIn IT Reach and the LogMeIn Network Console 39 XV. Using A Different Remote Control Method than LogMeIN 41 XVI. Autotask Integration 42 Configuring Autotask 42 Configuring ProactiveWatch 44 XVII. The ProactiveWatch Mobile Web Console 46 XVIII. About ProactiveWatch 47

4 I. ProactiveWatch Technical Architecture The technical architecture of the ProactiveWatch system is shown in the image below. The architecture of the system has several key components: 1. ProactiveWatch hosts the back end applications servers and database servers. You do not need to buy any licensed software from ProactiveWatch, nor do you need to procure or maintain any Windows or Database server licenses or hardware to support the ProactiveWatch system. 2. For the purposes of monitoring servers and workstations, ProactiveWatch is an agent-based system. ProactiveWatch agents are very small (consuming approximately 20MB of Virtual Memory on a server), and very efficient (collecting data on every process running on the server every 10 seconds) while consuming approximately 1% CPU during every monitoring interval. 3. Agents are available for Windows 2000 Server and above, Windows XP Workstation and above, Linux/Unix (Red Hat, SUSE, etc.) and Mac OSX. 4. For the purpose of supporting network devices, any server agent can collect data from any network device that the agent can access via SNMP. ProactiveWatch supports all network devices that can respond to an ICMP ping for availability monitoring. For performance and bandwidth monitoring ProactiveWatch uses SNMP MIB Agents open an outbound port to the Gateway. The Gateway opens 443 outbound to the PW Back End. No firewall ports need to be opened at the customer site in order for ProactiveWatch to function. 6. The ProactiveWatch Explorer (Console) is a rich client.net 2.0 application that the VAR installs on a server or workstation at his site. It opens port outbound to the PW back end. V

5 II. Installing ProactiveWatch There are two simple steps to installing ProactiveWatch at a new customer site: 1. Install one ProactiveWatch Gateway (a Windows Service that runs on a non-dedicated server that can open an outbound connection on port 443) at the customer site. You will need your VAR ID and you will create unique ID for the customer during the Gateway install. Note that you will typically install this on a server (since the Gateway installation is combined with a Server-Class monitoring agent), but you may install it on a workstation if it is a peer-peer network. 2. Install Agents at the Customer Site. All you need to install Agents is to select the Agent Type, and to tell the installer the IP address of the computer that is the Gateway. For detailed instructions on installation, please consult the Quick Start Guide. Installing and Accessing the ProactiveWatch Explorer After you install the Gateway, you should install the PW Explorer (the Console) on your laptop or workstation and make sure that your newly installed Gateway will appear in your Console. The Explorer requires no configuration during installation (just.net 2.0). You log into the Explorer with your VAR ID, the user ID and password that were provided to you in your registration . If your Explorer cannot connect, please take the following steps: 1. Verify that the Host is set to proxi.proactivewatch.com 2. Verify that the Port is set to Verify that your VAR ID and Password are correct 4. Verify that Domain is set to ProactiveWatch 5. Once you verify these items if you still fail to connect open a Command Prompt. Type: Telnet proxi.proactivewatch.com This will test whether you can get out to the public Internet on port If this test fails, then your access on this port is blocked, and you will need to get this port opened outbound in order to run the Explorer from your current location. 6. If the Telnet test passes, and you still cannot connect, please send an to support@proactivewatch.com. After you have installed your first Gateway, and launched the Explorer, you should see your Gateway in the Explorer as is shown below. Note that you can use the Manage Columns under Settings to add the Agent Type column to your view so that you can see what types of agents you have installed. V

6 III. Cancelling a Customer To remove ProactiveWatch from a client site, you should ideally uninstall the ProactiveWatch and FreeMyIT agents (add/remove programs). If you no longer have acceess to the client s site, you can block the agents from that site by using Settings->Manage Blocked Agents from the Console. Once you have blocked the agents, they will be prevented from re-connecting to the ProactiveWatch servers once a connection is broken (internet disruption, system reboot, etc.). At that time they will appear grayedout in the Console and you can delete the systems from your Console. Once the systems show as grayed-out in the console, you can delete them from the Console by selecting the rows and choosing Edit->Delete. IV. Operating the ProactiveWatch Explorer The ProactiveWatch Explorer is a rich client.net 2.0 application that you install upon workstations or Servers at your site. This is the only piece of ProactiveWatch software that you need to install at your site or upon your user PC s or laptops. The Explorer displays the real-time status of all of the monitored servers, workstations, and network devices across all of your customers and sites monitored by ProactiveWatch. Each monitored device is a row in the Explorer. Each column represents the status of one or more monitors. The status of a Monitor for a device is displayed in the cell that is at the intersection of the device row and the monitor column. The colors in the cell have the following meanings: 1. A Green square means that the status is normal (no alert condition is present) 2. A Red Square means that the monitor is currently in an alarming state. 3. A Red Triangle means that the alarm has cleared. Alarms that are caused by conditions that clear like CPU abuse, Memory abuse, etc., will clear automatically when the condition that caused the alarm goes away. 4. A Blue Square is for a Marked As Normal Alarm (discussed in detail in the Managing Alarms chapter). Normal Alarms (like scheduled reboots in the middle of the night) are alarms you want to know about, but that you do not want to get notifications on. 5. A Red and a Yellow triangle in a square is an Event. Events do not have a time duration and by definition have occurred in the past when you see them for the first time, so are marked in Yellow with a Red Triangle. Unlike an Alarm there is no automatic or manual way to Clear an Event. You have an option in the Explorer for how far back in time you want to view events. 6. A Blue and Yellow triangle in a square is a Marked As Normal Event. For example if you decide that you want to Mark As Normal Event Log entries associated with printer creation errors you can mark that specific Event ID as Normal (in Manage Alarms), causing it to appear as blue/yellow, and you will not get notifications on this event. V

7 Customizing the Explorer to Display (Only) What You Want To See The Explorer is easily customizable to display only the devices from a particular customer, the devices at a particular location, or only the devices that are currently alarming. The following options are available to you to customize your view in the Explorer (each number below corresponds to a number on the screen shot): 1. Clicking on the column header sorts by the data in the column. 2. Lets you choose how far back in time to display Events 3. Filters your view. For instance, choose Customer, and then select the Customer that you want to see. That will show only the servers and devices for that customer. 4. Substring Search lets you quickly find a system by typing in the partial computer name. 5. Pressing the Resets Grid Acknowledges Past Alarms button makes all of the red triangles go away (acknowledges alarms that have occurred, but that have cleared). 6. Pressing Pause, pauses grid refreshes. This makes the grid hold still since rows with new alarms will go to the top in the default sort order unless you press this button. 7. Locks the grid to the top. If you have sorted alarms so that all CPU alarms are at the top, this will keep your selected rows at the top, even as alarms occur. 8. Toggles the view to display only rows with active alarms, or when pressed again shows all rows. 9. Locks in a view to Group by Customer (on by default). 10. If you do not have the Customer Grouping button on, this will sort your grid to put all alarming rows at the top. 11. Collapse/Expand All allows you to quickly collapse or expand the Groups. Customer Views When you add a new customer, a new View is automatically created to show just the systems for that customer (as shown in the screen, above). This lets you quickly click a tab to view a client environment. (You may need to log out and in again to see a new customer.) V

