System Administrators Guide

Size: px
Start display at page:

Download "System Administrators Guide"

Transcription

1 System Administrators Guide v RapidFire Tools, Inc. All Rights Reserved

2 Table of Contents I. ProactiveWatch Technical Architecture... 4 II. Installing ProactiveWatch at a Customer Site... 6 Installing the ProactiveWatch Gateway... 6 Installing and Accessing the ProactiveWatch Explorer... 8 III. Deprovisioning a Customer... 9 Change Customer ID IV. Operating the ProactiveWatch Explorer Customizing the Explorer to Display (Only) What You Want To See Customizing the Columns Displayed in the Grid View Adding or Changing Grouping The Alarms View Working Alarms The Alarm History The Work Alarms Screen Manual Maintenance Mode Managing Alarms in ProactiveWatch Exclusions in Manage Alarms Marked As Normal in Manage Alarms Notification Rules New Variables for Alarm Notification Subject Fields Manage Computers V. Monitoring Templates How to Change and Add Monitoring Functionality Changing the Monitoring Settings in a Template Assigning Monitoring Templates to Workstations, Servers and Network Devices 28 Default ProactiveWatch Monitoring Templates and Features Default (Out-of-the-Box) Network Device Monitoring Optional Monitors in ProactiveWatch Threshold Timeframe for Windows Service Monitoring Round-Trip Monitor SNMP Bandwidth Monitoring Extended Profile Template Assign the Extended Profile template Display the Console User column Enhanced System Profile information File and Directory Monitoring Monitoring Extensions Displaying Extension Monitor Status in the Explorer Grid View Customizing and Configuring Extensions MS Exchange Extension Configuration and Monitoring Details MS Update Extension Configuration and Monitoring Details v RapidFire Tools, Inc. All Rights Reserved 2

3 Symantec Anti-Virus Extension Configuration and Monitoring Details Symantec Backup Exec Extension Configuration and Monitoring Details VI. Analytical Tools in the ProactiveWatch Explorer Show Issues View Metrics Creating a Time and Date Based Snapshot System Compare Application Compare Event Log Analyzer Distribution Graph Trend Graph Multi-User Impact Analysis VII. Patch Management Scheduling Windows Patch Updates for specific days VIII. Reporting Automatic Semi-monthly Patch Management Report Manage Scheduled Reports IX. Remote Control Integrated Remote Control Remote Control Remote Control (Quick Connect) Security Installing Remote Control Troubleshooting Using Alternate Remote Control X. Updating Agents and Gateways to Future Versions XI. Autotask Integration Configuring Autotask Configuring ProactiveWatch XII. The ProactiveWatch Mobile Web Console XIII. About ProactiveWatch v RapidFire Tools, Inc. All Rights Reserved 3

4 I. ProactiveWatch Technical Architecture The technical architecture of the ProactiveWatch system is shown in the image below. The architecture of the system has several key components: 1. ProactiveWatch hosts the back end applications servers and database servers. You do not need to buy any licensed software from ProactiveWatch, nor do you need to procure or maintain any Windows or Database server licenses or hardware to support the ProactiveWatch system. 2. For the purposes of monitoring servers and workstations, ProactiveWatch is an agent-based system. ProactiveWatch agents are very small (consuming less than 10MB of Virtual Memory on a server), and very efficient (collecting data on every process running on the server every 10 seconds) while consuming less than 1% CPU during every monitoring interval. 3. Agents are available for Windows 2000 Server and above, Windows XP Workstation and above, Red Hat Linux, and SUSE Linux. 4. For the purpose of supporting network devices, any server agent can collect data from any network device that the agent can access via SNMP. ProactiveWatch supports all network devices that can respond to an ICMP ping for availability monitoring. For performance and bandwidth monitoring ProactiveWatch uses SNMP MIB Agents open an outbound port to the Gateway. The Gateway opens 443 outbound to the PW Back End. No firewall ports need to be opened at the customer site in order for ProactiveWatch to function. 6. The ProactiveWatch Explorer (Console) is a rich client.net 2.0 application that the VAR installs on a server or workstation at his site. It opens port outbound to the PW back end. v RapidFire Tools, Inc. All Rights Reserved 4

5 v RapidFire Tools, Inc. All Rights Reserved 5

6 II. Installing ProactiveWatch at a Customer Site Installing the ProactiveWatch Gateway Launch ProactiveWatchGatewaySetup.exe. You will need your VAR ID (it is in your registration ), and a unique Customer ID for the customer where you are installing this Gateway. Installing a Gateway will consume an agent license since a Gateway provides all of the functionality of an Agent in addition to the Gateway functionality. If you have only one server at a customer site, just install a Gateway on that server and you are done. The next screen will be for the communications settings used by the Gateway. Do not change these settings. The last Gateway installation screen is a communications test from the Gateway to the PW back end system. You will not be allowed to proceed beyond this point in the installation if the test fails. If the test fails, please make sure you can open a browser to any public site on the Internet from this server. Next make sure that you have established a customer ID with licenses on the Manage site that matches what you used in the first configuration dialog. If you can browse to the public Internet, next try to connect to the PW back end. From the target server, open a browser to The page should respond with a message that the Servlet is listening for connections. If that works, and the Gateway connect test still fails, please send an to support@proactivewatch.com. You will not be able to proceed with the installation of the Gateway or any agents until this communications test completes successfully. v RapidFire Tools, Inc. All Rights Reserved 6

7 Installing ProactiveWatch Agents Launch ProactiveWatchAgentSetup.exe. The first important screen will ask you which type of agent you wish to install. Install a Server Agent on any computer that is supposed to be on all of the time (if it goes down you will get a Server Down alarm). Install a Client on any computer like a workstation or laptop that may get turned off, and for which you do not want a server down alarm when they do get turned off. On this screen you must provide the Agent installer with the IP address or host name of the computer that is the Gateway. The agent will retrieve the VAR ID and the Customer ID from the Gateway, so you must have a working Gateway, and point the Agent installer at it here. When the agent retrieves the VAR ID and the Customer ID from the Gateway, they will be displayed in the corresponding fields. The last step of the agent installation is a communications test. If your Gateway passed its test, and you were able to retrieve the VAR ID and the customer ID from the Gateway, this test should pass as well. If it does not, please send an to support@proactivewatch.com. v RapidFire Tools, Inc. All Rights Reserved 7

8 Installing and Accessing the ProactiveWatch Explorer After you install the Gateway, you should install the PW Explorer (the Console) and make sure that your newly installed Gateway will appear in your Console. Launch ProactiveWatchExplorerSetup.exe. The Explorer requires no configuration during installation (just.net 2.0). You log into the Explorer with your VAR ID, the user ID and password that were provided to you in your registration . If your Explorer cannot connect, please take the following steps: 1. Verify that the Host is set to proxi.proactivewatch.com 2. Verify that the Port is set to Verify that your VAR ID and Password are correct 4. Verify that Domain is set to ProactiveWatch 5. Once you verify these items if you still fail to connect open a Command Prompt. Type: Telnet proxi.proactivewatch.com This will test whether you can get out to the public Internet on port If this test fails, then your access on this port is blocked, and you will need to get this port opened outbound in order to run the Explorer from your current location. 6. If the Telnet test passes, and you still cannot connect, please send an to support@proactivewatch.com. After you have installed your first Gateway, and launched the Explorer, you should see your Gateway in the Explorer as is shown below. Note that you can use the Manage Columns under Settings to add the Agent Type column to your view so that you can see what types of agents you have installed. v RapidFire Tools, Inc. All Rights Reserved 8

9 III. Deprovisioning a Customer There are several situations where you may wish to remove a customer and their agents from ProactiveWatch. To do so is an easy process: If you have access to the customer s machines where agents are installed: 1. Uninstall all ProactiveWatch Agent and the FreeMyIT Agent from Add/Remove Programs. 2. Open the ProactiveWatch Explorer and highlight all rows using CTRL-Click or SHIFT-Click. 3. Select Delete on the Edit menu. You can also do CTRL-Del as a shortcut. If you do not have access to the customer s machines: 1. Open the ProactiveWatch Explorer. On the Settings Menu, select Manage Blocked Agents List v RapidFire Tools, Inc. All Rights Reserved 9

10 2. From the Manage Blocked Agent List dialog, select all agents to block and press the > button. 3. In the main device grid, highlight all rows using CTRL-Click or SHIFT-Click. 4. Select Delete on the Edit menu. You can also do CTRL-Del as a shortcut. After the agents rows are removed from the Explorer, the license is freed up. You should additionally remove all Notification Rules that are specifically setup for the customer manually. Change Customer ID You may now change a client s Customer ID from the Explorer Console. Select the rows of the systems (use Shift-Click to multi-select), right-click, Fill Cells. Select Customer and enter the new Customer ID. v RapidFire Tools, Inc. All Rights Reserved 10

