ProactiveWatch Monitoring For the Rest of Us

Size: px
Start display at page:

Download "ProactiveWatch Monitoring For the Rest of Us"

Transcription

1 Citrix Server Monitoring Without the Hassles and Cost ProactiveWatch Monitoring For the Rest of Us Written by: Douglas. Brown, MVP, CTP President & Chief Technology Officer DBCC, Inc. Page 0

2 Citrix Server Monitoring Without the Hassles and Cost ProactiveWatch Monitoring For the Rest of Us Executive Summary re you responsible for a small to medium size Citrix Server deployment? re you a consultant or VR responsible for customer Citrix deployments? If so then you must read on! few weeks ago I attended Citrix iforum and as many of you know, I m a huge fan and proponent of performance monitoring and management solutions. This being said, I must admit I was taken back a bit that at iforum, Citrix managed to mention their new EdgeSight end user application performance monitoring solution at least once in every breakout session. Now I understand it is a new solution for Citrix and that they want to get their message out but it made me think, what is the customer problem that Citrix is trying to solve with EdgeSight? If we look at the Citrix customer base, they have around 160,000 customers and over 5,000 VR partners worldwide. EdgeSight is designed to be a big boy application performance monitoring tool that requires a bit of knowledge to setup, configure and manage, not to mention some additional hardware. I also think that a good chunk of those 160,000 customers are not big boy enterprises and they don t want more infrastructure and more hardware. This being said, for how many of those customers is EdgeSight ultimately the correct solution? I think the answer is that over time Citrix EdgeSight will become a top shelf end user application monitoring tool for large and sophisticated Citrix deployments that are supported and managed by a large and sophisticated internal IT staff. If EdgeSight can ultimately live up to this promise that Citrix laid out at iforum, then this would be huge for Citrix, as it would solve the problem of Citrix applications performance being more difficult to monitor than on other leading edge platforms (like a web server, coupled with a J2EE (Weblogic or WebSphere) applications server, and a back end Oracle database). So, if one day Citrix EdgeSight solves the large and sophisticated customer problem, what is left? The answer is that I believe most of the Citrix deployments in the world are small (less than 10 Citrix Servers, and less than 30 total Windows servers). These deployments are managed in many cases by an IT staff that is spread too thin, with too many tasks and operating on a limited budget with no ability to put in, much less maintain an onsite application performance monitoring and management solution. In fact the overwhelming majority of the Citrix deployments in the world are not managed by the internal IT staff at all, but by consultants who work for the VR who installed and built the Citrix servers. If this sound like you then you must read on Page 1

3 1 Introducing ProactiveWatch Last year, I got my first exposure to ProactiveWatch, a company that has completely taken a different approach to monitoring Citrix environments and the servers and networks that surround them. Before I explain what ProactiveWatch is, let me tell you what it is not: 1. ProactiveWatch is not hard to install. I was able to get it up and running on the DBCC.com web servers in minutes with no configuration and no need for any backend components that I would be forced to deploy and manage. 2. ProactiveWatch is not hard to configure. It comes with templates that are preconfigured and work out of the box 3. You don t have to put in any extra infrastructure for ProactiveWatch because it is delivered on a software as a service basis (No additional servers or SQL required). You just install the ProactiveWatch agent on your servers and point them to the Proactive Watch gateway (a Windows Service running on a non-dedicated server) and then install the Console (the ProactiveWatch Explorer is a rich client.net application) on the PC or a server if you want to publish it via Citrix. You do not need to buy or install a back end database or applications servers because ProactiveWatch hosts those back end pieces for you. 4. Even though the ProactiveWatch agents at your site talk over the Internet to the hosted ProactiveWatch back-end pieces, you do not need to poke holes in firewalls to make all of this work. Just install the Gateway Service on a box that can open an outbound connection on 443 and you are good to go. 5. It does NOT COST LOT OF MONEY! ProactiveWatch is sold through the Citrix VR community (more on this later), and pricing starts at $30 per managed server per month. 6. For all of the above reasons, ProactiveWatch does not require a lot of time. The whole thing only takes minutes to install and works right out of the box. Page 2

4 2 Some Cool Things about ProactiveWatch Now that you know what ProactiveWatch is NOT and how it is different from all of the other monitoring products out there, let me tell you some things that are really unique and cool about it: 1. Despite the fact that it is inexpensive and easy to set up, it understands what a Citrix server is and what happens on Citrix Servers. It collects its data once every 10 seconds, and collects it on a per process instance basis. So, it not only tells you that Outlook is causing a problem, but whose instance (what user ID) of Outlook it is. 2. When a problem occurs it snap-shots the state of the server. Then it captures the detail of which individual processes are causing the problem. It also captures the entire System Profile, and set of installed pplications, Security Updates and Hot Fixes that were in place at the time of the issue (see a screen shot of the diagnostics that come with an alarm below). Page 3