8 Customizing the Columns Displayed in the Grid View You can create multiple views each displaying a different set of columns, and you can customize the columns displayed in each grid. ProactiveWatch ships with three default views, All, Computers and Network, and as mentioned above, automatically creates views for each new Customer. You may select these views by pressing the tab with the View name in the main grid view of the Explorer To create a new view, or to change the columns in an existing view, go to SettingsManage Columns. The right and left arrows in the middle of the dialog move columns between Available and Selected. Once a column is selected, you can highlight and drag it up or down in the Selected list on the right. If you were to add a column to the list below, and drag it so that it appeared under Agent Type, than that column would appear to the right of Agent Type in the Grid View. To create a new View, Clone an existing View and give this view a name. There are several other places in the Explorer where the displayed set of columns is determined by the displayed set in the Main Grid View (for example in the Assign tab of Monitoring Templates). If you want to efficiently manage your screen real estate, you can create a view that is optimized for assigning templates to computers in this screen and switch to it before you go work with Monitoring Templates. To create a new custom column, hit the + at the top right of the Available box. For example if you have customers on three different support plans (Silver, Gold, and Platinum), you can create a column named Support Plan. You can then select groups of rows in the Explorer, right-click, select Fill Cells, choose Support Plan as the column, and then type in Gold to populate the Support Plan column for the selected set of rows with Gold. You could then sort customers in the Grid View by Support Plan, or even build Notification Rules based upon which Support Plan a customer was on. V

9 Adding or Changing Grouping By default the button to group by Customer is active. So, when your Explorer comes up, it will automatally display all of the rows for each customer together. You can add or change groupings by dragging column headings up to the dark gray area above the column titles. You can group by any column displayed in the Grid View. For example, if you have both servers and network devices monitored at your customer sites, and you would like them to be displayed together for each customer, then add Agent Type as a column, and drag its its Column heading up to the dark gray area as shown below. V

10 The Alarms View Working Alarms Clicking on the alarms tab (next to the View tab) brings up a summary list of all of the open alarms across all of the managed devices at all of your customers. You can group these alarms by any column heading by dragging the column heading up into the dark gray area. You can also right click and take the following actions on any set alarm: 1. Work Alarm this brings up the detailed work alarms screen that allows you to take a variety of actions upon an individual alarm. 2. Alarm History this brings up the same view of the alarms for a specific server, workstation or device that you get when you double click upon a row in the Grid View. 3. Show Issues this bring up the Show Issues analysis for a managed device. The Show Issues analytical tool is discussed in the Analytical Tools section of this manual. 4. Defer Alarms this allows you to stop Notifications for a selected period so that you can take a set of planned actions to resolve an alarm. 5. Mark As Normal This marks the alarm as Normal. Go to Manage Alarms and the Marked as Normal tab to customize the time windows for your Marked as Normal setting and the computers to which it applies. 6. Clear Alarms This manually clears the selected set of alarms, even if the condition that caused them has not been addressed. V

11 The Alarm History If you double-click on any selected set of rows in the Grid View of the Explorer you will bring up the Alarm History for the selected set of devices. The Alarm History is a rich diagnotics tool that displays the following information: 1. The alarms that have occurred within the selected time period (24 hours, 3 days, or 7 days) for the selected set of servers. 2. If you select a single alarm, you will get the available diagnostics information for the alarm. In the case of resource based alarms (over use of CPU, Memory, Disk, Handles or Threads) you will get a detailed System Snapshot that shows you the state of the computer at the time of the alarm. This will include the usage state of the key resoruces on the server, as well as which processes are the top five users of those resources. 3. The System Profile at the time of the alarm. 4. The set of installed applications, security updates and hot fixes at the time of the alarm. If you double-click on any single row in the Alarm History, you will go to the Work Alarms screen (described below). V

12 The Work Alarms Screen You can access the Work Alarms screen by either double-clicking on a row in the Alarm History, or by going to the Alarms tab in the main grid view, selecting a row, right-clicking and selecting Work Alarm. The Work Alarms screen pertains to a single alarm and allows you to perform the following actions: 1. Mark As Normal This marks this alarm as normal. Future occurrences of this alarm on this computer will be displayed in blue in the Grid View, and will not trigger notifications. If you would like to generalize a specific Marked As Normal entry (for example to make it apply to more than one Computer), use SettingsManage AlarmsMarked As Normal to customize your entries. 2. Clear Alarm This clears the alarm whether the underlying cause of the alarm has been addressed or not. 3. Create Autotask Ticket. If you use the Autotask PSA and have configured the Autotask integration, you can automatically create a ticket for this alarm in Autotask. 4. Assign an Alarm Click the Assign button to assign the alarm to yourself or another ProactiveWatch user. The alarm is displayed with the selected ownership in the accounts of other Explorer users at your company. 5. Defer This defers the time count that the alarm is open in order to give you time to fix it. This will remain as an active alarm in the console, but will temporarily stop sending alarm/ notifications. 6. Manage Computer Will launch the Manage Computer widget for this device which will allow you to view near-real-time performance, view and kill processes, and view and manage services. V

13 V. Monitoring Templates How To Change and Add Monitoring Functionality Go to SettingsMonitoring Templates to see the default set of monitoring templates, shown in the image to the right. All of the Default Templates are locked and their settings cannot be changed. To change monitoring settings, clone a template, and change the settings in the clone (see the next section for how). There are three types of templates within ProactiveWatch, Base Templates (in blue) and Add-On Templates (in green) and Extension Templates. Only one Base Template may be assigned to a monitored device at a time. Base Templates are also tied to an Agent Type (Gateway Server, Server or Workstation). You cannot assign a Base Template to an Agent of a different type than the Template. So, if you create a new Server Template by cloning the default Server Template, you will only be able to assign the new template you made to servers that have the Server Agent installed upon them (and not to Workstations or Gateway Servers). Base Templates are the only place where you can set up monitors that have thresholds like CPU %. This is so you only ever have one of those kinds of thresholds to worry about per monitor, and never have to figure out which CPU % threshold (in which template) is causing the alarm (since there can be only one template with a CPU threshold assigned to any server or workstation). Add-On Templates are not typed (they can be assigned to any monitored device), and you can assign as many Add-On Templates to a server, workstation, or network device as you like. Add-On Templates are designed to let you handle the variation among devices at your customer sites without having to proliferate Base Templates. So, if you have two different kinds of backup software installed at your customer sites, each of which writes different events to the Event Log, you can create two different Backup Add-On Templates by setting up the Event Log monitoring appropriately in each, and then assigning those Templates to the appropriate servers. Extension Templates are Add-On Templates that contain a specific monitoring Extension for a specific type of server (like a Microsoft Exchange Server), or a specific type of third party service that requires in depth monitoring (like Symantec Anti-Virus or Symantec Backup Exec). Extensions are implemented as scripts that are downloaded to agents and then run upon a desired schedule. ProactiveWatch includes several extensions. These will be added to by ProactiveWatch over time, and you can also write your own. V

14 Monitors in Base Templates, Add-On Templates and Extensions As mentioned above, there are three different types of Templates in ProactiveWatch, Base Templates, Add-On Templates, and Extensions. The different monitors that are available in the three types of templates are summarized in the table below: Template Type Base Add-On Extension Site Down Monitor Yes No No Internet Down Monitor Yes No No Server Down Monitor Yes No No LAN Latency Monitor Yes No No Auto-Started Service Down Yes No No Event Log Collection Yes No No Total CPU Usage Yes No No CPU Usage by a Single Process Yes No No Low Disk Capacity Yes No No Excessive Disk Time (Activity) Yes No No Low Virtual Memory Yes No No Low Physical Memory Yes No No Excessive Threads used by a Process Yes No No Excessive Handles used by a Process Yes No No Registry Change Yes No No Application Install/Removal Yes No No System Profile Change Yes No No Reboot Yes No No Application Crash Yes No No Port Error Yes Yes Yes Client to Server Initiator Yes Yes Yes Client to Server Listener Yes Yes Yes URL Availability and Response Time Yes Yes Yes Excessive ICA Connect Latency Yes Yes Yes Windows Event Log Alerting Yes Yes Yes Specific Service Down Yes Yes Yes Specific Process Down Yes Yes Yes MS Exchange Extension No No Yes Symantec Anti-Virus Extension No No Yes Symantec Backup Exec Extension No No Yes Microsoft Update Extension No No Yes In general the best practice is to have a small number of Base Templates that you can reuse widely across similar servers in your customer base. Then use Add-On Templates to handle variation between similar servers across customer sites. Use Extensions to add deep monitoring of certain functions to your system. V