11 IV. Operating the ProactiveWatch Explorer The ProactiveWatch Explorer is a rich client.net 2.0 application that you install upon workstations or Citrix/Terminal Servers at your site. This is the only piece of ProactiveWatch software that you need to install at your site or upon your user PC s or laptops. The basic ProactiveWatch subscription includes 10 concurrent instances of the Explorer, so you have the flexibility to have a shared Explorer in the office, and also to install copies on laptops that travel with your technical personnel. The Explorer displays the real-time status of all of the monitored servers, workstations, and network devices across all of your customers and sites monitored by ProactiveWatch. Each monitored device is a row in the Explorer. Each column represents the status of one or more monitors. The status of a Monitor for a device is displayed in the cell that is at the intersection of the device row and the monitor column. The colors in the cell have the following meanings: 1. A Green square means that the status is normal (no alert condition is present) 2. A Red Square means that the monitor is currently in an alarming state. 3. A Red Triangle means that the alarm has cleared. Alarms that are caused by conditions that clear like CPU abuse, Memory abuse, etc., will clear automatically when the condition that caused the alarm goes away. 4. A Blue Square is for a Marked As Normal Alarm (discussed in detail in the Managing Alarms chapter). Normal Alarms (like scheduled reboots in the middle of the night) are alarms you want to know about, but that you do not want to get notifications on. 5. A Red and a Yellow triangle in a square is an Event. Events do not have a time duration and by definition have occurred in the past when you see them for the first time, so are marked in Yellow with a Red Triangle. Unlike an Alarm there is no automatic or manual way to Clear an Event. You have an option in the Explorer for how far back in time you want to view events. 6. A Blue and Yellow triangle in a square is a Marked As Normal Event. For example if you decide that you want to Mark As Normal Event Log entries associated with printer creation errors you can mark that specific Event ID as Normal (in Manage Alarms), causing it to appear as blue/yellow, and you will not get notifications on this event. v RapidFire Tools, Inc. All Rights Reserved 11

12 Customizing the Explorer to Display (Only) What You Want To See The Explorer is easily customizable to display only the devices from a particular customer, the devices at a particular location, or only the devices that are currently alarming. The following options are available to you to customize your view in the Explorer (each number below corresponds to a number on the screen shot): 1. Clicking on the column header sorts by the data in the column. 2. Lets you choose how far back in time to display Events. 3. Filters your view. Choose Customer, and then select the Customer that you want to see. That will show only the servers and devices for that customer. 4. Pressing the Clear Past Alarms button makes all of the red triangles go away (acknowledges alarms that have occurred, but that have cleared). 5. Pressing Pause, pauses grid refreshes. This makes the grid hold still since rows with new alarms will go to the top in the default sort order unless you press this button. 6. Locks the grid to the top. If you have sorted alarms so that all CPU alarms are at the top, this will keep your selected rows at the top, even as alarms occur. 7. Toggles the view to display only rows with active alarms, or when pressed again shows all rows. 8. Locks in a view to Group by Customer (on by default). 9. If you do not have the Customer Grouping button on, this will sort your grid to put all alarming rows at the top. v RapidFire Tools, Inc. All Rights Reserved 12

13 Customizing the Columns Displayed in the Grid View You can create multiple views each displaying a different set of columns, and you can customize the columns displayed in each grid. ProactiveWatch ships with three default views, All, Computers and Network. You may select these views by pressing the tab with the View name under View in the main grid view of the Explorer as shown below. To create a new view, or to change the columns in an existing view, go to SettingsManage Columns. The right and left arrows in the middle of the dialog move columns between Available and Selected. Once a column is selected, you can highlight and drag it up or down in the Selected list on the right. If you were to add a column to the list below, and drag it so that it appeared under Agent Type, than that column would appear to the right of Agent Type in the Grid View. To create a new View, Clone an existing View and give this view a name. There are several other places in the Explorer where the displayed set of columns is determined by the displayed set in the Main Grid View (for example in the Assign tab of Monitoring Templates). If you want to efficiently manage your screen real estate, you can create a view that is optimized for assigning templates to computers in this screen and switch to it before you go work with Monitoring Templates. To create a new custom column, hit the + at the top right of the Available box. For example if you have customers on three different support plans (Silver, Gold, and Platinum), you can create a column named Support Plan. You can then select groups of rows in the Explorer, right-click, select Fill Cells, choose Support Plan as the column, and then type in Gold to populate the Support Plan column for the selected set of rows with Gold. You could then sort customers in the Grid View by Support Plan, or even build Notification Rules based upon which Support Plan a customer was on. v RapidFire Tools, Inc. All Rights Reserved 13

14 Using the Quick Filter allows you to find and display only the computers that match a substring. Adding or Changing Grouping By default the button to group by Customer is active. So, when your Explorer comes up, it will automatally display all of the rows for each customer together. You can add or change groupings by dragging column headings up to the dark gray area above the column titles. You can group by any column displayed in the Grid View. For example, if you have both servers and network devices monitored at your customer sites, and you would like them to be displayed together for each customer, then add Agent Type as a column, and drag its its Column heading up to the dark gray area as shown below. v RapidFire Tools, Inc. All Rights Reserved 14

15 The Alarms View Working Alarms Clicking on the alarms tab (next to the View tab) brings up a summary list of all of the open alarms across all of the managed devices at all of your customers. You can group these alarms by any column heading by dragging the column heading up into the dark gray area. You can also right click and take the following actions on any set alarm: 1. Work Alarm this brings up the detailed work alarms screen that allows you to take a variety of actions upon an individual alarm. 2. Alarm History this brings up the same view of the alarms for a specific server, workstation or device that you get when you double click upon a row in the Grid View. 3. Show Issues this bring up the Show Issues analysis for a managed device. The Show Issues analytical tool is discussed in the Analytical Tools section of this manual. 4. Defer Alarms this allows you to stop Notifications for a selected period so that you can take a set of planned actions to resolve an alarm. 5. Mark As Normal This marks the alarm as Normal. Go to Manage Alarms and the Marked as Normal tab to customize the time windows for your Marked as Normal setting and the computers to which it applies. 6. Clear Alarms This manually clears the selected set of alarms, even if the condition that caused them has not been addressed. v RapidFire Tools, Inc. All Rights Reserved 15

16 The Alarm History If you double-click on any selected set of rows in the Grid View of the Explorer you will bring up the Alarm History for the selected set of devices. The Alarm History is a rich diagnotics tool that displays the following information: 1. The alarms that have occurred within the selected time period (24 hours, 3 days, or 7 days) for the selected set of servers. 2. If you select a single alarm, you will get the available diagnostics information for the alarm. In the case of resource based alarms (over use of CPU, Memory, Disk, Handles or Threads) you will get a detailed System Snapshot that shows you the state of the computer at the time of the alarm. This will include the usage state of the key resoruces on the server, as well as which processes are the top five users of those resources. 3. The System Profile at the time of the alarm. 4. The set of installed applications, security updates and hot fixes at the time of the alarm. If you double-click on any single row in the Alarm History, you will go to the Work Alarms screen (described below). The Work Alarms Screen You can access the Work Alarms screen by either double-clicking on a row in the Alarm History, or by going to the Alarms tab in the main grid view, selecting a row, right-clicking and selecting Work Alarm. The Work Alarms screen pertains to a single alarm and allows you to perform the following actions: v RapidFire Tools, Inc. All Rights Reserved 16

17 1. Mark As Normal This marks this alarm as normal. Future occurrences of this alarm on this computer will be displayed in blue in the Grid View, and will not trigger notifications. If you would like to generalize a specific Marked As Normal entry (for example to make it apply to more than one Computer), use SettingsManage AlarmsMarked As Normal to customize your entries. 2. Clear Alarm This clears the alarm whether the underlying cause of the alarm has been addressed or not. 3. Take Ownership of the Alarm If you click the It s Mine button, the alarm gets assigned to your Explorer account and will displayed as owned by you in the accounts of other Explorer users at your company. 4. Defer This defers the time count that the alarm is open in order to give you time to fix it. To speed working with alarms, there is a link that will allow you to instantly create a ticket in Autotask (similar to using the Notification Rule to send an to open a ticket). There are two short-cut links. The first will bring up the Manage Computer panel, which will allow you to view real-time performance, start/stop services and kill processes. The second shortcut link will bring up the RemoteCommand panel for the system. v RapidFire Tools, Inc. All Rights Reserved 17

18 Manual Maintenance Mode makes it possible to easily ignore all alarms for a device while you are performing maintenance tasks or temporarily taking a device off-line. Alarms will show in the console as Blue (Mark as Normal), but notifications will be suppressed while Maintenance Mode is Enabled. Simply select one or more devices, rightclick and choose Maintenance Mode->Manually Enable to begin maintenance mode. Remember to Disable this once you are ready to begin monitoring again. New Task Manager -like features available from Manage Computers, including Real-Time Performance Graphs, Processes, Users and Services lists, giving you visibility into, and the ability to interact with, services and processes on any remote system that has the RemoteCommand agent installed and running. v RapidFire Tools, Inc. All Rights Reserved 18

