1 TERMINAL SERVICES LOG The easy way to monitor servers, users, applications and licenses PRODUCT BROCHURE Contents TERMINAL SERVICES LOG 2 Business drivers 2 Challenges 2 What are the benefits for your company? 3 Remote workforce performance tracking 3 Balancing software licenses used on the servers 4 Server performance monitoring 5 Achieve regulatory compliance with least effort 6 How does Terminal Services Log work? 7 System Requirements 8 4 easy steps to set TSL up and running 9 Customers 10 Customer testimonials 10 List of TSL Reports 11 Contact 12 North America Sales and Support 12 UK/EMEA 12 Asia and Pacific 12
2 TERMINAL SERVICES LOG Keeping an active eye on your terminal servers prevent, monitor, report! Terminal Services Log improves the way you manage your heterogeneous Microsoft Remote Desktop Services and Citrix XenApp (formerly terminal services and presentation server) environments. Terminal Services Log is a server monitoring application that allows you to easily monitor user activities on your Microsoft Windows Remote Desktop Services and Citrix XenApp server or farm. It tells you which users are logged on to your server, which applications they are using, performance of the servers and more. Why you need Terminal Services Log BUSSINESS DRIVERS TERMINAL SERVER CHALLENGES OF TS MGMT TERMINAL SERVICES LOG Work from home Outsourcing Hotdesking Mobile workforce Centralized desktop strategies Virtualization Remote access capabilites Multitier infrastructure Variety of haterogenous applications Access from distributed, multivendor devices and locations Centralized data Complex software licensing management Balancing system resources Increased regulatory requirements Missuse/theft of proprietary data Licensing optimization Workforce efficiency tracking Servers performance monitoring Regulatory compliance Increased security Business drivers Increasingly, businesses want to enable their employees and contractors to work from home or from a non-company-owned facility. Hot-desking, virtual work style, and embracing employeeowned devices require seamless remote connectivity and rich applications to be integrated with local desktops which in turn results in improved remote workers efficiency and experience. The strategies of centralizing applications and data provide business continuity, workforce mobility, improved cost control and a lower environmental footprint. Challenges While boosting the overwhelming business advantages, remote access capabilities increase the need for security, compliance and effective management. Terminal server environments are multi-tier and distributed by their nature. Without a server monitoring tool the IT is inevitably losing control over remote users, applications and licenses, regulatory compliance and server performance.
3 What are the benefits for your company? Terminal Services Log empowers the IT team to implement optimal server licensing, to monitor workforce activity, to balance server configuration and achieve compliance while preventing security breaches. Remote workforce performance tracking By reducing the number of full-time employees on site, corporations are taking in higher productivity and savings. One of the challenges of the virtual work arrangements is to track how efficient off-site employees are. With an extensive list of user reports, Terminal Services Log makes it easy to track user activity and efficiency. Challenge Monitoring outsourced work: monitoring remote workers activity, obtaining accurate reports and avoiding overcharges. Tracking virtual teams whose members are dispersed all around world. Work from home: billing for overtime per hour. Automatic timesheet data collection: tracking employee s attendance and having payroll calculation data ready. TSL Solution Set for a monthly, weekly or any custom date range, User Activity by State Report specifies the actual working hours. Daily Activity Reports combined with Application Reports and respective filters let you monitor each worker (activity or idleness duration, applications used). Monitoring is real-time enabled. Compiling and filtering data from User Activity Report, File Audit Report and User - Application Summary indicates the time each team member contributed to the project and if they have been working on the given assignments. Track precisely how much each of the employee was connected after business hours or via VPN connection (with the breakdown to active and idle status). The Daily Activity Report is easily exported enabling you simple overtime payment calculation. For banks, retail stores and other businesses whose workforce is relying mostly on thin clients, TSL can replace the time tracking software completely. Session Log Summary Report provides you with a start time, end time, and duration of work (split into active, idle, and disconnected time). No need for extra software and hardware, ID cards and no need to punch in or out to a software (or hardware) but only to login for your usual work.