15 Changing the Monitoring Settings in a Template To edit the settings for an existing template, you double-click on it and go to the settings for that template. To create a new template, select the appropriate starting point (remember the type of the template much match the installed agent type), right click and select Clone. To edit the settings within a template take the following steps: 1. The set of monitors in a template that are enabled are in green, disabled monitors are in gray. To turn a monitor on, select it, right click, and choose Enable. 2. For most monitors the settings are in the columns to the right of the Alarm name. These cells are editable, and you can simply type in the values you would like for each monitor. 3. Some monitors have thresholds that are the numerical value in the monitor that must be exceeded in order for the monitor to alarm. The value is either a count (a number of handles), a percentage (X % of CPU), or a time value (a certain number of seconds or milliseconds). The Unit of the threshold is specified in the Unit Column. 4. Timeframe is the duration in seconds that a monitor must surpass the threshold in order to alarm. 5. Certain monitors required advanced configuration. These monitors have blue Configure links in the Advanced column. Click on the Configure Link to access the advanced configuration dialog for these monitors. Information on how to configure the advanced settings in the optional monitors is contained in the Optional Monitors section later in this manual. V

16 Assigning Monitoring Templates to Workstations, Servers and Network Devices ProactiveWatch provides for an easy spreadsheet like user interface to assign monitoring templates to workstations, servers, and network devices. You access this interface by going to SettingsMonitoring Templates and selecting the Assign tab. All you have to do to assign a template to a device is to doubleclick in the cell that intersects that device row and the template column. You can copy and paste template assignments en-masse so you can quickly assign a set of templates to a set of devices. To do this, select a cell, right-click and select copy. You can then select N rows, select paste and past that selection to those rows. You can also copy and paste an entire row of selections if you have one server set up just right, and want to copy that assignment to N other rows. As mentioned before in the section on Monitoring Templates, you can only have one Base Template assigned to each server, workstation or network device. Furthermore, Base Templates have a type that matches the agent type you installed. You cannot assign a Base Template of one type to an agent of a different type. Only the allowed choices are in white in the Base Templates section of the Assign dialog. The Default Exclusions Template is automatically assigned to all devices, which gives you one easy place to manage all of the alarms that are not desirable. Please see more detail on this feature in the Manage Alarms section of this manual. Notice the in the case below, the HP Insight Manger, Symantec BackupExec, and All Event Log Errors Add- On Templates are assigned to all of the servers. This shows how easy it is to configure ProactiveWatch for the different scenarios you encounter at customer sites. The gray columns you selected in the main grid view determine the gray columns you see in the Assign dialog. If you are running out of real estate in this dialog, then go to Manage Columns and make a View called Assign Templates. Put the minimum columns you need in this view, and then select it before you come to this dialog. V

17 VI. Default ProactiveWatch Monitoring Templates and Features When you install an agent, one of three Base Monitoring Templates is automatically assigned to that agent depending upon what type of agent you install. If you install a Gateway on a computer, then a Gateway Server Agent is also installed upon that computer, and the associated Gateway Server Base Monitoring Template is assigned to that Gateway Agent. If you install a Server agent upon a computer, the Standard Server Base Template will be assigned to that agent. If you install a Workstation agent upon a computer the Standard Client Base Template will be assigned to that agent. The agents in the default templates contain a set of default monitors shown in the table below. No configuration or customization is required to activate these monitors. Differences in Monitors between Agent Types The differences in the default monitors that are provided in the three default monitoring templates is shown in the table below: Computer Type Gateway Server Server Workstation Agent Type Gateway Server Server Workstation Default Template Gateway Server Standard Server Standard Client Site Down Monitor Yes No No Internet Down Monitor Yes No No Server Down Monitor Yes Yes No LAN Latency Monitor No Yes No Auto-Started Service Down Yes Yes Yes Event Log Collection Yes Yes Yes Total CPU Usage Yes Yes Yes CPU Usage by a Single Process Yes Yes Yes Low Disk Capacity Yes Yes Yes Excessive Disk Time (Activity) Yes Yes Yes Low Virtual Memory Yes Yes Yes Low Physical Memory Yes Yes Yes Excessive Threads used by a Process Yes Yes Yes Excessive Handles used by a Process Yes Yes Yes Registry Change Yes Yes Yes Application Install/Removal Yes Yes Yes System Profile Change Yes Yes Yes Reboot Yes Yes Yes Application Crash Yes Yes Yes The Gateway Server agent is the only agent that implements the Site Down and Internet Down Monitors. Since you typically have one Gateway at each customer site, these monitors serve to tell you if that site is up, and if the Internet is accessible from that site. The Server Down and LAN Latency Monitors are not implemented in the Workstation agents, since those agents typically get installed upon user computers including laptops that get turned off frequently (which would cause a false alarm if these monitors were V

18 implemented. If you have a workstation that should be up all of the time, and you want to monitor it with the Server Down alarm, put a Standard Server Agent on that Workstation. How the Default Monitors Work in ProactiveWatch 1. Site Down Monitor The PW back end constantly monitors each GW to make sure that the GW is communicating back to the PW back end on the required intervals. If the GW fails to check in within the required interval (by default 60 seconds), the PW back end will issue a site down alarm. The PW back end will generate an to the main support account at the VAR, notifying the VAR of the outage. This notification does not rely upon any infrastructure at the customer or the VAR except the ability on the part of the VAR to receive an Internet Down the PW Gateway measures the response time from the GW of and every 60 seconds. If both of these web requests fail, the GW sends an Internet Down alarm to the back end, which generates an Alarm and a Notification as described above. Alarms and Notifications will also be generated if both sites are slow to respond. 3. Server Down Monitor the PW Gateway maintains a continuous connection with each monitored server. If that connection is broken, the Gateway sends a Server Down alarm to the PW back end, which generates an alarm and a notification as described above. 4. LAN Latency Monitor The GW continuously checks the latency over the LAN between itself and the monitored servers. If the performance of the LAN degrades, an alarm is generated. 5. CPU Usage Monitor If total CPU usage is above 95%, or usage by any single process is above 50% for the default time period, an alarm is issued. 6. Memory Usage Monitor If Physical Memory usage is above 90% or Virtual Memory Usage is above 70% for the default time period, and alarm is issued. 7. Disk Time Monitor If Disk Time (the percentage of the last second in which the disk controller is actively accessing the hard disk) is above 50% for the default time period, and alarm is issued. 8. Disk Capacity Monitor If the free space on any disk drive falls below 5% an alarm is issued. 9. Thread and Handle Usage Monitor If any single process uses more than the desired number of threads or handles, and alarm is issued. 10. Event Log Monitoring All Event Log entries written to the Applications Log and the System Log are automatically collected. These can be browsed with the Event Log Viewer that is part of the PW 1.6 Explorer. Alerts for any combination of severities and logs can be turned on for any combination of servers or workstations with one mouse click. 11. Installed Programs Monitor Any change to the set of installed programs (including Windows Hot Fixes and Security Updates) is detected, and alerted upon. Additionally any changes to the sections of the Registry that involve launching programs (Run, RunOnce) are also detected. 12. Application Crash Monitor If any process on the server crashes, this crash is detected. Dr. Watson crash dump information is also collected if Dr. Watson is enabled on the server. V