19 Managing Alarms in ProactiveWatch ProactiveWatch is the only VAR oriented Managed Service monitoring solution that can monitor every process on the server for usage of key resources, monitor the server for changes in the state of the installed software, monitor servers for changes in desirable and undesirable ports, monitor web and Citrix servers for URL and ICA response time and monitor the Windows Event logs with the granularity required to catch critical events in a wide variety of applications and services. With this tremendous ability to monitor deeply and broadly comes the prospect of a significant number of false alarms. ProactiveWatch includes an easy to use, but very powerful system that allows you to virtually eliminate false alarms: 7. Alarms may be Excluded by the Agent and never even set up to the back end database for analysis and reporting. Excluded alarms are treated as if they never occurred at all. An example of an alarm that is excluded in the Default Exclusions template is the Windows Performance Logs and Alerts service going down. 8. Alarms may be Marked As Normal. Marked As Normal alarms are recognized within the Console as having occurred and are marked in blue instead of red in the grid view. Alarms can be Marked As Normal for a specific time period. For example the nightly reboot of a set of servers in a farm can be Marked As Normal if it occurs within +/- 30 minutes of 2 AM, but the reboot alarm will be treated as normal otherwise. 9. Alarms and Notifications are treated separately. Notification Rules (which cause Alerts) are separately defined from Alarms themselves. So the VAR can easily create a rule that sends an immediately if a site or a server is down, but that reserves all other alarms for a summary in the morning. 10. Resource alarms (CPU, Memory, Disk Time, Handles, Threads) can be excluded based upon which process caused them. For example, on an Exchange Server, store.exe often uses all of the memory. So, if the threshold for a memory alarm is 90%, that alarm will always fire on an Exchange Server, since store.exe will always push total memory utilization above that point. ProactiveWatch allows you to define an Exclusion rule that masks out alarms having to do with the utilization of resources in total caused by specific processes. So, memory alarms caused by store.exe (and sqlserver.exe) cease to be a problem. ProactiveWatch is also unique in that false alarms can be masked before they occur, and can be applied to computers upon which they have never occurred before they occur. Furthermore, specific alarms can be generalized, and then Excluded or Marked As Normal and applied to any set of monitored devices. v RapidFire Tools, Inc. All Rights Reserved 19

20 Exclusions in Manage Alarms Any alarm that occurs can be right-clicked upon and excluded. Be default, Excluded Alarms are added to the Default Exclusions Template, which applies them to all monitored devices. Below is an example of the alarms that are excluded by default in ProactiveWatch. Note that the Physical Memory alarm is excluded when it is caused by sqlserver.exe, but not by any other process and that the CPU usage alarm is excluded when it is caused by beremote (the backup process), but not when any other process causes it. The asterisks in the screen shot below illustrate how easy it is to generalize and exclusion. A common system profile change is for the CPU Mhz to change as the CPU shifts up and down in speed. When this alarm occurs, it comes with specific values in the Old and New fields. Replacing these values with asterisks masks out all changes in CPU speeds from the alarm set. Marked As Normal in Manage Alarms Two alarms are marked as normal below. A regular task every Monday consumes a great deal of CPU. This task runs between Midnight and 7 AM depending upon other system load. So it is Marked As Normal on a weekly schedule with a start time and end time that cover the likely periods during which the task is running. The second Marked As Normal alarm is a nightly reboot, which occurs within a few minutes of 1:13 AM. It is important to note the key differences between Excluded Alarms, and Marked As Normal Alarms. They are: v RapidFire Tools, Inc. All Rights Reserved 20

21 1. Excluded Alarms are treated by the system as never having happened. There is no record within the system of them having occurred. There is no time frame for exclusions. Either an alarm is excluded all of the time or it is not. 2. Marked As Normal alarms show up in the Grid View and therefore it is possible to verify that the task that caused the CPU issue, or the scheduled reboot did in fact occur. 3. Marked As Normal alarms have a time frame associated with them being normal. So this feature is used for alarms that are normal at night, and not normal during the day. v RapidFire Tools, Inc. All Rights Reserved 21

22 Notification Rules The last layer in the system of deciding which alarms are important is to decide which ones should be the basis of notifications. Note that Excluded alarms are masked out as never having occurred, and Marked As Normal alarms are noted in the Explorer, but are masked out from the set available for notifications. The Add Notification Rule dialogs below, shows how the you can pick which alarms should be the basis of an notification rule. The alarms of interest can be selected, and then the rule can be filtered on the basis of Customers, Locations, or even individual computers. Finally you can choose whether you want the alarm immediately, or whether you want summaries of the outstanding alarms hourly or daily. Four alert formats are supported. Default is designed for s that would appear in normal programs like Microsoft Outlook or Google Gmail. Compact is designed for s destined for mobile devices. The format is abbreviated so that you are unlikely to have to scroll to read an alert. The Filter By dialogs allows you to create alerts for specific customers, locations, or on the basis of the data that you put in any custom column that you create. If you choose Filter By Customer on the left dialog, and then choose a customer ID in the right Filter dialog, you will create a notification rule that just sends s about that customer ID to the specified address. Two additional alert formats are supported, one for Autotask, and one for Connectwise. Feeding alerts to these systems requires additional configuration of ProactiveWatch and the receiving system and is covered in chapters dedicated to the integration with these two products. v RapidFire Tools, Inc. All Rights Reserved 22

23 New Variables for Alarm Notification Subject Fields There are two new variables that can be included in the subject line of notification rules: $SYNOPSIS$ and $ALARMIDS$. Here is the full list of subject-line variables, and brief description: Variable $CUSTOMER$ $COMPUTERS$ $ACTIVEALARMS$ $RESOLVEDALARMS$ $ALARMIDS$ $SYNOPSIS$ Description Lists the Customer IDs contained in the notification Lists the Computer Names contained in the notification The number of Active Alarms included in the notification The number of Resolved Alarms included in the notification The Alarm IDs in the notification A Synopsis of the alarm notification placed in the subject line to assist with autopopulating ticketing systems (e.g. Autotask) Below is an example of a useful subject line using created using a subject pattern: Critical Alert On $COMPUTERS$, Active: $ACTIVEALARMS$ v RapidFire Tools, Inc. All Rights Reserved 23

24 Manage Computers To access these new features, select the row of the desired system, right-click and choose Manage Computers. You will see new tabs for Performance, Processes, Users and Services as detailed below. a. Real-time Performance Graph Select the Performance tab to display graphs of CPU and Memory for the selected system. Also displayed is the Task Manager-like information for Handles, Threads and Processes, Memory, Session and Input/Output information. This information is updated in realtime every 15 seconds. b. Process List The Processes tab lists the currently running processes, along CPU and Memory Usage, updated every 15 seconds. You may sort by clicking the column headings. Select a process, and click End Process to terminate that process or application. c. Users The Users tab displays the current users on the system for multi-user systems. This will be blank for single user machines. Select a User/Session and click Reset User Session should you need to clear or reset a terminal server session. d. Services The Services Tab is similar to Services.msc; it displays the Service Name of the services on the remote system along with the Status, and Startup Type. Click a column heading to sort. Select a service to Start, Stop or Restart that service on the remote system. v RapidFire Tools, Inc. All Rights Reserved 24

25 V. Monitoring Templates How to Change and Add Monitoring Functionality Go to SettingsMonitoring Templates to see the default set of monitoring templates, shown in the image to the right. All of the Default Templates are locked and their settings cannot be changed. To change monitoring settings, clone a template, and change the settings in the clone (see the next section for how). There are three types of templates within ProactiveWatch, Base Templates (in blue) and Add-On Templates (in green) and Extension Templates. Only one Base Template may be assigned to a monitored device at a time. Base Templates are also tied to an Agent Type (Gateway Server, Server or Workstation). You cannot assign a Base Template to an Agent of a different type than the Template. So, if you create a new Server Template by cloning the default Server Template, you will only be able to assign the new template you made to servers that have the Server Agent installed upon them (and not to Workstations or Gateway Servers). Base Templates are the only place where you can set up monitors that have thresholds like CPU %. This is so you only ever have one of those kinds of thresholds to worry about per monitor, and never have to figure out which CPU % threshold (in which template) is causing the alarm (since there can be only one template with a CPU threshold assigned to any server or workstation). Add-On Templates are not typed (they can be assigned to any monitored device), and you can assign as many Add-On Templates to a server, workstation, or network device as you like. Add-On Templates are designed to let you handle the variation among devices at your customer sites without having to proliferate Base Templates. So, if you have two different kinds of backup software installed at your customer sites, each of which writes different events to the Event Log, you can create two different Backup Add-On Templates by setting up the Event Log monitoring appropriately in each, and then assigning those Templates to the appropriate servers. Extension Templates are Add-On Templates that contain a specific monitoring Extension for a specific type of server (like a Microsoft Exchange Server), or a specific type of third party service that requires in depth monitoring (like Symantec Anti-Virus or Symantec Backup Exec). Extensions are implemented as scripts that are downloaded to agents and then run upon a desired schedule. ProactiveWatch includes several extensions. These will be added to by ProactiveWatch over time, and you can also write your own. v RapidFire Tools, Inc. All Rights Reserved 25