5 3. ProactiveWatch monitors networks at the applications level of the TCP/IP protocol. Most monitoring products use ICMP Ping to measure latency between two end points on a TCP/IP network. The issue with Ping is that a blue-screened server with a smart network card will quickly respond to a Ping when in fact the server is useless from the perspective of doing any real work for users. ProactiveWatch establishes a socket between any two computers where you want to monitor network latency, which means that it is measuring the performance of the network from the perspective of the applications that are using that network. 4. ProactiveWatch has extremely cool capacity and load analysis features that are actually useful in a Citrix or MSTS environment. The ProactiveWatch agent collects the number of active sessions on the server every 10 seconds and also collects 9 key utilization metrics (like CPU, Physical Memory, Virtual Memory, etc.). The system keeps the maximum levels for each of these metrics for the last 24 hours, 3 days and 7 days for each level of active concurrent user. So, you get a real picture of maximum resource utilization as the real load grows on your servers. In the screen shot below, you can see that the server is at 80% of Physical Memory once it gets to around 21 or 22 concurrent users. My guess is that once load gets above 23 or so concurrent users, this server will not be delivering a good experience to its users. 5. ProactiveWatch couples the capacity analysis with true analysis of load over the course of the day. The graph below shows that the server spends most of its day above 20 concurrent users. (Poor users! I m feeling sorry for the admin too.) Page 4

6 6. I also really like the ability on the part of ProactiveWatch to compare servers (or workstations) to each other. Let s first take a look at the load graphs for two servers that are supposed to be the same, CTX01 and CTX04 (same hardware, software, published apps, etc.). But as you can see they are reacting very differently to the load. CTX01 is running out of memory and CTX04 is not. Why? The reason why is that different software has crept onto these two supposedly identical servers..net and Java are both on the server that is running out of memory (imagine that), and not on the other one. If you are a VR you can even do this comparison across servers at many different customer sites to ensure consistency of servers. The comparison below shows the differences in applications, security updates, and hot fixes that are installed across CTX01 and CTX04. These comparisons can be done across any number of servers, and can even compare servers at the partner s site, to servers at the customer s site. Page 5

7 ProactiveWatch also allows you to compare hardware profiles and even published applications across any set of servers (again even across servers that are installed at different customer sites). n example of a hardware profile compared across four different Citrix Servers in a farm is below. Notice that the hardware for CTX01 and CTX04 is the same, which points us back to.net and Java as the cause for the memory issues on CTX01. 3 The Monitoring Details So what exactly does ProactiveWatch monitor? Well contrary to most of the monitoring products out there today that try to take a variety of PerfMon Counters, collect them and make sense of them, ProactiveWatch works by collecting the information that is inherently useful in the first place. So, other than the core CPU, Memory, Disk, etc. metrics that it collects frequently along with per process instance granularity, most of the effort expended by ProactiveWatch is upon uniquely valuable information. Here is a list of the various monitors, the data they are based on, and how they work: 1. Connectivity this is a socket between the agents at the customer site and the ProactiveWatch back end. If you want to know if a computer or a site has dropped off of the Internet, this monitor will tell you. The diagnostics for this monitor run a tracert from the ProactiveWatch back end back to the agent that dropped off, so you can follow the trail of where the connection died. 2. Latency this is a round trip test packet over a socket connection between the agents and the ProactiveWatch back end. gain this is what a browser would experience trying to connect to a web server, not an ICMP Ping. Page 6

8 3. Client2Server Latency this is a round trip test packet over a socket between any two sets of computers. So this can measure applications level latency between a remote site and the Web ccess Gateway, between Web ccess Gateway and the Citrix Farm, and then between the Citrix Farm and the back end servers. 4. CPU the server is running out of CPU, or a single process is using all of the CPUs on the server. 5. Memory the server is running out of either Physical Memory or Virtual Memory. 6. Disk the server is running out of disk space on a monitored drive. 7. Boot the server has rebooted. If this happens during the nightly reboot window it is not a problem, but not if it happens in the middle of the day. 8. pps an application has been installed or uninstalled. 9. Profile the system profile has changed. This can be a change in IP address, a change in memory, etc. 10. Registry the Run or RunOnce sections of the Registry have been changed. This detects software that has been installed without going through add/remove programs. 11. Crash a process has crashed. The diagnostics include the Dr. Watson log entry for the module that caused the crash. 12. Service a monitored service has gone down. ProactiveWatch can monitor manually specified services, or all automatically started services. 13. Process a monitored process has gone down. 14. Log a monitored event log entry has occurred. 15. Port either a desired port (1494) is not listening, or an undesirable port (like an FTP server on a Citrix server) has shown up where it should not be. 16. gent Types ProactiveWatch does a great job with Citrix and Microsoft Terminal Servers, with any other type of Windows server, and also has agents for several different types of Linux. Some of the partners working with ProactiveWatch have worked with their development team to port the Linux agent into the firewalls that the partner sells. Page 7