19 13. Windows Service Monitor if any automatically started Windows Service goes down, and alarm is issued. 14. Reboot Monitor If a server reboots and alarm is issued. Normal reboots can be easily masked out with the Marked As Normal features of the system. 15. System Profile Monitor If the profile of a monitored server changes (for example, the IP address of a server changes), an alarm will be issued. VII. Default (Out-of-the-Box) Network Device Monitoring Any server agent can monitor any network device that it can access via ICMP and SNMP. If the VAR provides the information to the right about a Network Device, then ProactiveWatch will automatically monitor that network device. The default Network Device template is shown below with the default settings for network device monitoring. The monitors that are on by default are: 1. ICMP Ping Failure The selected Server Agent will ping the network devices and issue an alarm if the devices fails to respond. 2. If packet loss on the ping exceeds the threshold, and alarm will be issued. 3. If the response time on the ping exceeds a latency threshold, an alarm will be issued. 4. If the profile of the network device (for example the version of its installed software) changes, and alarm will be issued. 5. If utilization of any of the inbound or outbound interfaces exceeds the threshold, an alarm will be issued. The Connected Network Device monitor is off by default since it will alarm whenever the set of devices connected to a switch or router changes. This can be a very valuable monitor in certain circumstances, but it will generate a large number of false alarms for routers and switches that support workstation and laptop computers. V

20 VIII. Optional Monitors in ProactiveWatch ProactiveWatch contains a wide variety of monitors that you can enable by simply selecting them in a monitoring template and turning them on. Some of these monitors require some customer specific configuration. The optional monitors are detailed below: 1. Web Site (URL) Response Time Monitor This monitor tests the availability and response time of any selected web site. This can be a public web site, a corporate intranet, or a Citrix Web Interface Server. Any agent can run this monitor against any web server that is accessible from the computer that the agent is running on. 2. ICA Port Response Time Monitor This monitor tests how long it takes a Citrix server to respond to connect request on the ICA port from the agent making the port request. Any agent can run this monitor against any Citrix server that is accessible from the computer that the agent is running on. 3. Port Monitor This monitor allows the VAR to specify ports that must be present (80 and 443 on a web server), ports that are allowed to come and go (135 the RPC port), and then either ban a specific black list of ports or, as is shown in the example to the right, ban all ports that are not either required, or specifically allowed. V

21 4. Client2Server Monitor This monitor tests the latency over a TCP/IP socket between any two sets of monitored devices. The C2S monitor is an excellent choice to watch the latency between the servers that constitute the tiers of an applications system (for example from web servers to applications servers, to database servers). The Client2Server Monitor is configured in two different places server(s) that respond to (listen for) latency checks and server(s) that create (initiate) latency checks. To configure the listener, clone the Generic Exclusions Template and make an Add-On Template named C2S listener. Enable the C2S Listener in that template. Use Monitoring TemplatesAssign to assign the C2S Listener Add-On Template to the servers that will be responding to latency checks. To configure the initiator, create another Add-On Template named C2S Initiator. Configure it to send latency checks to the servers that you have applied the Listener template to. Assign this template in Monitoring TemplatesAssign to the servers or workstations that you want to test the latency to the target servers. Note that the configured port (29100 by default) must be open between the two sets of servers for this monitor to work. 5. Individual Service Monitor By default ProactiveWatch monitors all automatically started services and alarms if any of them go down. If you wish to monitor services that are not automatically started, you can do so by configuring the Specific Windows Service Down Monitor. Please enter the Display Name of the service in the dialog when configuring this monitor. 6. Process Down Monitor ProactiveWatch can be configured to watch any specific process. This monitor is enabled by default in the Exchange Server template to watch store.exe. Just enable the Process Down Monitor in the Template (Base or Add-On) of your choice and then add the process name you would like to have monitored. 7. Total Handle and Total Thread Usage Monitors These monitors watch the total number of threads and handles in use. Since the acceptable number is highly dependent upon the type of work that a server is doing, these monitors should be turned on within a monitoring template dedicated to a specific type of server. 8. Memory Usage by a Process This monitor can watch the memory usage by individual processes, and should be using in conjunction with application specific monitoring. 9. Extensions 1.6 includes Extensions that provide very detailed monitoring of Microsoft Exchange, MS Update, Symantec Anti-Virus, and Symantec Backup Exec. Other extensions will be added over time. You can even add your own extensions. Extensions are documented in Chapter XVII. V

22 IX. Monitoring Extensions ProactiveWatch includes the ability to deeply monitor a specific vendor s product or service with monitoring functionality custom to that product or service. Certain extensions are provided by ProactiveWatch and are included in ProactiveWatch. You can also write your own extensions and have ProactiveWatch install and distribute them for you. ProactiveWatch includes the following extensions: 1. Microsoft Exchange deep monitoring of Exchange queues, and mail flow over POP, IMAP and MAPI 2. Symantec Anti-Virus monitoring of whether signatures are up to date, and if a virus has been found 3. Symantec BackupExec monitoring of whether or not all configured backups have completed successfully 4. Microsoft Update monitoring of whether or not all available patches have been installed Extensions are provided in ProactiveWatch via an additional set of Add-On Templates. If you go to SettingsMonitoring Templates, you will see four new Add-On Templates that correspond to the four Extensions described above. Templates that have Extensions assigned to them, list the short name of the Extension (MSEXCH, MSUPD, SAVMON, and SMBE) in the Extensions Column. V

23 Displaying Extension Monitor Status in the Explorer Grid View Go to SettingsManage Columns. Select the four columns highlighted in the Available box on the left of the screen shot. Hit the right arrow. This will move those columns to the bottom of the Selected set and display them to the right in your Grid View. This will display the alarm status of all four extensions. You can also add a column named Installed Extensions to cause a column to appear that lists the extensions installed on each computer in that column. If you configure your columns as described above, you will have a Grid View in your Explorer that will look similar to the one below. Your Extensions will be listed to the far right of all of your columns, and you will have a column that lists each of Extensions installed on each computer. All alarms for the MS Exchange extension will appear in the MS Exchange column. The same is true for the MS Update Extension. All Anti-Virus extension alarms (for Symantec and for all other AV products that will be supported over time) will roll up into the blue Anti-Virus column. All Backup Extension alarms (for Symantec and all other backup products that will be supported over time) will roll up into the blue Backup column. V

24 Assigning Extensions to Servers and Workstations The default extensions that are provided with ProactiveWatch are all locked. This means that you cannot change their configurations. However, they come with default configurations, and in some cases, you might just be able to use the default configurations. The Symantec Backup Exec, and the MS Update Extensions contain no environment specific configurations, so as a first step, if you have computers that have Backup Exec and/or MS Update installed upon them, you might want to just assign the templates corresponding to these extensions to those computers. Templates that contain Extensions have Enhanced in their names. This is to differentiate them from templates that address the same product (for example Symantec Backup Exec) but that monitor the services, processes, and event log entries for that product. In the screen shot below, you see two templates with Symantec Backup Exec in their names: 1. Symantec Backup Exec this template monitors the services, processes and event log entries for Backup Exec. 2. Symantec Backup Exec Enhanced this template contains the Backup Exec Extension, and does not contain the service, process, and event log monitors contain in the template described in #1 above. Since the Symantec Backup Exec, Symantec Anti-Virus and the MS Update Extensions do not contain parameters that could be specific to a customer environment; you can get started with Extensions by simply assigning these Extension templates (with Enhanced in their template names) to the computers that Symantec Backup Exec, Symantec Anti-Virus and MS Update installed upon them. Note that if you want both the Symantec Backup Exec Extension monitoring and the monitoring of Backup Exec services, processes, and event log entries; you have to assign two templates to each of the computers running Backup Exec. V