26 Monitors in Base Templates, Add-On Templates and Extensions As mentioned above, there are three different types of Templates in ProactiveWatch, Base Templates, Add-On Templates, and Extensions. The different monitors that are available in the three types of templates are summarized in the table below: Template Type Base Add-On Extension Site Down Monitor Yes No No Internet Down Monitor Yes No No Server Down Monitor Yes No No LAN Latency Monitor Yes No No Auto-Started Service Down Yes No No Event Log Collection Yes No No Total CPU Usage Yes No No CPU Usage by a Single Process Yes No No Low Disk Capacity Yes No No Excessive Disk Time (Activity) Yes No No Low Virtual Memory Yes No No Low Physical Memory Yes No No Excessive Threads used by a Process Yes No No Excessive Handles used by a Process Yes No No Registry Change Yes No No Application Install/Removal Yes No No System Profile Change Yes No No Reboot Yes No No Application Crash Yes No No Port Error Yes Yes Yes Client to Server Initiator Yes Yes Yes Client to Server Listener Yes Yes Yes URL Availability and Response Time Yes Yes Yes Excessive ICA Connect Latency Yes Yes Yes Windows Event Log Alerting Yes Yes Yes Specific Service Down Yes Yes Yes Specific Process Down Yes Yes Yes MS Exchange Extension No No Yes Symantec Anti-Virus Extension No No Yes Symantec Backup Exec Extension No No Yes Microsoft Update Extension No No Yes In general the best practice is to have a small number of Base Templates that you can reuse widely across similar servers in your customer base. Then use Add-On Templates to handle variation between similar servers across customer sites. Use Extensions to add deep monitoring of certain functions to your system. v RapidFire Tools, Inc. All Rights Reserved 26

27 Changing the Monitoring Settings in a Template To edit the settings for an existing template, you double-click on it and go to the settings for that template. To create a new template, select the appropriate starting point (remember the type of the template much match the installed agent type), right click and select Clone. To edit the settings within a template take the following steps: 1. The set of monitors in a template that are enabled are in green, disabled monitors are in gray. To turn a monitor on, select it, right click, and choose Enable. 2. For most monitors the settings are in the columns to the right of the Alarm name. These cells are editable, and you can simply type in the values you would like for each monitor. 3. Some monitors have thresholds that are the numerical value in the monitor that must be exceeded in order for the monitor to alarm. The value is either a count (a number of handles), a percentage (X % of CPU), or a time value (a certain number of seconds or milliseconds). The Unit of the threshold is specified in the Unit Column. 4. Timeframe is the duration in seconds that a monitor must surpass the threshold in order to alarm. 5. Certain monitors required advanced configuration. These monitors have blue Configure links in the Advanced column. Click on the Configure Link to access the advanced configuration dialog for these monitors. Information on how to configure the advanced settings in the optional monitors is contained in the Optional Monitors section later in this manual. v RapidFire Tools, Inc. All Rights Reserved 27

28 Assigning Monitoring Templates to Workstations, Servers and Network Devices ProactiveWatch provides for an easy spreadsheet like user interface to assign monitoring templates to workstations, servers, and network devices. You access this interface by going to SettingsMonitoring Templates and selecting the Assign tab. All you have to do to assign a template to a device is to doubleclick in the cell that intersects that device row and the template column. You can copy and paste template assignments en-masse so you can quickly assign a set of templates to a set of devices. To do this, select a cell, right-click and select copy. You can then select N rows, select paste and past that selection to those rows. You can also copy and paste an entire row of selections if you have one server set up just right, and want to copy that assignment to N other rows. As mentioned before in the section on Monitoring Templates, you can only have one Base Template assigned to each server, workstation or network device. Furthermore, Base Templates have a type that matches the agent type you installed. You cannot assign a Base Template of one type to an agent of a different type. Only the allowed choices are in white in the Base Templates section of the Assign dialog. The Default Exclusions Template is automatically assigned to all devices, which gives you one easy place to manage all of the alarms that are not desirable. Please see more detail on this feature in the Manage Alarms section of this manual. Notice the in the case below, the HP Insight Manager, Symantec BackupExec, and All Event Log Errors Add-On Templates are assigned to all of the servers. This shows how easy it is to configure ProactiveWatch for the different scenarios you encounter at customer sites. The gray columns you selected in the main grid view determine the gray columns you see in the Assign dialog. If you are running out of real estate in this dialog, then go to Manage Columns and make a View called Assign Templates. Put the minimum columns you need in this view, and then select it before you come to this dialog. v RapidFire Tools, Inc. All Rights Reserved 28

29 Override Monitor Template There are two main uses for the use of Override Monitor Template. One is when you need to change a limited number of settings for just a single machine and the remaining monitoring settings in the standard template are fine. For instance, on a legacy/slower system you might want to increase just the CPU % threshold and would prefer not to create a new template. Another use is for setting specific variables in templates like Exchange Enhanced or the new [Round-Trip] Mail Monitor, without having to create a new template (which was a necessary step prior to this new feature). To use the Override feature, select the system from the main grid, and choose Edit- >Properties (F2) to bring up the Properties dialog box as shown to the right. Select the Override checkbox, and choose Edit to bring up the selected Monitoring Template settings, make and save your changes. You may perform Overrides for Base Templates and Add-On Templates. A system that has Overrides applied will be shown with a Red dot in Monitoring Templates, Assign Tab, as shown in the system to the right. v RapidFire Tools, Inc. All Rights Reserved 29

30 Default ProactiveWatch Monitoring Templates and Features When you install an agent, one of three Base Monitoring Templates is automatically assigned to that agent depending upon what type of agent you install. If you install a Gateway on a computer, then a Gateway Server Agent is also installed upon that computer, and the associated Gateway Server Base Monitoring Template is assigned to that Gateway Agent. If you install a Server agent upon a computer, the Standard Server Base Template will be assigned to that agent. If you install a Workstation agent upon a computer the Standard Client Base Template will be assigned to that agent. The agents in the default templates contain a set of default monitors shown in the table below. No configuration or customization is required to activate these monitors. Differences in Monitors between Agent Types The differences in the default monitors that are provided in the three default monitoring templates is shown in the table below: Computer Type Gateway Server Server Workstation Agent Type Gateway Server Server Workstation Default Template Gateway Server Standard Server Standard Client Site Down Monitor Yes No No Internet Down Monitor Yes No No Server Down Monitor Yes Yes No LAN Latency Monitor No Yes No Auto-Started Service Down Yes Yes Yes Event Log Collection Yes Yes Yes Total CPU Usage Yes Yes Yes CPU Usage by a Single Process Yes Yes Yes Low Disk Capacity Yes Yes Yes Excessive Disk Time (Activity) Yes Yes Yes Low Virtual Memory Yes Yes Yes Low Physical Memory Yes Yes Yes Excessive Threads used by a Process Yes Yes Yes Excessive Handles used by a Process Yes Yes Yes Registry Change Yes Yes Yes Application Install/Removal Yes Yes Yes System Profile Change Yes Yes Yes Reboot Yes Yes Yes Application Crash Yes Yes Yes The Gateway Server agent is the only agent that implements the Site Down and Internet Down Monitors. Since you typically have one Gateway at each customer site, these monitors serve to tell you if that site is up, and if the Internet is accessible from that site. The Server Down and LAN Latency Monitors are not implemented in the Workstation agents, since those agents typically get installed upon user computers including laptops that get turned off frequently (which would cause a false alarm if these monitors were v RapidFire Tools, Inc. All Rights Reserved 30

31 implemented. If you have a workstation that should be up all of the time, and you want to monitor it with the Server Down alarm, put a Standard Server Agent on that Workstation. How the Default Monitors Work in ProactiveWatch 1. Site Down Monitor The PW back end constantly monitors each GW to make sure that the GW is communicating back to the PW back end on the required intervals. If the GW fails to check in within the required interval (by default 60 seconds), the PW back end will issue a site down alarm. The PW back end will generate an to the main support account at the VAR, notifying the VAR of the outage. This notification does not rely upon any infrastructure at the customer or the VAR except the ability on the part of the VAR to receive an Internet Down the PW Gateway measures the response time from the GW of and every 60 seconds. If both of these web requests fail, the GW sends an Internet Down alarm to the back end, which generates an Alarm and a Notification as described above. Alarms and Notifications will also be generated if both sites are slow to respond. 3. Server Down Monitor the PW Gateway maintains a continuous connection with each monitored server. If that connection is broken, the Gateway sends a Server Down alarm to the PW back end, which generates an alarm and a notification as described above. 4. LAN Latency Monitor The GW continuously checks the latency over the LAN between itself and the monitored servers. If the performance of the LAN degrades, an alarm is generated. 5. CPU Usage Monitor If total CPU usage is above 95%, or usage by any single process is above 50% for the default time period, an alarm is issued. 6. Memory Usage Monitor If Physical Memory usage is above 90% or Virtual Memory Usage is above 70% for the default time period, and alarm is issued. 7. Disk Time Monitor If Disk Time (the percentage of the last second in which the disk controller is actively accessing the hard disk) is above 50% for the default time period, and alarm is issued. 8. Disk Capacity Monitor If the free space on any disk drive falls below 5% an alarm is issued. 9. Thread and Handle Usage Monitor If any single process uses more than the desired number of threads or handles, and alarm is issued. 10. Event Log Monitoring All Event Log entries written to the Applications Log and the System Log are automatically collected. These can be browsed with the Event Log Viewer that is part of the PW 1.6 Explorer. Alerts for any combination of severities and logs can be turned on for any combination of servers or workstations with one mouse click. 11. Installed Programs Monitor Any change to the set of installed programs (including Windows Hot Fixes and Security Updates) is detected, and alerted upon. Additionally any changes to the sections of the Registry that involve launching programs (Run, RunOnce) are also detected. 12. Application Crash Monitor If any process on the server crashes, this crash is detected. Dr. Watson crash dump information is also collected if Dr. Watson is enabled on the server. v RapidFire Tools, Inc. All Rights Reserved 31