4 Balancing software licenses used on the servers Software asset management is challenging enough. It s even more challenging if your network environment includes servers running Citrix XenApp or Microsoft Remote Desktop Services. Terminal Services Log tracks all licenses being used on the server, or across all servers in the farms (RDS/TS user and device CALs, Citrix Concurrent licenses, user and device licenses for all applications running on terminal server). TSL is the means to analyze and improve your licenses portfolio. Consequently, you will reduce the costs associated with software licenses, meet compliance standards and minimize the risk of painful audits. Challenge Finding optimal licensing mode for Remote Desktop Services. Choose between Per User and Per Device mode. Are you over-licensed or under-licensed for a specific software product? Assuring Citrix XenApp or RDS license compliance. Tracking how many concurrent users are utilizing an application through the day. Determining what apps are not being used or what are used the most. TSL Solution Farm License Compliance Report renders data of both, per Device and per User licenses. The report shows if this farm is accessed by more devices or users. If you have more devices then users you will choose the Per User mode and achieve savings by purchasing only the licenses you actually need. Application License Compliance Report shows the number of licenses consumed for any chosen application(s). If you enter the number of licenses you purchased you will get a clear scoreboard indicating over and under licensed apps. Concurrent Usage Reports tracks concurrent usage (CCU) presented as monthly data that can be drilled down to days and hours. Analysis given by this set of reports lets you establish and keep the licensing balance required for support to smooth business operations. Application Reports are calculating concurrent usage by application and concurrent apps by user. User - Application Summary and Most Used Applications by User reports can be sent regularly to your application team providing the important data as a basis for the informed decisions about the optimal set of applications and licensing schema for each software product.
5 Server performance monitoring Every server requires monitoring and reporting for applications and users to evaluate server/farm activity, watch trends, diagnose system bottlenecks, and gather data that can help to determine whether the current system configuration is sufficient for given task. Challenge Back-up strategies: defining optimal periods to perform back-up activities. Capacity planning: analysis and adjusting hardware and software infrastructure of the Terminal server environment. Fitting more users to a given server configuration: look for bottlenecks. Increasing processing power of your server by identifying unneeded activities that are using processor resources and eliminate them. TSL Solution Weekly Activity Report serves in determining weekdays with least user activity, while Daily Activity Report reveals the optimal daytime period for backup. Set of Performance Reports monitors memory and CPU consumption of individual server or servers across a farm, as well as application(s) and user(s) resources usage. Performance Reports provides the complete view of resources (CPU, Memory) being used by each application and allows to act proactively by adding more hardware resources when needed. User Performance Reports determine how much CPU and memory is being used by each user connected. Merged with RDP/ICA Network Traffic Reports the data indicates the bottlenecks and the paths to avoid and remove them. Application Performance Reports help system managers to determine applications or combinations of software that are causing system slowdowns and crashes. It s easy to isolate software which might be causing system problems.
6 Achieve regulatory compliance with least effort For organizations of all sizes and industries regulatory compliance, corporate reporting and auditing practices have become a critical issue. Regulatory bodies and acts such as Basel II, PCI Data Security Standard, Sarbanes-Oxley Act, Gramm- Leach-Billey Act, HIPAA, FISMA, USA Patriot Act, Turnbull Guidance 1999, UK Data Protection Act, EU DPD - all require event retention, access control and confidential information security. Terminal Services Log can assist you in meeting compliance with parts of the above mentioned regulations. Compliance requirement Monitoring of access to databases, files and folders as well a file integrity monitoring. Continuous monitoring of user accounts used by vendors. Enforcing separation of duties through assigned access authorizations. The capability to determine whether a given individual took a particular action. Employing tools and techniques to monitor events on the IT system, intrusion detection and prevention, monitor network traffic and alert to suspected compromises. TSL Solution Terminal Services Log allows you to monitor all user activities performed on the file system. File Audit Log Report records all read, write, append and delete operations performed on files and folders. The extensive data provided by the set of User Reports enables detail analysis of users activity: logging info, activity statuses and duration, resources used and similar. Active Directory integration supports automatic creation of reports for a specific group and organizational units. Terminal Services Log is the first and only application that logs sessions for every user. Therefore, tracking of all user logons and separation of duties through individual user ID s ensures clearly identifiable users at all times. Custom report feature lets you compile any given set of data for a specific user or group. An alert is attached to each custom report and it is triggered once a defined condition has been met. Network Traffic Reports track and record all client names, IP addresses and network ranges. It shows source location of each user on a server alerting to possible intrusion detection. Logon Audit Report supplies a list of unsuccessful login attempts (source IP address and Client name). Time filter simplifies inspection and analysis. Real-time monitoring helps you reveal ongoing hacker attacks.