25 Customizing and Configuring Extensions In order to change the default configuration of an Extension, or to customize one specific to your customer base, or a specific customer you have to first clone the extension. Go to SettingsMonitoring TemplatesDefine Tab, select the Extension you wish to customize, right click and select Clone. Give the template a name. Please be aware of the following considerations when naming Extension Templates: 1. The Symantec Anti-Virus, Symantec Backup Exec and MS Update templates contain no parameters that are specific to a customer environment. You might be able to use the default extension template, or create one clone of each of these templates that you can reuse across all of your customers. You might want to consider naming such a template MS Update Global Tech where Global Tech is the name of your company. 2. The MS Exchange Extension requires a unique configuration for each Exchange Server that you wish to monitor. If you have customers with more than one Exchange Server, then you might want to use a naming convention like Exchange Extension Cust Name Computer. If you implement the suggestions in 1 2 above, then you might end up with the following assignments in the SettingsMonitoring TemplatesAssign Tab: 1. The Exchange Add-On (Exchange services, processes, and event logs) is assigned to all Exchange Servers and MS Exchange Fugitive (the Exchange Extensions template for this specific Exchange server) is assigned to just the Fugitive Exchange Server. 2. The Default MS Update Extension Template is assigned to all servers. 3. The Symantec Anti-Virus template (services processes, and event logs), and the Symantec Anti-Virus Enhanced template are assigned to all computers that have Symantec AV installed upon them. 4. The Symantec Backup Exec template (services processes, and event logs), and the Symantec Backup Exec Enhanced Template are assigned to all servers and workstations that have Symantec BE installed upon them. V

26 MS Exchange Extension Configuration and Monitoring Details You may use the Default MS Exchange Extension template to monitor the Services, Thresholds and DNS based on our default settings. In order to use the Exchange Extension with the more powerful Round-Trip verification, you must first clone the Add-On Template that contains the Extension, and give the resulting Add-On Template a unique name. Since Exchange Extensions are specific to each Exchange Server, you should name these templates with names that correspond to each Exchange Server at your customer sites (you will need one unique Exchange Extension for each Exchange Server at your customer sites). Optionally, you can use the Default MS Exchange Template, and use the Override Feature from the Properties dialog (select the system s row, Edit->Properties) to setup the specific round-trip configuration. Using the Round-Trip Verification ProactiveWatch can be configured to log into a test account to send and receive test s to ensure true mail flow. Create a test address on the Exchange server for the exclusive use of ProactiveWatch. The ProactiveWatch MS Exchange Extension will send s from this account, thereby testing that SMTP is functioning. It will then log into the account via one or more of IMAP, MAPI and POP3 to ensure that mail is flowing for each of these protocols. If mail is not received for each the protocols you have selected for testing, an alarm will be created. As mentioned, it is necessary to clone and save a template for each customer s Exchange Server that you wish to monitor with Round-Trip Verification since mailbox names and login credentials will be specific to the Exchange Server. You will then fill in the necessary parameters based on the protocols that are to be tested on this Exchange server. At a minimum, you must specify the SMTP credentials, and credentials for at least one of IMAP, MAPI or POP3 in order for ProactiveWatch to test that mail is received and to clear the from the system. V

27 Configuring the MS Exchange Extension To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for an Exchange Extension: Alarm on Success (true/false). If true generates an alarm if all monitors pass their test. If you have mail flow monitoring configured, this is a great way of getting a positive acknowledgment that the Exchange Server is working. Check IMAP, MAPI and POP - (true/false). This turns on mail flow monitoring via each of these protocols. You must configure accounts and parameters for each one of these monitors for them to work. (I.e.-You must set _HOST, _USER, _PASSWORD, _PORT, etc., for each protocol to be monitored.) Collect Exchange Diag (true/false). If true causes the Extension to collect diagnostic data when an alarm occurs, which is then presented along with the alarm. Deferred Delivery Queue Threshold (type in value). This queue contains messages that are queued for later delivery. This queue might contain messages that were sent by earlier versions of Microsoft Outlook, such as Microsoft Outlook Newer versions of Outlook store these types of messages in the Exchange store. Messages remain in the Messages Queued for Deferred Delivery queue until their V

28 scheduled delivery time. The threshold is the size of the deferred delivery queue that will be allowed before an alarm is triggered. Failed Message Queue Threshold (type in value). This queue contains messages that failed a queue submission. Messages can fail a queue submission for several reasons, and the failure can occur before any other processing is done. If messages are corrupted or system resources are low, messages appear in this queue. The threshold is the size of the queue that will be allowed before an alarm is triggered. Local Async Queue Threshold (type in value). This queue contains inbound messages for delivery to mailboxes on the Exchange server. The threshold is the size of the queue that will be allowed before an alarm is triggered. Post DSN Generation Queue Threshold (type in value). This queue contains DSN messages pending submission. DSN Messages are Delivery Status Notification messages. The threshold is the size of the queue that will be allowed before an alarm is triggered. Pre Cast Queue Threshold (type in value). This queue contains messages waiting directory lookup. The threshold is the size of the queue that will be allowed before an alarm is triggered. Pre Routing Queue Threshold (type in value). This queue contains messages waiting to be routed. The threshold is the size of the queue that will be allowed before an alarm is triggered. Pre Submission Queue Threshold (type in value). This queue contains messages pending submission. The threshold is the size of the queue that will be allowed before an alarm is triggered. DNS Check Hostname and ResolveIP (type in value). These parameters are unique to each Exchange Server, and must be uniquely specified for each server you want to monitor. FROM and TO (type in value). These are the TO: and FROM: addresses that will be used when test s are sent for POP, IMAP and MAPI mail flow monitoring. Host, Password Port and User - (type in values). These values need to be set for each of the POP, IMAP, and MAPI mail flow monitors that you want to set up. You need to create an account on the Exchange Server that corresponds to the values that you use here. SMTP Auth (true/false). Whether or not to use SMTP Authentication in the mail flow monitors. Schedule (drop down, or Cron type in) - This determines how often the Extension will run to check the status of the Update process, and the availability of any updates. Timeout (type in value) the number of seconds that the Extension is allowed to run. V

29 MS Update Extension Configuration and Monitoring Details The MS Update Extension is contained in an Add-On Template named MSUpdate Enhanced. You can assign this template to any server or workstation in its default state, and it will monitor the MS Update process in the following manner: If the MSUpdate process gets turned off or disabled in any manner you will get an alarm When Updates are available, but not installed yet, you will get an alarm that will include the list of available updates The Extension will run once a day to determine the status of the MS Update process. If you wish to change any of the above parameters, you will need to clone the MS Update Enhanced template and give your clone a unique name. Since there are no customer or server specific configurations required for the MS Update Extension you can use one or just a few clones to cover your entire customer base. If you are going to use just one clone to cover your entire customer base, you might want to create a clone that reflects your company name, like MS Update Global Tech. To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for an MS Update Extension: Desired_Levels (drop down) Selects which states of the MS Update process will cause an alarm. By default, the Extension will alarm if the Update process is Not Configured, Disabled, or in an Unknown state. You can select the states that are required, and then the Extension will alarm if the process is not in one of the required states. Monitor_AutoUpdates (true/false) - If true will alarm when updates are available and provide a list. Schedule (drop down, or Cron type in) - This determines how often the Extension will run to check the status of the Update process, and the availability of any updates. Timeout (type in value) the number of seconds that the Extension is allowed to run. V

30 Symantec Anti-Virus Extension Configuration and Monitoring Details The Symantec Anti-Virus Extension is contained in an Add-On Template named Symantec Anti-Virus Enhanced. You can assign this template to any server or workstation in its default state as long as the Rtvscan.exe program is installed in the directory that is specified in the default template. The default template and Extension will monitor the Symantec Anti-Virus in the following manner: If a virus is found, your will get an alarm If the virus definitions have not been updated within Max-Days, you will get an alarm The Extension will run once a day to determine the status of the Symantec Anti-Virus process. If you wish to change any of the above parameters, you will need to clone the Symantec Anti-Virus Enhanced template and give your clone a unique name. Since there are no customer or server specific configurations required for the Symantec Anti-Virus Extension you can use one or just a few clones to cover your entire customer base. If you are going to use just one clone to cover your entire customer base, you might want to create a clone that reflects your company name, like MS Update Global Tech. To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for a Symantec Anti-Virus Extension: Alarm_On_Success (true/false) If true will generate an alarm if Symatec AV is fully operational and if virus updates have occurred within the Max_Days window. Max Days (type in value) The number of days that can elapse since the last virus definitions update. If this number of days is exceeded and alarm will be generated. Scan_File (type in value) The location of the Rtvscan.exe file on the computer s hard disk. This value is retrieved from the registry so it only needs to be filled in if the value cannot be retrieved from the registry, or if the registry is incorrect for some reason. Schedule (drop down) the schedule upon which the Extension runs. Timeout (type in value) the number of seconds that the Extension is allowed to run. V