32 13. Windows Service Monitor if any automatically started Windows Service goes down, and alarm is issued. 14. Reboot Monitor If a server reboots and alarm is issued. Normal reboots can be easily masked out with the Marked As Normal features of the system. 15. System Profile Monitor If the profile of a monitored server changes (for example, the IP address of a server changes), an alarm will be issued. Default (Out-of-the-Box) Network Device Monitoring Any server agent can monitor any network device that it can access via ICMP and SNMP. If the VAR provides the information to the right about a Network Device, then ProactiveWatch will automatically monitor that network device. The default Network Device template is shown below with the default settings for network device monitoring. The monitors that are on by default are: 6. ICMP Ping Failure The selected Server Agent will ping the network devices and issue an alarm if the devices fails to respond. 7. If packet loss on the ping exceeds the threshold, and alarm will be issued. 8. If the response time on the ping exceeds a latency threshold, an alarm will be issued. 9. If the profile of the network device (for example the version of its installed software) changes, and alarm will be issued. 10. If utilization of any of the inbound or outbound interfaces exceeds the threshold, an alarm will be issued. The Connected Network Device monitor is off by default since it will alarm whenever the set of devices connected to a switch or router changes. This can be a very valuable monitor in certain circumstances, but it will generate a large number of false alarms for routers and switches that support workstation and laptop computers. v RapidFire Tools, Inc. All Rights Reserved 32

33 Optional Monitors in ProactiveWatch ProactiveWatch contains a wide variety of monitors that you can enable by simply selecting them in a monitoring template and turning them on. Some of these monitors require some customer specific configuration. The optional monitors are detailed below: 11. Web Site (URL) Response Time Monitor This monitor tests the availability and response time of any selected web site. This can be a public web site, a corporate intranet, or a Citrix Web Interface Server. Any agent can run this monitor against any web server that is accessible from the computer that the agent is running on. 12. ICA Port Response Time Monitor This monitor tests how long it takes a Citrix server to respond to connect request on the ICA port from the agent making the port request. Any agent can run this monitor against any Citrix server that is accessible from the computer that the agent is running on. 13. Port Monitor This monitor allows the VAR to specify ports that must be present (80 and 443 on a web server), ports that are allowed to come and go (135 the RPC port), and then either ban a specific black list of ports or, as is shown in the example to the right, ban all ports that are not either required, or specifically allowed. v RapidFire Tools, Inc. All Rights Reserved 33

34 14. Client2Server Monitor This monitor tests the latency over a TCP/IP socket between any two sets of monitored devices. The C2S monitor is an excellent choice to watch the latency between the servers that constitute the tiers of an applications system (for example from web servers to applications servers, to database servers). The Client2Server Monitor is configured in two different places server(s) that respond to (listen for) latency checks and server(s) that create (initiate) latency checks. To configure the listener, clone the Generic Exclusions Template and make an Add-On Template named C2S listener. Enable the C2S Listener in that template. Use Monitoring TemplatesAssign to assign the C2S Listener Add-On Template to the servers that will be responding to latency checks. To configure the initiator, create another Add-On Template named C2S Initiator. Configure it to send latency checks to the servers that you have applied the Listener template to. Assign this template in Monitoring TemplatesAssign to the servers or workstations that you want to test the latency to the target servers. Note that the configured port (29100 by default) must be open between the two sets of servers for this monitor to work. 15. Individual Service Monitor By default ProactiveWatch monitors all automatically started services and alarms if any of them go down. If you wish to monitor services that are not automatically started, you can do so by configuring the Specific Windows Service Down Monitor. Please enter the Display Name of the service in the dialog when configuring this monitor. 16. Process Down Monitor ProactiveWatch can be configured to watch any specific process. This monitor is enabled by default in the Exchange Server template to watch store.exe. Just enable the Process Down Monitor in the Template (Base or Add-On) of your choice and then add the process name you would like to have monitored. 17. Total Handle and Total Thread Usage Monitors These monitors watch the total number of threads and handles in use. Since the acceptable number is highly dependent upon the type of work that a server is doing, these monitors should be turned on within a monitoring template dedicated to a specific type of server. 18. Memory Usage by a Process This monitor can watch the memory usage by individual processes, and should be using in conjunction with application specific monitoring. v RapidFire Tools, Inc. All Rights Reserved 34

35 19. Extensions 1.6 includes Extensions that provide very detailed monitoring of Microsoft Exchange, MS Update, Symantec Anti-Virus, and Symantec Backup Exec. Other extensions will be added over time. You can even add your own extensions. Extensions are documented in Chapter XVII. v RapidFire Tools, Inc. All Rights Reserved 35

36 Threshold Timeframe for Windows Service Monitoring. This allows you to avoid false alarms for services that are automatically restarted by setting a timeframe (in seconds) the service must be down before ProactiveWatch will alarm on service down. Set the threshold Timeframe for Automatically Started Services in the Base Template (below), or for Specific Windows Service in either an Add-On or Base template from the Configure panel. Round-Trip Monitor There is a new enhanced monitoring template, Mail Monitor, that allows you to perform round-trip monitoring of your client s hosted (or non-exchange) systems. (This version will not work if SSL is required.) Clone the Mail Monitor template, or assign it to a system and use the aforementioned Override feature, in order to configure the variables for the system. At a minimum, you will need to create a designated address and specify: _From and _To addresses the SMTP information (which does not need to be the same server) and enable at least one of IMAP, POP or MAPI and configure the related variables The default schedule is to send and then retrieve the test every 5 minutes, 24x7x365. (Change the schedule by clicking into the Schedule field.) The process is that ProactiveWatch will send the test as configured, and then login via the enabled Check_ methods to retrieve the test . It will delete all s in the test mailbox after each check, so this must be a mailbox designated only for ProactiveWatch s use. Use Settings->Manage Columns to add the column to the right side in the Selected panel if you wish to have a visible indicator of alarms from this monitor. To test that this is working, [temporarily] enable ALARM_ON_SUCCESS. v RapidFire Tools, Inc. All Rights Reserved 36

37 SNMP Bandwidth Monitoring ProactiveWatch can perform bandwidth monitoring of network devices (like switches and routers) via SNMP Gets. Two improvements to SNMP Network Device Bandwidth are: Reports will now include kbps (as well as the previous % utilization metrics) Line speed values may be specified for individual interfaces for more meaningful % reporting and alarm thresholds ProactiveWatch performs SNMP walks to determine the serial ports on the devices being monitored, and also queries the device for the line speed which is used to calculate the bandwidth utilization percentages for reporting and threshold alerting. Often the device returns the maximum capable speed of the port which does not match the actual line speed. For example, the port may be capable of 100 Mbps, but in actuality it is connected to a 1.5 Mbps data line. ProactiveWatch cannot know that it is 1.5 Mbps, so all calculations are performed using 100 Mbps. This new feature allows you to supply the actual line speeds to be used in the monitoring and reporting calculations. To supply the line speed for the ports being monitored, you will either clone the Network Device template (from Settings->Monitoring Templates), or use the Override feature described above, then enter the actual line speeds as shown: 1. From Edit Template, click any one of the Configure buttons associated with Column Bandwidth Usage (they all go to the same place). 2. In the Configure SNMP panel, enter the interface numbers and the corresponding Line Speed Proactive Watch should use for its calculations v RapidFire Tools, Inc. All Rights Reserved 37

38 If you are not sure what the interface numbers are for a device, you can use View Metrics to see the Serial interfaces that ProactiveWatch detected. Note: There are two reasons that View Metrics could be blank: (1) The Network Device was just installed. Check again in an hour. (2) The SNMP Community string or IP address was specified incorrectly. Low Physical Memory (<MB), in the base templates, (shown on right), can be enabled and configured to alert when available Physical Memory is lower than the specified amount, providing greater control and accuracy when monitoring in these dynamic virtual environments. Typically you would disable the Low Disk Capacity %- based rule, but the two rules can be used simultaneously. Remember, you can create a new template or use the Override feature (documented below), to enable and use the new settings. Low Disk Capacity (<MB), in the base template (shown above) can be enabled and configured to alert on disk space lower than a set amount in MB, providing fine-grained control for more accurate and reduced false alarm conditions. Typically you will disable the %-based rule, but the two rules can be used together. (Again, create a cloned base template or use override to enable/configure the new setting.) Enhanced SNMP monitoring. A new SNMP "Add-On Template" allows you to go beyond monitoring of Up/Down (via PING) and MIB II bandwidth to specify Object Identifiers (OIDs) to be read via SNMP, and return an alarm based on comparison to a specified value Please keep in mind that this is a technical" feature, and you should be familiar with SNMP and will need to know and specify the full OID to be read. ProactiveWatch support can assist with configuration problems and questions, but does not have the knowledge of what OIDs to be used on different SNMP enabled devices. a. Add a device to be monitored i. From the Explorer, use Settings->Add Network Device to specify a Windows server in the client environment that will perform the SNMP gets. ii. Ensure that SNMP "gets" are enabled on the target network device and that you have specified the correct Community String when configuring the Add Network Device. iii. If the device is not a switch/router, you should create a new Network Device Base Template (using clone) and turn off the bandwidth and/or PING related rules to avoid false alarms (remember to assign the new template). b. From Settings->Monitoring Templates, find and clone the sample SNMP Enhanced Add-On template, and double-click to open the new template for configuration. Specific configuration details are on the following page. v RapidFire Tools, Inc. All Rights Reserved 38

