ProactiveWatch Monitoring For the Rest of Us
|
|
- Tamsin Alexandra Sharp
- 8 years ago
- Views:
Transcription
1 Citrix Server Monitoring Without the Hassles and Cost ProactiveWatch Monitoring For the Rest of Us Written by: Douglas. Brown, MVP, CTP President & Chief Technology Officer DBCC, Inc. Page 0
2 Citrix Server Monitoring Without the Hassles and Cost ProactiveWatch Monitoring For the Rest of Us Executive Summary re you responsible for a small to medium size Citrix Server deployment? re you a consultant or VR responsible for customer Citrix deployments? If so then you must read on! few weeks ago I attended Citrix iforum and as many of you know, I m a huge fan and proponent of performance monitoring and management solutions. This being said, I must admit I was taken back a bit that at iforum, Citrix managed to mention their new EdgeSight end user application performance monitoring solution at least once in every breakout session. Now I understand it is a new solution for Citrix and that they want to get their message out but it made me think, what is the customer problem that Citrix is trying to solve with EdgeSight? If we look at the Citrix customer base, they have around 160,000 customers and over 5,000 VR partners worldwide. EdgeSight is designed to be a big boy application performance monitoring tool that requires a bit of knowledge to setup, configure and manage, not to mention some additional hardware. I also think that a good chunk of those 160,000 customers are not big boy enterprises and they don t want more infrastructure and more hardware. This being said, for how many of those customers is EdgeSight ultimately the correct solution? I think the answer is that over time Citrix EdgeSight will become a top shelf end user application monitoring tool for large and sophisticated Citrix deployments that are supported and managed by a large and sophisticated internal IT staff. If EdgeSight can ultimately live up to this promise that Citrix laid out at iforum, then this would be huge for Citrix, as it would solve the problem of Citrix applications performance being more difficult to monitor than on other leading edge platforms (like a web server, coupled with a J2EE (Weblogic or WebSphere) applications server, and a back end Oracle database). So, if one day Citrix EdgeSight solves the large and sophisticated customer problem, what is left? The answer is that I believe most of the Citrix deployments in the world are small (less than 10 Citrix Servers, and less than 30 total Windows servers). These deployments are managed in many cases by an IT staff that is spread too thin, with too many tasks and operating on a limited budget with no ability to put in, much less maintain an onsite application performance monitoring and management solution. In fact the overwhelming majority of the Citrix deployments in the world are not managed by the internal IT staff at all, but by consultants who work for the VR who installed and built the Citrix servers. If this sound like you then you must read on Page 1
3 1 Introducing ProactiveWatch Last year, I got my first exposure to ProactiveWatch, a company that has completely taken a different approach to monitoring Citrix environments and the servers and networks that surround them. Before I explain what ProactiveWatch is, let me tell you what it is not: 1. ProactiveWatch is not hard to install. I was able to get it up and running on the DBCC.com web servers in minutes with no configuration and no need for any backend components that I would be forced to deploy and manage. 2. ProactiveWatch is not hard to configure. It comes with templates that are preconfigured and work out of the box 3. You don t have to put in any extra infrastructure for ProactiveWatch because it is delivered on a software as a service basis (No additional servers or SQL required). You just install the ProactiveWatch agent on your servers and point them to the Proactive Watch gateway (a Windows Service running on a non-dedicated server) and then install the Console (the ProactiveWatch Explorer is a rich client.net application) on the PC or a server if you want to publish it via Citrix. You do not need to buy or install a back end database or applications servers because ProactiveWatch hosts those back end pieces for you. 4. Even though the ProactiveWatch agents at your site talk over the Internet to the hosted ProactiveWatch back-end pieces, you do not need to poke holes in firewalls to make all of this work. Just install the Gateway Service on a box that can open an outbound connection on 443 and you are good to go. 5. It does NOT COST LOT OF MONEY! ProactiveWatch is sold through the Citrix VR community (more on this later), and pricing starts at $30 per managed server per month. 6. For all of the above reasons, ProactiveWatch does not require a lot of time. The whole thing only takes minutes to install and works right out of the box. Page 2
4 2 Some Cool Things about ProactiveWatch Now that you know what ProactiveWatch is NOT and how it is different from all of the other monitoring products out there, let me tell you some things that are really unique and cool about it: 1. Despite the fact that it is inexpensive and easy to set up, it understands what a Citrix server is and what happens on Citrix Servers. It collects its data once every 10 seconds, and collects it on a per process instance basis. So, it not only tells you that Outlook is causing a problem, but whose instance (what user ID) of Outlook it is. 2. When a problem occurs it snap-shots the state of the server. Then it captures the detail of which individual processes are causing the problem. It also captures the entire System Profile, and set of installed pplications, Security Updates and Hot Fixes that were in place at the time of the issue (see a screen shot of the diagnostics that come with an alarm below). Page 3