31 Symantec Backup Exec Extension Configuration and Monitoring Details The Symantec Backup Exec Extension is contained in an Add-On Template named Symantec Backup Exec Enhanced. You can assign this template to any server or workstation in its default state. The default template and Extension will monitor the Symantec Backup Exec in the following manner: The Extension will monitor the successful completion of all backup jobs known to Backup Exec, and alarm if any of them fail. An alarm will also get generated if all jobs complete successfully (positive acknowledgement) The Extension will run once every hour to determine the status of the backups. To change any of the above parameters, clone the Symantec Backup Exec Enhanced template and give the clone a unique name. Since there are no customer or server specific configurations required for the Symantec Backup Exec Extension you can use one or just a few clones to cover your entire customer base. If you are going to use just one clone to cover your entire customer base, you might want to create a clone that reflects your company name, like Symantec Backup Exec Global Tech. To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for an Exchange Extension: Alarm on Success (true/false) if set to true will alarm if all backup jobs complete successfully Check (type in field) a list of job ID s to be checked. Used if the Check_All field is set to false Check_All (true/false) if set to true, all backup jobs will be checked. If set to false, the list of jobs to be checked must be specified in the Check field. Ignore (type in field) If you set Check_All to true, you can provide is list of job ID s to be ignored Schedule (drop down) The schedule upon which you want the Extension to run Success (type in field) The list of codes that constitute success. Code 2 is always included Timeout (type in field) How long you want the Extension to run before it times out. V

32 X. Managing Alarms in ProactiveWatch ProactiveWatch is the only VAR oriented Managed Service monitoring solution that can monitor every process on the server for usage of key resources, monitor the server for changes in the state of the installed software, monitor servers for changes in desirable and undesirable ports, monitor web and Citrix servers for URL and ICA response time and monitor the Windows Event logs with the granularity required to catch critical events in a wide variety of applications and services. With this tremendous ability to monitor deeply and broadly comes the prospect of a significant number of false alarms. ProactiveWatch includes an easy to use, but very powerful system that allows you to virtually eliminate false alarms: 1. Alarms may be Excluded by the Agent and never even set up to the back end database for analysis and reporting. Excluded alarms are treated as if they never occurred at all. An example of an alarm that is excluded in the Default Exclusions template is the Windows Performance Logs and Alerts service going down. 2. Alarms may be Marked As Normal. Marked As Normal alarms are recognized within the Console as having occurred and are marked in blue instead of red in the grid view. Alarms can be Marked As Normal for a specific time period. For example the nightly reboot of a set of servers in a farm can be Marked As Normal if it occurs within +/- 30 minutes of 2 AM, but the reboot alarm will be treated as normal otherwise. 3. Alarms and Notifications are treated separately. Notification Rules (which cause Alerts) are separately defined from Alarms themselves. So the VAR can easily create a rule that sends an immediately if a site or a server is down, but that reserves all other alarms for a summary in the morning. 4. Resource alarms (CPU, Memory, Disk Time, Handles, Threads) can be excluded based upon which process caused them. For example, on an Exchange Server, store.exe often uses all of the memory. So, if the threshold for a memory alarm is 90%, that alarm will always fire on an Exchange Server, since store.exe will always push total memory utilization above that point. ProactiveWatch allows you to define an Exclusion rule that masks out alarms having to do with the utilization of resources in total caused by specific processes. So, memory alarms caused by store.exe (and sqlserver.exe) cease to be a problem. ProactiveWatch is also unique in that false alarms can be masked before they occur, and can be applied to computers upon which they have never occurred before they occur. Furthermore, specific alarms can be generalized, and then Excluded or Marked As Normal and applied to any set of monitored devices. V

33 Exclusions in Manage Alarms Any alarm that occurs can be right-clicked upon and excluded. Be default, Excluded Alarms are added to the Default Exclusions Template, which applies them to all monitored devices. Below is an example of the alarms that are excluded by default in ProactiveWatch. Note that the Physical Memory alarm is excluded when it is caused by sqlserver.exe, but not by any other process and that the CPU usage alarm is excluded when it is caused by beremote (the backup process), but not when any other process causes it. The asterisks in the screen shot below illustrate how easy it is to generalize and exclusion. A common system profile change is for the CPU Mhz to change as the CPU shifts up and down in speed. When this alarm occurs, it comes with specific values in the Old and New fields. Replacing these values with asterisks masks out all changes in CPU speeds from the alarm set. Marked As Normal in Manage Alarms Two alarms are marked as normal below. A regular task every Monday consumes a great deal of CPU. This task runs between Midnight and 7 AM depending upon other system load. So it is Marked As Normal on a weekly schedule with a start time and end time that cover the likely periods during which the task is running. The second Marked As Normal alarm is a nightly reboot, which occurs within a few minutes of 1:13 AM. It is important to note the key differences between Excluded Alarms, and Marked As Normal Alarms. They are: 1. Excluded Alarms are treated by the system as never having happened. There is no record within the system of them having occurred. There is no time frame for exclusions. Either an alarm is excluded all of the time or it is not. V

34 2. Marked As Normal alarms show up in the Grid View and therefore it is possible to verify that the task that caused the CPU issue, or the scheduled reboot did in fact occur. 3. Marked As Normal alarms have a time frame associated with them being normal. So this feature is used for alarms that are normal at night, and not normal during the day. V

35 XI. Notification Rules The last layer in the system of deciding which alarms are important is to decide which ones should be the basis of notifications. Note that Excluded alarms are masked out as never having occurred, and Marked As Normal alarms are noted in the Explorer, but are masked out from the set available for notifications. The Add Notification Rule dialogs below, shows how you can pick which alarms should be the basis of an notification rule. Select the alarm(s) of interest, then you can choose an Alarm Parameter to filter that alarm type. Alarm Parameters are: Contains, Starts With, Ends With and Matches Exactly. The rule may be further filtered on the basis of Customers, Locations, or even individual computers. Finally you can choose whether you want the alarm immediately, or whether you want summaries of the outstanding alarms hourly or daily. You may also overtype the pre-defined selections using CRONTAB. There are two Notification Types: (a) New Alarms and Events since Last Notification will send an for Alarms or Events that have occurred since the rule last ran. If an alarm was active and cleared during the period, it WILL still trigger an , but will show as resolved. Enable Include Newly RESOLVED Alarms if you want a second sent when an active alarm is cleared/resolved. (b) Currently Active Alarms Only will send an for any of the selected Alarms that are currently in the active state the moment the notification engine runs. This is useful to continually send reminder s on more critical alarms (e.g.-site or Server Down). A best practice is top air this with a rule for New Alarms and Events to be notified immediately on the first occurrence, then setup a Currently Active rule with a Frequency of 15 or 30 minutes for continued reminders. Note that this setting is only for Alarms and will not send an for an Event. Four alert formats are supported. Default is designed for s that would appear in normal programs like Microsoft Outlook or Google Gmail. Compact is designed for s destined for mobile devices. The format is abbreviated so that you are unlikely to have to scroll to read an alert. You may also select Autotask, in which case a ticket will be created based on the assignment rules in Settings- >Options/Autotask, covered later in this document. The Customer and Filter By dialogs allow you to create alerts for specific customers, locations, or on the basis of the data that you put in any custom custom column. If you choose a Customer, then Filter By Location on the left dialog and then Location in the right Filter dialog, you will create a notification rule that just sends s about that customer ID with that location to the specified address. V