39 c. Assign this new cloned template to the Network Device being monitored (not a server) once the configuration has been completed. d. Use Settings->Manage Columns to display the SNMP Column on your main grid view. v RapidFire Tools, Inc. All Rights Reserved 39

40 The fields are: Action OID Compare Currently may only be set to ALARM Enter the OID to be retrieved from the network device Use the drop down (as shown) to select the comparison. If the test is TRUE, the alarm is generated. Op Type Description = Numeric Equal to >= Numeric Greater than or Equal to > Numeric Greater than < Numeric Less than <= Numeric Less than or Equal to!= Numeric Not Equal to eq String Equal to eqi String Equal to case insensitive ne String Not Equal to nei String Not Equal to case insensitive re String Regex (1) Equals rei String Regex (1) Equals case insensitive <> Range (2) Alarm if OID value Less Than x or Greater Than y. ( Not between, non-inclusive) <=>= Range (2) Same as above, but inclusive. >< Range (2) Alarm if OID value Greater Than x and Less Than y. (Between, noninclusive.) >=<= Range (2) Same as above, but inclusive. Threshold Message Notes: (1) Regular Expression (regex). See Regex below. (2) These operations are a Range Comparison as defined by the operator and two parameters (x & y) in the Threshold column, separated by a comma. The value to compare the OID information against. Note the Type of Range (2) requires two numbers separated by a comma (e.g. 50,80). The text information you want to include in the Alarm v RapidFire Tools, Inc. All Rights Reserved 40

41 Regex patterns (regular expressions) employ a set of rules or parameters, a small subset that will be described here and should be sufficient for many applications. Pattern Explanation Any character * Zero or more characters + One or more characters A-Z a-z A-z The ASCII characters A through Z The ASCII characters a through z The ASCII characters A through z 0-9 The ASCII characters 0 through 9 [abc] The characters a or b or c \ Used to indicate the next character is literal \\ Indicates the literal \ \. Indicates the literal. \n Indicates a new line ( ) Defines the capture text from the OID read to be used in the compare An Regex example is:.*status:.*([a-z])\.* which would return the text following the word Status: and ending in., and might be compared to OFFLINE as an alarm condition. It is beyond the scope of this text to attempt a full explanation of regex. There are numerous sources to learn more, but one good site is: or v RapidFire Tools, Inc. All Rights Reserved 41

42 Extended Profile Template This new template will return additional information for the systems that you are monitoring. This includes information on the System Profile, and also returns the current console user that is logged into the machine, which can be very useful when monitoring and managing workstations. Assign the Extended Profile template You must apply this template to the machines in order to have ProactiveWatch collect the new information. From the Explorer, use Settings->Monitoring templates and assign the template called Extended Profile to your client s systems. Remember that you can use the Copy / Paste function to speed this up. From the Assign tab in the Monitoring Templates dialog, double-click to assign the Extended Profile template to the first machine. Right-click and choose Copy. Then multi-select (SHIFT or CTRL-click) to select other machines, and choose Paste to copy that single action to the other machines. Once you assign the template, it can take minutes for the template to be downloaded and then executed on the systems. This template will be run approximately every minute so that changes to the Console User will be transmitted to the ProactiveWatch system and displayed in your Explorer Console. Display the Console User column To view the logged in console user you need to make sure that the Console User column is displayed in your explorer. Go to Settings->Manage Columns. In the Available (left) column, find Console User and click the right triangle to move it to the Selected column. You may then drag it up in the Selected column to position it in the order you wish. Enhanced System Profile information The new information collected is shaded in the table below (which is output from a System Compare), and includes new key items such as information on: Memory Banks (installed, RAM size, available) Microsoft Windows Key Network Adapters Service Tag (Dell, etc.) System Slots (Note: Not all systems return all information. If information is not returned from the system, it will be blank.) v RapidFire Tools, Inc. All Rights Reserved 42

43 As a reminder, the System Profile information is available from: Compare->System (which can be copied to clipboard; pasted into Excel, etc.) Alarm History, Profile Tab Alarm Detail, Profile Tab Report->Inventory Note! System Profile information is part of the meta-data that is collected and transmitted to our servers daily. So if you require instant gratification please do the following: Tun the Agent Manager (from the Start Menu) on a system Go to Views->Override->Agent The last item in the first list is Last Profile Sent. Click the Now link to force an update v RapidFire Tools, Inc. All Rights Reserved 43

44 File and Directory Monitoring The new File/Directory add-on template allows you to monitor files or directories for a variety of conditions, and you can set the alarm message and determine the ProactiveWatch column for the alert. For example, this is useful for monitoring the last modified attribute of an antivirus or anti-malware definition file to alarm if it has not been modified in 7 days, with the alert details populating the A/V alarm column. Clone the File/Directory Monitoring template, rename it and double-click to open it. Click Add to add a new rule to this template (right). Enter the file or directory, and enable the conditions to be monitored. Set a timeframe for the condition, and customize the alarm message if desired. (The monitoring extension that performs the monitoring runs once per minute.) v RapidFire Tools, Inc. All Rights Reserved 44

45 Monitoring Extensions ProactiveWatch includes the ability to deeply monitor a specific vendor s product or service with monitoring functionality custom to that product or service. Certain extensions are provided by ProactiveWatch and are included in ProactiveWatch. You can also write your own extensions and have ProactiveWatch install and distribute them for you. ProactiveWatch includes the following extensions: 1. Microsoft Exchange deep monitoring of Exchange queues, and mail flow over POP, IMAP and MAPI 2. Symantec Anti-Virus monitoring of whether signatures are up to date, and if a virus has been found 3. Symantec BackupExec monitoring of whether or not all configured backups have completed successfully 4. Microsoft Update monitoring of whether or not all available patches have been installed Extensions are provided in ProactiveWatch via an additional set of Add-On Templates. If you go to SettingsMonitoring Templates, you will see four new Add-On Templates that correspond to the four Extensions described above. Templates that have Extensions assigned to them, list the short name of the Extension (MSEXCH, MSUPD, SAVMON, and SMBE) in the Extensions Column. v RapidFire Tools, Inc. All Rights Reserved 45

46 Displaying Extension Monitor Status in the Explorer Grid View Go to SettingsManage Columns. Select the four columns highlighted in the Available box on the left of the screen shot. Hit the right arrow. This will move those columns to the bottom of the Selected set and display them to the right in your Grid View. This will display the alarm status of all four extensions. You can also add a column named Installed Extensions to cause a column to appear that lists the extensions installed on each computer in that column. If you configure your columns as described above, you will have a Grid View in your Explorer that will look similar to the one below. Your Extensions will be listed to the far right of all of your columns, and you will have a column that lists each of Extensions installed on each computer. All alarms for the MS Exchange extension will appear in the MS Exchange column. The same is true for the MS Update Extension. All Anti-Virus extension alarms (for Symantec and for all other AV products that will be supported over time) will roll up into the blue Anti-Virus column. All Backup Extension alarms (for Symantec and all other backup products that will be supported over time) will roll up into the blue Backup column. v RapidFire Tools, Inc. All Rights Reserved 46

47 Assigning Extensions to Servers and Workstations The default extensions that are provided with ProactiveWatch are all locked. This means that you cannot change their configurations. However, they come with default configurations, and in some cases, you might just be able to use the default configurations. The Symantec Backup Exec, and the MS Update Extensions contain no environment specific configurations, so as a first step, if you have computers that have Backup Exec and/or MS Update installed upon them, you might want to just assign the templates corresponding to these extensions to those computers. Templates that contain Extensions have Enhanced in their names. This is to differentiate them from templates that address the same product (for example Symantec Backup Exec) but that monitor the services, processes, and event log entries for that product. In the screen shot below, you see two templates with Symantec Backup Exec in their names: 1. Symantec Backup Exec this template monitors the services, processes and event log entries for Backup Exec. 2. Symantec Backup Exec Enhanced this template contains the Backup Exec Extension, and does not contain the service, process, and event log monitors contain in the template described in #1 above. Since the Symantec Backup Exec, Symantec Anti-Virus and the MS Update Extensions do not contain parameters that could be specific to a customer environment; you can get started with Extensions by simply assigning these Extension templates (with Enhanced in their template names) to the computers that Symantec Backup Exec, Symantec Anti-Virus and MS Update installed upon them. Note that if you want both the Symantec Backup Exec Extension monitoring and the monitoring of Backup Exec services, processes, and event log entries; you have to assign two templates to each of the computers running Backup Exec. v RapidFire Tools, Inc. All Rights Reserved 47