7 How does Terminal Services Log work? Agent-less servers monitoring provides fast deployment and easy maintenance Data collection and monitoring of hundreds of servers is performed from a central location with only one instance of Terminal Services Log ensuring that the data collection process does not affect performance of the tracked servers. The unique agent-less architecture provides our customers with an enterprise-ready solution with no remote agents installed (zero footprint), a fast rollout and lower TCO. Central Terminal Services Log Server console allows administrators to easily add or remove servers that are monitored. It provides one interface to view reports and configure automatic reports to be received via .
8 System Requirements.NET Framework 2.0 SP1 or later Windows Server 2000 with SP4 or later Embedded database (SQL Compact) or Microsoft 2005 SQL Server database Processor: 2.5 gigahertz (GHz) RAM: 1 gigabyte (GB) Disk: NTFS file system formatted partition with a minimum of 100 MB of free space Microsoft Terminal Services on Windows 2000, 2003 and 2008 R1 and Remote Desktop Services on Windows 2008 R2 Citrix XenApp 5, 6 or 6.5 or Presentation Server 4.0/4.5 Citrix MetaFrameXP
9 4 easy steps to set TSL up and running 1. Download the software for trial period from our pages. 2. Prepare your server for installation by configuring the Active Directory user that is the local admin on all servers. 3. Install Terminal Services Log installation requires 5 easy clicks and only few basic parameters to be set. You need to define service user, SQL database to be used. 4. You need to define the service user and the SQL database. If you find it useful and fitting your needs purchase (http://www.terminalserviceslog.com/orders/) and activate with the code.
10 Customers Customer testimonials TSL has proven invaluable in telling us who is using the system, which applications they use the most often, and - most importantly - attempts at unauthorized system access. The ability to have all that ed to management not only makes my job easier, but it gives them the data they need to keep the system funded and growing. TSL has paid for itself many times over in labor savings. I can t imagine running this system without Terminal Services Log now. Chris Chandler, Lab Manager, Cisco Systems I have been doing configuring, managing and securing Terminal Services environments for a number of years. TSL allowed me to keep an active eye on what is happening on my Terminal Servers - who is logged on and from where, which applications they are running and much, much more - all of which make my IT management life much easier. Bradley J. Dinerman, Fieldbrook Solutions Microsoft MVP Security, CISSP, Ph.D Best bet would be TSLog solution. Great product and great people behind it too! Alex Juschin MVP Remote Desktop Services/Terminal Services, Citrix CTP I can honestly say I ve never had such good support from a product vendor before. Andrew Kinsey, All Risks, Ltd.