5 3. ProactiveWatch monitors networks at the applications level of the TCP/IP protocol. Most monitoring products use ICMP Ping to measure latency between two end points on a TCP/IP network. The issue with Ping is that a blue-screened server with a smart network card will quickly respond to a Ping when in fact the server is useless from the perspective of doing any real work for users. ProactiveWatch establishes a socket between any two computers where you want to monitor network latency, which means that it is measuring the performance of the network from the perspective of the applications that are using that network. 4. ProactiveWatch has extremely cool capacity and load analysis features that are actually useful in a Citrix or MSTS environment. The ProactiveWatch agent collects the number of active sessions on the server every 10 seconds and also collects 9 key utilization metrics (like CPU, Physical Memory, Virtual Memory, etc.). The system keeps the maximum levels for each of these metrics for the last 24 hours, 3 days and 7 days for each level of active concurrent user. So, you get a real picture of maximum resource utilization as the real load grows on your servers. In the screen shot below, you can see that the server is at 80% of Physical Memory once it gets to around 21 or 22 concurrent users. My guess is that once load gets above 23 or so concurrent users, this server will not be delivering a good experience to its users. 5. ProactiveWatch couples the capacity analysis with true analysis of load over the course of the day. The graph below shows that the server spends most of its day above 20 concurrent users. (Poor users! I m feeling sorry for the admin too.) Page 4
6 6. I also really like the ability on the part of ProactiveWatch to compare servers (or workstations) to each other. Let s first take a look at the load graphs for two servers that are supposed to be the same, CTX01 and CTX04 (same hardware, software, published apps, etc.). But as you can see they are reacting very differently to the load. CTX01 is running out of memory and CTX04 is not. Why? The reason why is that different software has crept onto these two supposedly identical servers..net and Java are both on the server that is running out of memory (imagine that), and not on the other one. If you are a VR you can even do this comparison across servers at many different customer sites to ensure consistency of servers. The comparison below shows the differences in applications, security updates, and hot fixes that are installed across CTX01 and CTX04. These comparisons can be done across any number of servers, and can even compare servers at the partner s site, to servers at the customer s site. Page 5
7 ProactiveWatch also allows you to compare hardware profiles and even published applications across any set of servers (again even across servers that are installed at different customer sites). n example of a hardware profile compared across four different Citrix Servers in a farm is below. Notice that the hardware for CTX01 and CTX04 is the same, which points us back to.net and Java as the cause for the memory issues on CTX01. 3 The Monitoring Details So what exactly does ProactiveWatch monitor? Well contrary to most of the monitoring products out there today that try to take a variety of PerfMon Counters, collect them and make sense of them, ProactiveWatch works by collecting the information that is inherently useful in the first place. So, other than the core CPU, Memory, Disk, etc. metrics that it collects frequently along with per process instance granularity, most of the effort expended by ProactiveWatch is upon uniquely valuable information. Here is a list of the various monitors, the data they are based on, and how they work: 1. Connectivity this is a socket between the agents at the customer site and the ProactiveWatch back end. If you want to know if a computer or a site has dropped off of the Internet, this monitor will tell you. The diagnostics for this monitor run a tracert from the ProactiveWatch back end back to the agent that dropped off, so you can follow the trail of where the connection died. 2. Latency this is a round trip test packet over a socket connection between the agents and the ProactiveWatch back end. gain this is what a browser would experience trying to connect to a web server, not an ICMP Ping. Page 6
8 3. Client2Server Latency this is a round trip test packet over a socket between any two sets of computers. So this can measure applications level latency between a remote site and the Web ccess Gateway, between Web ccess Gateway and the Citrix Farm, and then between the Citrix Farm and the back end servers. 4. CPU the server is running out of CPU, or a single process is using all of the CPUs on the server. 5. Memory the server is running out of either Physical Memory or Virtual Memory. 6. Disk the server is running out of disk space on a monitored drive. 7. Boot the server has rebooted. If this happens during the nightly reboot window it is not a problem, but not if it happens in the middle of the day. 8. pps an application has been installed or uninstalled. 9. Profile the system profile has changed. This can be a change in IP address, a change in memory, etc. 10. Registry the Run or RunOnce sections of the Registry have been changed. This detects software that has been installed without going through add/remove programs. 11. Crash a process has crashed. The diagnostics include the Dr. Watson log entry for the module that caused the crash. 12. Service a monitored service has gone down. ProactiveWatch can monitor manually specified services, or all automatically started services. 13. Process a monitored process has gone down. 14. Log a monitored event log entry has occurred. 15. Port either a desired port (1494) is not listening, or an undesirable port (like an FTP server on a Citrix server) has shown up where it should not be. 16. gent Types ProactiveWatch does a great job with Citrix and Microsoft Terminal Servers, with any other type of Windows server, and also has agents for several different types of Linux. Some of the partners working with ProactiveWatch have worked with their development team to port the Linux agent into the firewalls that the partner sells. Page 7