48 Customizing and Configuring Extensions In order to change the default configuration of an Extension, or to customize one specific to your customer base, or a specific customer you have to first clone the extension. Go to SettingsMonitoring TemplatesDefine Tab, select the Extension you wish to customize, right click and select Clone. Give the template a name. Please be aware of the following considerations when naming Extension Templates: 1. The Symantec Anti-Virus, Symantec Backup Exec and MS Update templates contain no parameters that are specific to a customer environment. You might be able to use the default extension template, or create one clone of each of these templates that you can reuse across all of your customers. You might want to consider naming such a template MS Update Global Tech where Global Tech is the name of your company. 2. The MS Exchange Extension requires a unique configuration for each Exchange Server that you wish to monitor. If you have customers with more than one Exchange Server, then you might want to use a naming convention like Exchange Extension Cust Name Computer. If you implement the suggestions in 1 2 above, then you might end up with the following assignments in the SettingsMonitoring TemplatesAssign Tab: 1. The Exchange Add-On (Exchange services, processes, and event logs) is assigned to all Exchange Servers and MS Exchange Fugitive (the Exchange Extensions template for this specific Exchange server) is assigned to just the Fugitive Exchange Server. 2. The Default MS Update Extension Template is assigned to all servers. 3. The Symantec Anti-Virus template (services processes, and event logs), and the Symantec Anti-Virus Enhanced template are assigned to all computers that have Symantec AV installed upon them. 4. The Symantec Backup Exec template (services processes, and event logs), and the Symantec Backup Exec Enhanced Template are assigned to all servers and workstations that have Symantec BE installed upon them. v RapidFire Tools, Inc. All Rights Reserved 48

49 MS Exchange Extension Configuration and Monitoring Details You may use the Default MS Exchange Extension template to monitor the Services, Thresholds and DNS based on our default settings. In order to use the Exchange Extension with the more powerful Round-Trip verification, you must first clone the Add-On Template that contains the Extension, and give the resulting Add-On Template a unique name. Since Exchange Extensions are specific to each Exchange Server, you should name these templates with names that correspond to each Exchange Server at your customer sites (you will need one unique Exchange Extension for each Exchange Server at your customer sites). Using the Round-Trip Verification ProactiveWatch can be configured to log into a test account to send and receive test s to ensure true mail flow. Create a test address on the Exchange server for the exclusive use of ProactiveWatch. The ProactiveWatch MS Exchange Extension will send s from this account, thereby testing that SMTP is functioning. It will then log into the account via one or more of IMAP, MAPI and POP3 to ensure that mail is flowing for each of these protocols. If mail is not received for each the protocols you have selected for testing, an alarm will be created. As mentioned, it is necessary to clone and save a template for each customer s Exchange Server that you wish to monitor with Round-Trip Verification since mailbox names and login credentials will be specific to the Exchange Server. You will then fill in the necessary parameters based on the protocols that are to be tested on this Exchange server. At a minimum, you must specify the SMTP credentials, and credentials for at least one of IMAP, MAPI or POP3 in order for ProactiveWatch to test that mail is received and to clear the from the system. v RapidFire Tools, Inc. All Rights Reserved 49

50 Configuring the MS Exchange Extension To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for an Exchange Extension: Alarm on Success (true/false). If true generates an alarm if all monitors pass their test. If you have mail flow monitoring configured, this is a great way of getting a positive acknowledgment that the Exchange Server is working. Check IMAP, MAPI and POP - (true/false). This turns on mail flow monitoring via each of these protocols. You must configure accounts and parameters for each one of these monitors for them to work. (I.e.-You must set _HOST, _USER, _PASSWORD, _PORT, etc., for each protocol to be monitored.) Collect Exchange Diag (true/false). If true causes the Extension to collect diagnostic data when an alarm occurs, which is then presented along with the alarm. Deferred Delivery Queue Threshold (type in value). This queue contains messages that are queued for later delivery. This queue might contain messages that were sent by earlier versions of Microsoft Outlook, such as Microsoft Outlook Newer versions of Outlook store these types of messages in v RapidFire Tools, Inc. All Rights Reserved 50

51 the Exchange store. Messages remain in the Messages Queued for Deferred Delivery queue until their scheduled delivery time. The threshold is the size of the deferred delivery queue that will be allowed before an alarm is triggered. Failed Message Queue Threshold (type in value). This queue contains messages that failed a queue submission. Messages can fail a queue submission for several reasons, and the failure can occur before any other processing is done. If messages are corrupted or system resources are low, messages appear in this queue. The threshold is the size of the queue that will be allowed before an alarm is triggered. Local Async Queue Threshold (type in value). This queue contains inbound messages for delivery to mailboxes on the Exchange server. The threshold is the size of the queue that will be allowed before an alarm is triggered. Post DSN Generation Queue Threshold (type in value). This queue contains DSN messages pending submission. DSN Messages are Delivery Status Notification messages. The threshold is the size of the queue that will be allowed before an alarm is triggered. Pre Cast Queue Threshold (type in value). This queue contains messages waiting directory lookup. The threshold is the size of the queue that will be allowed before an alarm is triggered. Pre Routing Queue Threshold (type in value). This queue contains messages waiting to be routed. The threshold is the size of the queue that will be allowed before an alarm is triggered. Pre Submission Queue Threshold (type in value). This queue contains messages pending submission. The threshold is the size of the queue that will be allowed before an alarm is triggered. DNS Check Hostname and ResolveIP (type in value). These parameters are unique to each Exchange Server, and must be uniquely specified for each server you want to monitor. FROM and TO (type in value). These are the TO: and FROM: addresses that will be used when test s are sent for POP, IMAP and MAPI mail flow monitoring. Host, Password Port and User - (type in values). These values need to be set for each of the POP, IMAP, and MAPI mail flow monitors that you want to set up. You need to create an account on the Exchange Server that corresponds to the values that you use here. SMTP Auth (true/false). Whether or not to use SMTP Authentication in the mail flow monitors. Schedule (drop down, or Cron type in) - This determines how often the Extension will run to check the status of the Update process, and the availability of any updates. Timeout (type in value) the number of seconds that the Extension is allowed to run. v RapidFire Tools, Inc. All Rights Reserved 51

52 MS Update Extension Configuration and Monitoring Details The MS Update Extension is contained in an Add-On Template named MSUpdate Enhanced. You can assign this template to any server or workstation in its default state, and it will monitor the MS Update process in the following manner: If the MSUpdate process gets turned off or disabled in any manner you will get an alarm When Updates are available, but not installed yet, you will get an alarm that will include the list of available updates The Extension will run once a day to determine the status of the MS Update process. If you wish to change any of the above parameters, you will need to clone the MS Update Enhanced template and give your clone a unique name. Since there are no customer or server specific configurations required for the MS Update Extension you can use one or just a few clones to cover your entire customer base. If you are going to use just one clone to cover your entire customer base, you might want to create a clone that reflects your company name, like MS Update Global Tech. To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for an MS Update Extension: Desired_Levels (drop down) Selects which states of the MS Update process will cause an alarm. By default, the Extension will alarm if the Update process is Not Configured, Disabled, or in an Unknown state. You can select the states that are required, and then the Extension will alarm if the process is not in one of the required states. Monitor_AutoUpdates (true/false) - If true will alarm when updates are available and provide a list. Schedule (drop down, or Cron type in) - This determines how often the Extension will run to check the status of the Update process, and the availability of any updates. Timeout (type in value) the number of seconds that the Extension is allowed to run. v RapidFire Tools, Inc. All Rights Reserved 52

53 Symantec Anti-Virus Extension Configuration and Monitoring Details The Symantec Anti-Virus Extension is contained in an Add-On Template named Symantec Anti-Virus Enhanced. You can assign this template to any server or workstation in its default state as long as the Rtvscan.exe program is installed in the directory that is specified in the default template. The default template and Extension will monitor the Symantec Anti-Virus in the following manner: If a virus is found, your will get an alarm If the virus definitions have not been updated within Max-Days, you will get an alarm The Extension will run once a day to determine the status of the Symantec Anti-Virus process. If you wish to change any of the above parameters, you will need to clone the Symantec Anti-Virus Enhanced template and give your clone a unique name. Since there are no customer or server specific configurations required for the Symantec Anti-Virus Extension you can use one or just a few clones to cover your entire customer base. If you are going to use just one clone to cover your entire customer base, you might want to create a clone that reflects your company name, like MS Update Global Tech. To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for a Symantec Anti-Virus Extension: Alarm_On_Success (true/false) If true will generate an alarm if Symatec AV is fully operational and if virus updates have occurred within the Max_Days window. Max Days (type in value) The number of days that can elapse since the last virus definitions update. If this number of days is exceeded and alarm will be generated. Scan_File (type in value) The location of the Rtvscan.exe file on the computer s hard disk. This value is retrieved from the registry so it only needs to be filled in if the value cannot be retrieved from the registry, or if the registry is incorrect for some reason. Schedule (drop down) the schedule upon which the Extension runs. Timeout (type in value) the number of seconds that the Extension is allowed to run. v RapidFire Tools, Inc. All Rights Reserved 53