9 4 Very Cool ProactiveWatch Things for VRs or Citrix Partners ProactiveWatch has two unique features that make it absolutely outstanding for VRs or Partners that want to use it to monitor all of the servers at all of their customer sites. The first of these is a unique communications architecture that is both one-way and Internet friendly. When you install the software at a site, you only need one non-dedicated server that can open an outbound port (443) to the public Internet. The ProactiveWatch Gateway is installed on this server its job is to collect the data from the agents at that site and send it to the ProactiveWatch back end. ProactiveWatch does not require or use any inbound connections, so you do not need to open any inbound ports to make it work. You can easily install a gateway and a couple of agents at different customer sites without having to do any firewall or router work. The diagram below shows how ProactiveWatch uses only outbound Internet friendly communications to work. Remote Site Citrix ccess Gateway VR Explorer dmin Console ProactiveWatch Gateway Port Open Outbound Only (29443) HTTPS (443) Port Open Outbound Only Internet Firewall Web Servers Firewall Customer s Other Windows or Unix Servers ProactiveWatch Backend Server Farm HTTPS (443) Port Open Outbound Only Port Open Outbound Only (29443) Customer Explorer (Optional) ProactiveWatch Gateway Internal Users Port Open Outbound Only (29080) Customer s Citrix Presentation Server Farm The next feature is that the system by default views things on the basis of Customer Location ComputerName. So the idea of one VR or Partner being able to see multiple customers systems on one pane of glass is a core built in design assumption of ProactiveWatch. The system also supports the idea of an dmin at a customer site having his own console that allows him to see only his environment, while the VR is seeing this dmin s environment as well rolled up into a view of all of the VR s customers. For VRs and Partners, ProactiveWatch therefore opens up the following opportunities: 1. The VR can resell ProactiveWatch on a subscription basis to any of his customers who have an dmin, and can then do collaborative support of the customer s issues with the dmin based upon the same set of diagnostic data. The idea of the consultant at the VR working with the dmin at the customer site on the same problem, off of the same set of data, and in real time is an absolute breakthrough. 2. The VR can make his support of his smallest customers for whom the VR is the IT department much more valuable, more nimble, and less expensive to deliver. Page 8

10 3. The VR can see the servers at the customer site change. s inconsistencies creep into the environment (user installed toolbars in IE, or hot fixes are applied only to some servers) the VR gets notified, and can do instant comparisons across servers. This includes the ability to compare servers at the customer site against a reference server at the VRs site! n example of this See all of your customers on one pane of glass view is below The dmin at the CMSI customer site would see this: Page 9

11 5 Conclusions I have seen a lot of monitoring products over the years. This is the very first one that does a great job for the small to medium sized Citrix deployments and for the dmin at the customer site at a low cost in terms of effort and money. This is also the very first monitoring product that is designed for this size of business and deployment. I have seen that it can effectively scale down to a 5 or a 10-server environment while providing such a rich level of functionality. Heck, I run it on my DBCC.com web servers and it provides me the information I to need to know what is happening and the best part is that I did next to nothing for this valuable information. Finally, I have never seen a product that is as specifically designed for the partner community as this one is. If you are a customer, then contact your reseller. If you are a Citrix partner who manages Citrix customer deployments, then this tool is perfect for you! From my first hand experiences as a consultant who was responsible for a slew of Citrix servers across many different companies, it is refreshing to know that now there is a solution that solves my problem, as ultimately my problem is the customer problem times the amount of customers I have! If you want to learn more please visit If you would like to speak to someone who will answer your questions, please send an to sales@proactivewatch.com Page 10

System Administrators Guide

System Administrators Guide System Administrators Guide v130501 2013 RapidFire Tools, Inc. All Rights Reserved Table of Contents I. ProactiveWatch Technical Architecture... 4 II. Installing ProactiveWatch at a Customer Site... 6