9 4 Very Cool ProactiveWatch Things for VRs or Citrix Partners ProactiveWatch has two unique features that make it absolutely outstanding for VRs or Partners that want to use it to monitor all of the servers at all of their customer sites. The first of these is a unique communications architecture that is both one-way and Internet friendly. When you install the software at a site, you only need one non-dedicated server that can open an outbound port (443) to the public Internet. The ProactiveWatch Gateway is installed on this server its job is to collect the data from the agents at that site and send it to the ProactiveWatch back end. ProactiveWatch does not require or use any inbound connections, so you do not need to open any inbound ports to make it work. You can easily install a gateway and a couple of agents at different customer sites without having to do any firewall or router work. The diagram below shows how ProactiveWatch uses only outbound Internet friendly communications to work. Remote Site Citrix ccess Gateway VR Explorer dmin Console ProactiveWatch Gateway Port Open Outbound Only (29443) HTTPS (443) Port Open Outbound Only Internet Firewall Web Servers Firewall Customer s Other Windows or Unix Servers ProactiveWatch Backend Server Farm HTTPS (443) Port Open Outbound Only Port Open Outbound Only (29443) Customer Explorer (Optional) ProactiveWatch Gateway Internal Users Port Open Outbound Only (29080) Customer s Citrix Presentation Server Farm The next feature is that the system by default views things on the basis of Customer Location ComputerName. So the idea of one VR or Partner being able to see multiple customers systems on one pane of glass is a core built in design assumption of ProactiveWatch. The system also supports the idea of an dmin at a customer site having his own console that allows him to see only his environment, while the VR is seeing this dmin s environment as well rolled up into a view of all of the VR s customers. For VRs and Partners, ProactiveWatch therefore opens up the following opportunities: 1. The VR can resell ProactiveWatch on a subscription basis to any of his customers who have an dmin, and can then do collaborative support of the customer s issues with the dmin based upon the same set of diagnostic data. The idea of the consultant at the VR working with the dmin at the customer site on the same problem, off of the same set of data, and in real time is an absolute breakthrough. 2. The VR can make his support of his smallest customers for whom the VR is the IT department much more valuable, more nimble, and less expensive to deliver. Page 8
10 3. The VR can see the servers at the customer site change. s inconsistencies creep into the environment (user installed toolbars in IE, or hot fixes are applied only to some servers) the VR gets notified, and can do instant comparisons across servers. This includes the ability to compare servers at the customer site against a reference server at the VRs site! n example of this See all of your customers on one pane of glass view is below The dmin at the CMSI customer site would see this: Page 9
11 5 Conclusions I have seen a lot of monitoring products over the years. This is the very first one that does a great job for the small to medium sized Citrix deployments and for the dmin at the customer site at a low cost in terms of effort and money. This is also the very first monitoring product that is designed for this size of business and deployment. I have seen that it can effectively scale down to a 5 or a 10-server environment while providing such a rich level of functionality. Heck, I run it on my DBCC.com web servers and it provides me the information I to need to know what is happening and the best part is that I did next to nothing for this valuable information. Finally, I have never seen a product that is as specifically designed for the partner community as this one is. If you are a customer, then contact your reseller. If you are a Citrix partner who manages Citrix customer deployments, then this tool is perfect for you! From my first hand experiences as a consultant who was responsible for a slew of Citrix servers across many different companies, it is refreshing to know that now there is a solution that solves my problem, as ultimately my problem is the customer problem times the amount of customers I have! If you want to learn more please visit If you would like to speak to someone who will answer your questions, please send an to sales@proactivewatch.com Page 10
System Administrators Guide
System Administrators Guide v130501 2013 RapidFire Tools, Inc. All Rights Reserved Table of Contents I. ProactiveWatch Technical Architecture... 4 II. Installing ProactiveWatch at a Customer Site... 6
More informationTNT SOFTWARE White Paper Series
TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE
More informationProactiveWatch System Administrators Guide
ProactiveWatch System Administrators Guide 2012 ProactiveWatch, Inc. All Rights Reserved. V120323 Table of Contents Table of Contents 1 I. ProactiveWatch Technical Architecture 1 II. Installing ProactiveWatch
More informationNetwork Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationCitrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
More informationCitrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4
Citrix EdgeSight User s Guide Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationActiveXperts Network Monitor. White Paper
ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationHow To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationNETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION
NETWORK MONITORING & ALERTING SERVICES Complete IT Support for Business Westgate IT Network Monitoring & Alerting Services: Service Definition Service Name Network Monitoring & Alerting Services Overview
More informationRelease notes. Symantec Event Manager for Firewall. What s new. System requirements
Release notes Symantec Event Manager for Firewall What s new Symantec Event Manager for Firewall provides centralized logging, alerting, and reporting across Symantec s enterprise firewall protection solutions.
More informationApplication Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationEventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
More informationWhatsUp Event Alarm v10x Quick Setup Guide
WhatsUp Event Alarm v10x Quick Setup Guide Contents CHAPTER 1 WhatsUp Event Alarm Quick Setup Guide Microsoft Vista/Server 2008/Windows 7 Requirements/Recommendations... 3 Before You Begin... 7 Installation
More informationBarracuda Load Balancer Online Demo Guide
Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,
More informationServer Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
More informationBarracuda Message Archiver Vx Deployment. Whitepaper
Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft
More informationPFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
More informationWindows Server 2012 Server Manager
Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More informationAn Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
More informationHow To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
More informationComprehensive Monitoring of VMware vsphere ESX & ESXi Environments
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationUserLock advanced documentation
UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file
More information8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz
8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (
More informationEngagement Deployment Planning Guide
Engagement Deployment Planning Guide July 2015 2000-2015, CCH INCORPORATED, a part of Wolters Kluwer. All rights reserved. Material in this publication may not be reproduced or transmitted, in any form
More informationBenefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).
Core (1/2) Access Control Access to settings and applications can be based on Organizational Units in Directory Services like (Active Directory and Novell) or through users and groups in the domain. This
More informationProduct Review ControlUp
Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationManaging SQL Server Databases in Microsoft Clusters with CA Insight for Distributed Databases r11.2
Managing SQL Server Databases in Microsoft Clusters with CA Insight for Distributed Databases r11.2 SQL Server 2000 and 2005 Version 3.0 By Walter Guerrero Date: August 16, 2007 Table of Contents... 1
More informationUser Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts
DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These
More informationExploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence
Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing
More informationRally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
More informationSystem Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
More informationMEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied
More informationGEM Network Advantages and Disadvantages for Stand-Alone PC
Possible Configurations Turns your Contacts into a Business Network focussed on you GEM can be configured to run in many different ways. From simple stand-alone PC s or Mac s, through Client Server on
More informationSERVICE SCHEDULE DEDICATED SERVER SERVICES
SERVICE SCHEDULE DEDICATED SERVER SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a
More informationNovell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
More informationSystem Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
More informationWhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp
More informationPANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
More informationProSystem fx Engagement. Deployment Planning Guide
ProSystem fx Engagement Deployment Planning Guide October 2013 2000-2013, CCH INCORPORATED and/or its affiliates. All rights reserved. Material in this publication may not be reproduced or transmitted,
More informationBlackbaud Hosting Services
Hosting Services System Requirements / Last Updated 12/05/2012 Table of Contents Hosting Services currently hosts over 10 traditional applications and Software as a Service offerings. As such there are
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationAccess Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere
Access Database Hosting An introduction to Cloud Hosting Access databases from Your Office Anywhere Microsoft Access is a powerful way of creating bespoke database applications for either your own business
More informationRequirements Document for ROI Print Assessment/Print Manager
Requirements Document for ROI Print Assessment/Print Manager Print Manager Pre-requisites for a successful deployment Contents 1. What is - a. Print Assessment? b. Print Manager? c. ROI Analytics? 2. About
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationHow To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)
Oracle Virtualization Installing Oracle VM Server 3.0.3, Oracle VM Manager 3.0.3 and Deploying Oracle RAC 11gR2 (11.2.0.3) Oracle VM templates Linux x86 64 bit for test configuration In two posts I will
More informationSingle Product Review - Bitdefender Security for Virtualized Environments - November 2012
Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for
More informationHP Client Manager 6.1
HP Client Manager 6.1 Introduction... 2 New Features in HPCM 6.1... 4 Understanding how HPCM works... 6 Extensive reporting capability... 7 HPCM in operation... 7 Client inventory... 7 Health monitoring...