36 XII. Analytical Tools in the ProactiveWatch Explorer All of the Tools discussed in this section are accessible from within the ProactiveWatch Explorer by either selecting a row (selecting a monitored device) and then pulling down the Tools menu, or right-clicking upon the selected row and choosing the tool. Show Issues Show Issues rolls up the alarms that have occurred on the selected devices for the last 24 hours, 3 days, or 7 days. In the image below, the breakout of the errors in the Application Event log by source is displayed. This can be very useful for determining the pattern in a series of problems on a server. View Metrics Since ProactiveWatch collects data every 10 seconds, the last 360 samples represents the last hour of data for a monitored device. That data is presented in a summary form in the View Metrics dialog shown below. V

37 Creating a Time and Date Based Snapshot You can select any set of rows in the Explorer, and create a time and date based snapshot for those servers, workstations, and network devices. To create the snapshot, select the rows of interest, rightclick and choose Create Profile Snapshot. You can then compare the current state of any server, workstation or network device to that Snapshot in System Compare, Applications Compare, and Published Applications Compare. V

38 System Compare Selecting any set of devices, and then selecting System Compare produces the comparison table below. This table allows you to compare the System Profile of any set of devices to each other, and to the a state at a previous point in time. In the example below, the current states of Panthro and Panthro2 are compared to each other, and to a snapshot of Pantho that was made on 5/10/2007 at 11 AM. Snapshots can be made of any set of managed devices at any time, and can then be pulled up for comparisons. Application Compare Application Compare allows you to compare the installed software across any set of managed devices, and compare the currently installed set, to the set that was installed when you made a snapshot. In the example to the right, Panthro2 has Windows Server 2003 SP1 and a number of security updates that are not present on Panthro. Since both of these servers are load balanced web servers in a farm they are supposed to be identical. However you can also see that they have both been updated to the newest version of the ProxiAgent. V

39 Event Log Analyzer ProactiveWatch automatically collects the Applications and Systems logs from every monitored Windows Server and Workstation. This data is then summarized in the ProactiveWatch database, and can be browsed in the Event Log Analyzer. The Event Log Analyzer allows you to choose the day you want to browse, the computer you want to browse, the Windows Event Log to browse, and then your choice of all log sources or an individual one. The detail table can be sorted by any column heading to, for example quickly bubble up all of the errors. Distribution Graph The Distribution Graph allows you to compare key metrics across servers, and look at their average, minimum or maximum values. This graph accesses up to seven days of historical data. An extremely useful application of this graph is to find the maximum number of concurrent users across a set of terminal servers in the last N days. V

40 Trend Graph A Trend Graph for a wide variety of metrics going back up to seven days provides for a valuable look at upcoming problems. For example, the trend in physical memory utilization for Panthro is definitely both up and nearing the maximum acceptable level. Multi-User Impact Analysis The Multi-User Impact Analysis graph is very useful to determine how Citrix and MS Terminal Servers are running out of capacity as user load grows. The graph to the right collects the last 7 days of concurrent usage data along with how key system metrics change as user load grows. This server is at 80% of physical memory at 23 concurrent users. Additional users on this server would not be a good idea. V

41 XIII. Updating Agents and Gateways to Future Versions Your subscription to ProactiveWatch includes automatic access and upgrades to all future hot fixes, patches, updates, and major versions. ProactiveWatch also includes an incredibly easy process to distribute these new versions of the product to your internal and customer systems. In the cases where future versions include updates to the Gateway or the Agent components, you use the SettingsManage Updates feature of the Explorer to distribute and install the new versions. Manage Updates allows you to control which servers and workstations get updated, and you have this control on a per customer or per server/workstation basis. To use Manage Updates, take the steps below: 1. Go to SettingsManage Updates. 2. The Express tab will tell you how many of each type of agent and gateway components need to be updated. 3. If you would like to update all of your workstations and servers at one time, hit the Schedule All Updates button. 4. If you would like individual control over which customers and serves to upgrade, select the Advanced Tab. This will bring up the dialog to the right. 5. You can choose to only display the computers at one customer site in the Customer pull down. 6. The Status pull down allows you to display All Computer, Computers for which an Update is Available, and Computers for which the Update has been scheduled. 7. To update a set of computers, multi-select them in the table and then hit the Schedule Updates button. 8. If you like to track the progress of the update, go to SettingsManage Columns and add Agent Version as a column in the Grid View. This will give you a real time display of the progress of the updates as you will see the version numbers of the components change as they are updated. V

42 XIV. Integration with LogMeIn IT Reach and the LogMeIn Network Console ProactiveWatch includes integration with the LogMeIn IT Reach Remote Control Service. You can buy LogMeIn agent licenses and LogMeIn Network Console licenses on the Price Plans page of the ProactiveWatch Manage Site. The process of buying LogMeIn licenses, setting up your account, and installing LogMeIn agents is documented in ProactiveWatch Quick Start Guide. Once your LogMeIn account is set up, and you have installed your purchased licenses, you can launch the LogMeIn multi-server Network Console from the ProactiveWatch Explorer by selecting ToolsLaunch Network Console from the ProactiveWatch Explorer. The multi-server network console allows you to start a remote control session with any server or workstation upon which you have installed LogMeIn agents. If you wish to directly launch a remote control session on one server or workstation, select that computer in the ProactiveWatch Explorer, right-click and choose Remote Control. This will launch the single session version of the LMI Network Console directly into a remote control session for that computer. V

43 V

44 XV. Using A Different Remote Control Method than LogMeIN LogMeIn is the default remote control method for ProactiveWatch. If you wish to use a different method, you can still launch the method of your choice. To configure a different remote control method than LogMeIn, take the following steps: 1. Use SettingsManage Columns to add the Remote Control column to the grid view of your Explorer as shown below (this is not essential, but it lets you see what you are doing). 2. Highlight the row containing the server that you would like to set up your own remote control session to. 3. Right-click and select Properties 4. Find the remote control field and put the launch string for your remote control method into the blank field for remote control. 5. Note you can use the data in any column as input to your remote control launch string. In the example below, Microsoft Terminal Services (MSTSC) is used being launched to the IP address of the ProactiveWatch Gateway for that site. Since Gateway IP is an Explorer field, you can put it into the remote control launch string bracketed by $ (mstsc /v:$gateway IP$). You can also create custom fields and put custom data in those fields if you like. 6. Once you get a general remote control launch string that will work for more than one computer, go back to properties and copy the string into the clipboard. Then select the rows that you would like to apply this string to, right click, select Fill Cells, choose Remote Control as the field to fill, and then paste your string into the data field. V

45 XVI. Autotask Integration ProactiveWatch can easily be seamlessly integrated with Autotask. In order to integrate the two products, configuration must be done on both ends. Autotask must be set up to recognize ProactiveWatch, and viceversa. Configuring Autotask You must first enable third party integration with your AutoTask site by navigating to the Admin/Setup screen and expanding the navigation tree to display the AutotaskExtend, Tools, Add Ticket Service node. V

46 Click on the Add Ticket Service node. You will then be shown a configuration dialog box similar to the following: Copy your Service Provider ID and Service Provider Password to a temporary file or the clipboard where you will be able to access it when configuring the ProactiveWatch Explorer. After storing the id and password, set the default values for tickets created by ProactiveWatch. These are the values that new tickets created by ProactiveWatch will contain. In order to verify that your installation is working correctly, click on the Notification tab and add entries for both the Successful Ticket Creation and Unsuccessful Ticket Creation portions of the notification tab. This will allow you to see if there are errors or if the ticket from ProactiveWatch was processed successfully. Press the Save and Close button at the top of the dialog box. V