More information

TNT SOFTWARE White Paper Series

TNT SOFTWARE White Paper Series TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE

More information

ProactiveWatch System Administrators Guide

ProactiveWatch System Administrators Guide ProactiveWatch System Administrators Guide 2012 ProactiveWatch, Inc. All Rights Reserved. V120323 Table of Contents Table of Contents 1 I. ProactiveWatch Technical Architecture 1 II. Installing ProactiveWatch

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Citrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4

Citrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4 Citrix EdgeSight User s Guide Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

ActiveXperts Network Monitor. White Paper

ActiveXperts Network Monitor. White Paper ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

NETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION

NETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION NETWORK MONITORING & ALERTING SERVICES Complete IT Support for Business Westgate IT Network Monitoring & Alerting Services: Service Definition Service Name Network Monitoring & Alerting Services Overview

More information

Release notes. Symantec Event Manager for Firewall. What s new. System requirements

Release notes. Symantec Event Manager for Firewall. What s new. System requirements Release notes Symantec Event Manager for Firewall What s new Symantec Event Manager for Firewall provides centralized logging, alerting, and reporting across Symantec s enterprise firewall protection solutions.

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

WhatsUp Event Alarm v10x Quick Setup Guide

WhatsUp Event Alarm v10x Quick Setup Guide WhatsUp Event Alarm v10x Quick Setup Guide Contents CHAPTER 1 WhatsUp Event Alarm Quick Setup Guide Microsoft Vista/Server 2008/Windows 7 Requirements/Recommendations... 3 Before You Begin... 7 Installation

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

PFSENSE Load Balance with Fail Over From Version Beta3

PFSENSE Load Balance with Fail Over From Version Beta3 PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet

More information

Windows Server 2012 Server Manager

Windows Server 2012 Server Manager Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

How To Set Up Foglight Nms For A Proof Of Concept

How To Set Up Foglight Nms For A Proof Of Concept Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

UserLock advanced documentation

UserLock advanced documentation UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file

More information

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz 8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (

More information

Engagement Deployment Planning Guide

Engagement Deployment Planning Guide Engagement Deployment Planning Guide July 2015 2000-2015, CCH INCORPORATED, a part of Wolters Kluwer. All rights reserved. Material in this publication may not be reproduced or transmitted, in any form

More information

Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).

Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp). Core (1/2) Access Control Access to settings and applications can be based on Organizational Units in Directory Services like (Active Directory and Novell) or through users and groups in the domain. This

More information

Product Review ControlUp

Product Review ControlUp Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

Managing SQL Server Databases in Microsoft Clusters with CA Insight for Distributed Databases r11.2

Managing SQL Server Databases in Microsoft Clusters with CA Insight for Distributed Databases r11.2 Managing SQL Server Databases in Microsoft Clusters with CA Insight for Distributed Databases r11.2 SQL Server 2000 and 2005 Version 3.0 By Walter Guerrero Date: August 16, 2007 Table of Contents... 1

More information

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These

More information

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

System Requirements Table of contents

System Requirements Table of contents Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

GEM Network Advantages and Disadvantages for Stand-Alone PC

GEM Network Advantages and Disadvantages for Stand-Alone PC Possible Configurations Turns your Contacts into a Business Network focussed on you GEM can be configured to run in many different ways. From simple stand-alone PC s or Mac s, through Client Server on

More information

SERVICE SCHEDULE DEDICATED SERVER SERVICES

SERVICE SCHEDULE DEDICATED SERVER SERVICES SERVICE SCHEDULE DEDICATED SERVER SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

ProSystem fx Engagement. Deployment Planning Guide

ProSystem fx Engagement. Deployment Planning Guide ProSystem fx Engagement Deployment Planning Guide October 2013 2000-2013, CCH INCORPORATED and/or its affiliates. All rights reserved. Material in this publication may not be reproduced or transmitted,

More information

Blackbaud Hosting Services

Blackbaud Hosting Services Hosting Services System Requirements / Last Updated 12/05/2012 Table of Contents Hosting Services currently hosts over 10 traditional applications and Software as a Service offerings. As such there are

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere Access Database Hosting An introduction to Cloud Hosting Access databases from Your Office Anywhere Microsoft Access is a powerful way of creating bespoke database applications for either your own business

More information

Requirements Document for ROI Print Assessment/Print Manager

Requirements Document for ROI Print Assessment/Print Manager Requirements Document for ROI Print Assessment/Print Manager Print Manager Pre-requisites for a successful deployment Contents 1. What is - a. Print Assessment? b. Print Manager? c. ROI Analytics? 2. About