11 List of TSL Reports User Reports Time on System (monthly/daily) Individual Gantt Charts User Activity Timeline Session Log User Count per Day User Activity by State Most Active Users by State Session Log Summary Network Traffic Reports IP Addresses and Client Names Network Traffic by User Network Traffic by Date Network Traffic by Server Network Traffic Details Groups and OUs User Activity by Group User Activity by Organizational Unit Concurrent Usage Reports Concurrent Users per Day Concurrent Users per Hour Concurrent Users per Hour Details Display Reports Screen Resolutions Use Color Depths Use Client Versions Application Reports Most Used Applications Application Usage Summary Application Usage History Total Application Instances per Day / per Hour Concurrent Application Usage per Day / per Hour Concurrent Application Usage per Hour Concurrent Apps by User per Day / per Hour License Reports Application License Reports Used Application Licenses Application License Compliance Application License Details Suite License Compliance Suite License Details Client License Reports Client License Compliance Client License Details Audit Reports File Access Audit Log File Access Audit Log Summary Logon Audit Report Performance reports Farm Performance Farm Processor Performance Farm User Tim Performance Farm Physical Memory Usage Farm Committed Bytes in Use Performance Farm Daily Processor Performance Farm Daily User Performance Farm Daily Memory Performance Farm Daily Committed Bytes Performance Server Performance Processor Time Performance User Time Performance Physical Memory Usage Committed Bytes in Use Daily Processor Performance Daily Committed Bytes Performance Daily User Time Performance Daily Memory Performance Application Performance Overall Processor Performance by Application Overall Working Set Performance by Application Application Processor Performance by Date Application Working Set Performance by Date Application Processor Performance by Hour Application Working Set Performance by Hour User Performance Overall Processor Performance by User Overall Working Set Performance by User User Processor Performance by Date User Working Set Performance by Date User Processor Performance by Hour User Working Set Performance by Hour
12 Contact North America Sales and Support 845 South 1St Street Ronkonkoma, NY 11779, USA Toll Free (US only): (866) Phone number: (631) Alternative number: (360) Website: UK/EMEA Gradiscanskih Hrvata 24, 3rd Floor Split, Croatia, Europe +1 (631) (360) Asia and Pacific +1 (631) (360) Website:
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
M86 MailMarshal Exchange USER GUIDE Software Version: 7.1 M86 MAILMARSHAL EXCHANGE USER GUIDE 2011 M86 Security All rights reserved. Published November 2011 for software release 7.1 No part of this Documentation
Managed Workplace 2012 Setup Guide On Premise See All. Manage All. Service All. www.levelplatforms.com TABLE OF CONTENTS Welcome... vii About this Document... viii Where To Get More Help... viii Contact
IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
How AWS Pricing Works May 2015 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction...
Estimating the Cost of a GIS in the Amazon Cloud An Esri White Paper August 2012 Copyright 2012 Esri All rights reserved. Printed in the United States of America. The information contained in this document
VMware Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
DocuFire for Windows User Manual Version: 5.20 Date: February 19, 2010 Web: http://www.docufire.com TABLE OF CONTENTS Introduction to DocuFire for Windows... 4 Contacting Technical Support... 4 Getting
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
The Business Management Solution for Small and Midsize Enterprises Solution Overview Contents Introduction 3 SAP Business One: Key Differentiators 4 Business Benefits 5 Functionality Overview 6 Finance
BT CLOUD VOICE. CUSTOMER ADMINISTRATOR GUIDE. A comprehensive guide to setting up and using the many features of BT Cloud Voice, and how they can help you get the very best out of your business. WHAT S
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
Getting Started Guide StarTeam Borland Software Corporation 100 Enterprise Way Scotts Valley, California 95066-3249 www.borland.com Borland Software Corporation may have patents and/or pending patent applications
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
Getting Started Guide www.exclaimer.com Contents About This Guide... 2 Mail Disclaimers Overview... 3 What Does Exclaimer Mail Disclaimers Do?... 3 But That s Not All... 3 And There s More... 3 How Does
TheFinancialEdge End of Year Guide 121213 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including
Microsoft Corporation and HP Using Network Attached Storage for Reliable Backup and Recovery Microsoft Corporation Published: March 2010 Abstract Tape-based backup and restore technology has for decades
Google Apps as an Alternative to Microsoft Office in a Multinational Company The GAPS Project Thesis presented in order to obtain the Bachelor s degree HES by: Luc BOURQUIN Supervisor: Thierry CEILLIER,
Securing Enterprise Applications Version 1.1 Updated: November 20, 2014 Securosis, L.L.C. 515 E. Carefree Highway Suite #766 Phoenix, AZ 85085 T 602-412-3051 firstname.lastname@example.org www.securosis.com Author