47 Configuring ProactiveWatch There are several options that need configuring within the ProactiveWatch Explorer in order to integrate with Autotask. Open the ProactiveWatch Explorer and go to SettingsOptionsAutotask. A dialog box will be presented and you should select the Autotask tab. Copy the Service Provider ID and Service Provider Password that you recorded from the Autotask site and input them into the Service Provider ID and Service Provider Password textboxes, respectively. Next, you must map your ProactiveWatch customers to your Autotask customers. To do so, add a row in the ProactiveWatch to Autotask Customer Mapping grid for each customer. Within each row, specify a ProactiveWatch Customer Id, the corresponding Autotask Customer ID and the corresponding Autotask Contact . The Autotask Customer ID should be the Account ID of your customer within Autotask. If no match can be found for the Autotask Customer ID, Autotask will attempt to match to an address specified by the Autotask Contact field. If no match can be found there, then the notification will fail. V

48 The last step in the integration of ProactiveWatch and Autotask, is to configure ProactiveWatch alerts that use the Autotask compatible format. Go to SettingsNotification Rules in the ProactiveWatch Explorer. Pull down the Rules dialog, and select Add Rule In the Format pull-down, select Autotask as the desired format for the Notification Rule you are creating. When you select Autotaks as the Format, and To field becomes grayed out since sendmail is not used to send s from ProactiveWatch to Autotask (a dedicated web service is). Now choose the ProactiveWatch alarms that you would like to have be a part of this new Notification Rule by moving them to Selected column on the right. When these alarms occur, notification of them will be automatically passed to Autotask. You can also create customer specific rules for notifications that get passed to Autotaks by using the Filter pull downs. V

49 XVII. The ProactiveWatch Mobile Web Console In addition to the full.net Console that is used to control all aspects of ProactiveWatch, a web console that is specifically formatted for mobile devices is also available. To access the mobile web console for your account go to: This will take you to the web page below, where you can log onto the web console with your VAR ID, your Explorer Logon ID, and your Explorer password. If you have sold a customer console to one of your customers, they can also log on to this console with the Explorer credentials that you provided them. The mobile web console is a great way to stay in touch with the systems at your customer sites while you and your consultants are travelling. V

System Administrators Guide

System Administrators Guide System Administrators Guide v130501 2013 RapidFire Tools, Inc. All Rights Reserved Table of Contents I. ProactiveWatch Technical Architecture... 4 II. Installing ProactiveWatch at a Customer Site... 6

More information

What s new in ProactiveWatch 2.1!

What s new in ProactiveWatch 2.1! What s new in ProactiveWatch 2.1! 1. ProactiveWatch 2.1 brings tighter integration with the RemoteCommand (FreeMyIT) system, providing new Task Manager -like features available from Manage Computers, including

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Remote Control 5.4 Setup Guide

Remote Control 5.4 Setup Guide Remote Control 5.4 Setup Guide A remote control solution designed for Network Administrators Copyright 2014, IntelliAdmin, LLC Revision 5/15/2014 http://www.intelliadmin.com Page 1 Table of Contents Quick

More information

ProactiveWatch Monitoring For the Rest of Us

ProactiveWatch Monitoring For the Rest of Us Citrix Server Monitoring Without the Hassles and Cost ProactiveWatch Monitoring For the Rest of Us Written by: Douglas. Brown, MVP, CTP President & Chief Technology Officer DBCC, Inc. www.dabcc.com Page

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

User Manual. 3CX VOIP client / Soft phone Version 6.0

User Manual. 3CX VOIP client / Soft phone Version 6.0 User Manual 3CX VOIP client / Soft phone Version 6.0 Copyright 2006-2008, 3CX ltd. http:// E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Rapid Assessment Key User Manual

Rapid Assessment Key User Manual Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

orrelog Ping Monitor Adapter Software Users Manual

orrelog Ping Monitor Adapter Software Users Manual orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

ChromQuest 5.0 Chromatography Data System

ChromQuest 5.0 Chromatography Data System ChromQuest 5.0 Chromatography Data System Administrator Guide CHROM-97251 Revision A March 2008 2008 Thermo Fisher Scientific Inc. All rights reserved. Surveyor is a registered trademark of Thermo Fisher

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Monitoring Configuration User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

CamGuard Security System CamGuard Security System Manual

CamGuard Security System CamGuard Security System Manual CamGuard Security System Manual JMC Electron Co.,LTD Brief Introduction... 3 Features... 3 System Requirements... 3 Configuration... 4 Add Camera... 4 Device Options... 4 About Alarm... 5 Alarm Actions...

More information

Kaseya 2. User Guide. for VSA 6.3

Kaseya 2. User Guide. for VSA 6.3 Kaseya 2 Remote Control User Guide for VSA 6.3 May 10, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Mercy s Remote Access Instructions

Mercy s Remote Access Instructions Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3

More information

MailEnable Installation Guide

MailEnable Installation Guide MailEnable Installation Guide MailEnable Messaging Services for Microsoft Windows 2000/2003/2008 Installation Guide for: MailEnable Standard Edition MailEnable Professional Edition MailEnable Enterprise

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

CHAPTER. Monitoring and Diagnosing

CHAPTER. Monitoring and Diagnosing CHAPTER 20. This chapter provides details about using the Diagnostics & Monitoring system available through ShoreTel Director. It contains the following information: Overview... 661 Architecture... 661

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Installation Guide: Delta Module Manager Launcher

Installation Guide: Delta Module Manager Launcher Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.1 Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.1 January 17, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher OPERATION MANUAL MV-410RGB Layout Editor Version 2.1- higher Table of Contents 1. Setup... 1 1-1. Overview... 1 1-2. System Requirements... 1 1-3. Operation Flow... 1 1-4. Installing MV-410RGB Layout

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

WhatsUp Gold. User s Guide. Software Version 4. Ipswitch, Inc.

WhatsUp Gold. User s Guide. Software Version 4. Ipswitch, Inc. User s Guide Software Version 4 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Fax: 781-676-5710 Lexington, MA 02421-3127 Web: http://www.ipswitch.com The information in this document

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

WebEx Meeting Center User Guide

WebEx Meeting Center User Guide WebEx Meeting Center User Guide For Hosts, Presenters, and Attendees 8.17 Copyright 1997 2010 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

LifeSize UVC Manager TM Deployment Guide

LifeSize UVC Manager TM Deployment Guide LifeSize UVC Manager TM Deployment Guide May 2014 LifeSize UVC Manager Deployment Guide 2 LifeSize UVC Manager Network administrators who use UVC Manager to manage video and voice communications systems

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

Email Client Configuration Guide

Email Client Configuration Guide Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

ACP ThinManager Tech Notes Troubleshooting Guide

ACP ThinManager Tech Notes Troubleshooting Guide ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual

More information

User Manual. IP Camera Recorder. www.allthings.com.au

User Manual. IP Camera Recorder. www.allthings.com.au User Manual IP Camera Recorder I. Preface IP Camera Recorder is a 36 Channel Camera recording software which supports IP Camera, and Camera Server. Users use this software to monitor real-time Camera,

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Chapter 3 Application Monitors

Chapter 3 Application Monitors Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer

More information

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Remote Support. User Guide 7.23

Remote Support. User Guide 7.23 Remote Support User Guide 7.23 Copyright 1997 2011 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks or registered trademarks

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

Results CRM 2012 User Manual

Results CRM 2012 User Manual Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation

More information

WhatsUp Event Alarm v10x Quick Setup Guide

WhatsUp Event Alarm v10x Quick Setup Guide WhatsUp Event Alarm v10x Quick Setup Guide Contents CHAPTER 1 WhatsUp Event Alarm Quick Setup Guide Microsoft Vista/Server 2008/Windows 7 Requirements/Recommendations... 3 Before You Begin... 7 Installation

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

ERserver. iseries. Work management

ERserver. iseries. Work management ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication

More information

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. I. Service Definition Infront Webworks, will provide you with cloud based services and other application

More information

Symantec Mobile Security Manager Administration Guide

Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with

More information