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)

How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner) Oracle Virtualization Installing Oracle VM Server 3.0.3, Oracle VM Manager 3.0.3 and Deploying Oracle RAC 11gR2 (11.2.0.3) Oracle VM templates Linux x86 64 bit for test configuration In two posts I will

More information

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012 Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for

More information

HP Client Manager 6.1

HP Client Manager 6.1 HP Client Manager 6.1 Introduction... 2 New Features in HPCM 6.1... 4 Understanding how HPCM works... 6 Extensive reporting capability... 7 HPCM in operation... 7 Client inventory... 7 Health monitoring...

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

Energy Management Web-based embedded solution for monitoring of distributed conventional energy applications Type Em 2 -Server

Energy Management Web-based embedded solution for monitoring of distributed conventional energy applications Type Em 2 -Server Energy Management Web-based embedded solution for monitoring of distributed conventional energy applications Type Em 2 -Server Software solution with integrated database and webserver Monitoring and data

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008 A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Cisco IP Communicator (Softphone) Compatibility

Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

RES PowerFuse Version Comparison Chart (1/9)

RES PowerFuse Version Comparison Chart (1/9) RES PowerFuse Version Comparison Chart (1/9) Alerting Allows you to set up notifications of specific events, which can consist of sending e-mails to one or more recipients, sending SNMP notifications (

More information

HP Client Manager 6.2

HP Client Manager 6.2 HP Client Manager 6.2 Introduction... 2 New Features in HPCM 6.2... 4 Understanding how HPCM works... 5 Extensive reporting capability... 5 HPCM in operation... 6 Client inventory... 6 Health monitoring...

More information

ontune SPA - Server Performance Monitor and Analysis Tool

ontune SPA - Server Performance Monitor and Analysis Tool ontune SPA - Server Performance Monitor and Analysis Tool Product Components - ontune is composed of the Manager; the Agents ; and Viewers Manager - the core ontune component, and installed on the management/viewing

More information

1. How do I access my VPS control panel?

1. How do I access my VPS control panel? VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide

WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide Contents WhatsUp Event Archiver Quick Setup Guide WhatsUp Event Archiver Quick Setup Guide... 2 Installation Requirements... 3 Manually Creating Firewall

More information

20 System Overview. Note: It is a good idea to schedule an automatic backup of your configuration. See Scheduling for details. ACP ThinManager 6.

20 System Overview. Note: It is a good idea to schedule an automatic backup of your configuration. See Scheduling for details. ACP ThinManager 6. 2 System Overview 2.1 Quick Start Checklist Microsoft Build a terminal server with the Microsoft Windows 2003 or 2008 Server operating system. Add the Terminal Services/Remote Desktop Services Role. See

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

ClearOS Network, Gateway, Server Quick Start Guide

ClearOS Network, Gateway, Server Quick Start Guide ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business

More information

Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability

Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability Hands-On Microsoft Windows Server 2008 Chapter 12 Managing System Reliability and Availability Objectives Understand general problem-solving strategies Resolve boot problems Use and configure Event Viewer

More information

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005 Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram

More information

EFETnet Software System Requirements

EFETnet Software System Requirements EFETnet Software System Requirements Version 6 Dated 2015-01-01 Ponton GmbH Page 1 of 7 Change Log Revision Date Mark Changes 1 2004-12-15 TZ MH Original Schedule to EFETnet Maintenance & Support Contract

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

ACP ThinManager Tech Notes Troubleshooting Guide

ACP ThinManager Tech Notes Troubleshooting Guide ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual

More information

Delphi 2015 SP1-AP1 System Requirements

Delphi 2015 SP1-AP1 System Requirements Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

Client Monitoring with Microsoft System Center Operations Manager 2007

Client Monitoring with Microsoft System Center Operations Manager 2007 Client Monitoring with Microsoft System Center Operations Manager 2007 Microsoft Corporation Published: December 18, 2006 Updated: December 18, 2006 Executive Summary Client monitoring is a new feature

More information

orrelog Ping Monitor Adapter Software Users Manual

orrelog Ping Monitor Adapter Software Users Manual orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

Goliath Performance Monitor Prerequisites v11.6

Goliath Performance Monitor Prerequisites v11.6 v11.6 Are You Ready to Install? Use our pre-installation checklist below to make sure all items are in place before beginning the installation process. For further explanation, please read the official

More information

Load Manager Administrator s Guide For other guides in this document set, go to the Document Center

Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access

More information