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationInvitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008
Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the
More informationEnergy Management Web-based embedded solution for monitoring of distributed conventional energy applications Type Em 2 -Server
Energy Management Web-based embedded solution for monitoring of distributed conventional energy applications Type Em 2 -Server Software solution with integrated database and webserver Monitoring and data
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationIBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationA Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationCisco IP Communicator (Softphone) Compatibility
Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows
More informationLab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
More informationRES PowerFuse Version Comparison Chart (1/9)
RES PowerFuse Version Comparison Chart (1/9) Alerting Allows you to set up notifications of specific events, which can consist of sending e-mails to one or more recipients, sending SNMP notifications (
More informationHP Client Manager 6.2
HP Client Manager 6.2 Introduction... 2 New Features in HPCM 6.2... 4 Understanding how HPCM works... 5 Extensive reporting capability... 5 HPCM in operation... 6 Client inventory... 6 Health monitoring...
More informationontune SPA - Server Performance Monitor and Analysis Tool
ontune SPA - Server Performance Monitor and Analysis Tool Product Components - ontune is composed of the Manager; the Agents ; and Viewers Manager - the core ontune component, and installed on the management/viewing
More information1. How do I access my VPS control panel?
VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to
More informationRES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationWhatsUp Event Archiver v10 and v10.1 Quick Setup Guide
WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide Contents WhatsUp Event Archiver Quick Setup Guide WhatsUp Event Archiver Quick Setup Guide... 2 Installation Requirements... 3 Manually Creating Firewall
More information20 System Overview. Note: It is a good idea to schedule an automatic backup of your configuration. See Scheduling for details. ACP ThinManager 6.
2 System Overview 2.1 Quick Start Checklist Microsoft Build a terminal server with the Microsoft Windows 2003 or 2008 Server operating system. Add the Terminal Services/Remote Desktop Services Role. See
More informationData Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)
Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,
More informationUser Guide. version 1.2
Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationMicrosoft Terminal Server and Citrix Presentation Server Deployment Environments
Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationSOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
More informationHands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability
Hands-On Microsoft Windows Server 2008 Chapter 12 Managing System Reliability and Availability Objectives Understand general problem-solving strategies Resolve boot problems Use and configure Event Viewer
More informationOracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
More informationWHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationEFETnet Software System Requirements
EFETnet Software System Requirements Version 6 Dated 2015-01-01 Ponton GmbH Page 1 of 7 Change Log Revision Date Mark Changes 1 2004-12-15 TZ MH Original Schedule to EFETnet Maintenance & Support Contract
More informationHeroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides
More informationACP ThinManager Tech Notes Troubleshooting Guide
ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual
More informationDelphi 2015 SP1-AP1 System Requirements
Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This
More informationXenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
More informationClient Monitoring with Microsoft System Center Operations Manager 2007
Client Monitoring with Microsoft System Center Operations Manager 2007 Microsoft Corporation Published: December 18, 2006 Updated: December 18, 2006 Executive Summary Client monitoring is a new feature
More informationorrelog Ping Monitor Adapter Software Users Manual
orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
More informationGoliath Performance Monitor Prerequisites v11.6
v11.6 Are You Ready to Install? Use our pre-installation checklist below to make sure all items are in place before beginning the installation process. For further explanation, please read the official
More informationLoad Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
More information