54 Symantec Backup Exec Extension Configuration and Monitoring Details The Symantec Backup Exec Extension is contained in an Add-On Template named Symantec Backup Exec Enhanced. You can assign this template to any server or workstation in its default state. The default template and Extension will monitor the Symantec Backup Exec in the following manner: The Extension will monitor the successful completion of all backup jobs known to Backup Exec, and alarm if any of them fail. An alarm will also get generated if all jobs complete successfully (positive acknowledgement) The Extension will run once every hour to determine the status of the backups. To change any of the above parameters, clone the Symantec Backup Exec Enhanced template and give the clone a unique name. Since there are no customer or server specific configurations required for the Symantec Backup Exec Extension you can use one or just a few clones to cover your entire customer base. If you are going to use just one clone to cover your entire customer base, you might want to create a clone that reflects your company name, like Symantec Backup Exec Global Tech. To make configuration changes, double click on the field containing the value you want to change. A drop-down box will appear that gives you the choices for the field unless it is a field that requires you to type in a value. The following parameters can be configured for an Exchange Extension: Alarm on Success (true/false) if set to true will alarm if all backup jobs complete successfully Check (type in field) a list of job ID s to be checked. Used if the Check_All field is set to false Check_All (true/false) if set to true, all backup jobs will be checked. If set to false, the list of jobs to be checked must be specified in the Check field. Ignore (type in field) If you set Check_All to true, you can provide is list of job ID s to be ignored Schedule (drop down) The schedule upon which you want the Extension to run Success (type in field) The list of codes that constitute success. Code 2 is always included Timeout (type in field) How long you want the Extension to run before it times out. v RapidFire Tools, Inc. All Rights Reserved 54

55 VI. Analytical Tools in the ProactiveWatch Explorer All of the Tools discussed in this section are accessible from within the ProactiveWatch Explorer by either selecting a row (selecting a monitored device) and then pulling down the Tools menu, or right-clicking upon the selected row and choosing the tool. Show Issues Show Issues rolls up the alarms that have occurred on the selected devices for the last 24 hours, 3 days, or 7 days. In the image below, the breakout of the errors in the Application Event log by source is displayed. This can be very useful for determining the pattern in a series of problems on a server. View Metrics Since ProactiveWatch collects data every 10 seconds, the last 360 samples represents the last hour of data for a monitored device. That data is presented in a summary form in the View Metrics dialog shown below. v RapidFire Tools, Inc. All Rights Reserved 55

56 Creating a Time and Date Based Snapshot You can select any set of rows in the Explorer, and create a time and date based snapshot for those servers, workstations, and network devices. To create the snapshot, select the rows of interest, rightclick and choose Create Profile Snapshot. You can then compare the current state of any server, workstation or network device to that Snapshot in System Compare, Applications Compare, and Published Applications Compare. v RapidFire Tools, Inc. All Rights Reserved 56

57 System Compare Selecting any set of devices, and then selecting System Compare produces the comparison table below. This table allows you to compare the System Profile of any set of devices to each other, and to the a state at a previous point in time. In the example below, the current states of Panthro and Panthro2 are compared to each other, and to a snapshot of Pantho that was made on 5/10/2007 at 11 AM. Snapshots can be made of any set of managed devices at any time, and can then be pulled up for comparisons. Application Compare Application Compare allows you to compare the installed software across any set of managed devices, and compare the currently installed set, to the set that was installed when you made a snapshot. In the example to the right, Panthro2 has Windows Server 2003 SP1 and a number of security updates that are not present on Panthro. Since both of these servers are load balanced web servers in a farm they are supposed to be identical. However you can also see that they have both been updated to the newest version of the ProactiveWatchAgent. v RapidFire Tools, Inc. All Rights Reserved 57

58 Event Log Analyzer ProactiveWatch automatically collects the Applications and Systems logs from every monitored Windows Server and Workstation. This data is then summarized in the ProactiveWatch database, and can be browsed in the Event Log Analyzer. The Event Log Analyzer allows you to choose the day you want to browse, the computer you want to browse, the Windows Event Log to browse, and then your choice of all log sources or an individual one. The detail table can be sorted by any column heading to, for example quickly bubble up all of the errors. Distribution Graph The Distribution Graph allows you to compare key metrics across servers, and look at their average, minimum or maximum values. This graph accesses up to seven days of historical data. An extremely useful application of this graph is to find the maximum number of concurrent users across a set of terminal servers in the last N days. v RapidFire Tools, Inc. All Rights Reserved 58

59 Trend Graph A Trend Graph for a wide variety of metrics going back up to seven days provides for a valuable look at upcoming problems. For example, the trend in physical memory utilization for Panthro is definitely both up and nearing the maximum acceptable level. Multi-User Impact Analysis The Multi-User Impact Analysis graph is very useful to determine how Citrix and MS Terminal Servers are running out of capacity as user load grows. The graph to the right collects the last 7 days of concurrent usage data along with how key system metrics change as user load grows. This server is at 80% of physical memory at 23 concurrent users. Additional users on this server would not be a good idea. v RapidFire Tools, Inc. All Rights Reserved 59

60 VII. Patch Management ProactiveWatch s patch management centralizes the management of Windows OS patches across your customer base. Simple to setup and use, easily deploy patches to all of your clients, just certain clients, or even to specific systems. It utilizes the standard built-in Microsoft update mechanism found on all Windows devices and does not require WSUS. There are ad hoc reports for Critical Patches Available, KB Article Patches Available and Failed Patches that can be run for all or selected customers, computers, etc. So that you are able to perform Patch Management functions without further configuration, the Windows Update Enhanced template and associated monitoring scripts are installed and activated on the new installs of the ProactiveWatch agent. This will not apply any patches so this is completely safe. This will simply allow your ProactiveWatch system to collect information on available patches so that you can perform patch management if and when you choose. If you would like to disable the collection of patch information, choose Settings->Monitoring Templates, Assign tab, and de-select the Windows Update Enhanced template for the appropriate systems. v RapidFire Tools, Inc. All Rights Reserved 60

61 Scheduling Windows Patch Updates for specific days You may now set a schedule for the ProactiveWatch Windows Update mechanism in order to have updates applied only on certain days. This is done by using CRON to set a schedule for the template to be run, in conjunction with the Patch_Install_Window to control the time. If you are using the default Windows Update Enhanced template, you will need to clone it and make the changes in the new template. 1. In the Explorer, go to Settings->Monitoring Templates 2. Find the Windows Update Enhanced template, select it, right-click and choose Clone 3. Remember to assign it to the intended systems 4. And Unassign "Windows Update Enhanced" or the values there will continue to apply patches daily! Next, in the ProactiveWatch Explorer, open the template you are using for the Windows Updates. Click Configure and click into the "Schedule" field to get the pop-up to enter the custom CRON which tells when the template will be "run as shown in the screen below. You may enter your own custom crontab schedule in the Frequency field using the format: <minute(0-59)> <hour(0-23)> <day-of-month(1-31)> <month(1-12)> <day-of-week(0-6)>. Each "field" is separated by a single space, using commas or hyphen without a space to separate multiple entries within each "field." As an example: * 1-4 * * 1,5 programs the ProactiveWatch Windows Update template to be run by the agent only between 1 to 4 am on Mondays and Fridays. Another example: * * * 5 programs the ProactiveWatch Update mechanism to be run by the agent between 8pm-11pm only on Friday evenings Note that it is CRITICAL that you set the Patch_Install_Window and Patch_Install_Duration to coincide with the CRON schedule or patches will not be installed: v RapidFire Tools, Inc. All Rights Reserved 61

62 VIII. Reporting Patches and Inventory are available from the Explorer in the Report menu. The reports can be filtered by Customer, Computer or any other ProactiveWatch relational column, and reports can be printed or saved as PDF or Excel. Additionally you can create a PDF report for each of your customers with a single click. Automatic Semi-monthly Patch Management Report This report details the patches by computer applied in the previous 14 days /month respectively. You will receive a Word document for each of your clients where Patch Management reports are enabled (see Scheduled Reports, below). This is an excellent report to show your customers how much work you have performed on their behalf. Since the intent of this report is to allow you to show the work performed, it does not show failed patches or patches that have not been applied. You may run those reports on an ad hoc basis from the Explorer. Manage Scheduled Reports Schedule Reports Management allows you to enable/disable reports on a computer by customer basis, and override the Default Repot Destination address on a per report basis. Reports are enabled by default, and will show as blank cell (white) if disabled. This allows you to send the reports directly to your clients if you wish, or to send reports to different technicians based on their roles and responsibilities. Click into a cell to enter specific destination address(es), or select multiple rows and right click to enable/disable, or set addresses en masse. v RapidFire Tools, Inc. All Rights Reserved 62

63 IX.Remote Control Integrated Remote Control A technical preview of our new integrated remote control solution based on VNC is available for your use, giving you instant remote control access to your client s servers and workstations from the ProactiveWatch explorer. Once you have installed ProactiveWatch agents with the Remote Control (see below), you can select the row of the system, Right-Click, and you will see two Remote Control related options. Remote Control Use this option to bring up the dialog box to enter the password, and choose Connect to initiate the remote control session. You may enable the Remember Password checkbox to store the password for this machine (which will then enable the Quick Connect option for future use - below). Enable Kill Existing Connections if you wish to kill any other ProactiveWatch remote control sessions to that machine. Click Connect to initiate the session. This can take seconds if FreeMyIT was in a long idle polling state before you see the VNC status box in the top left corner. Remote Control (Quick Connect) (or use Function Key F6) For one-click access, you may save the password in which case Remote Control (Quick Connect) will be available or just press F6! Security Our implementation of this remote control is secure and does not require that you open any inbound ports, but it does require that the FreeMyIT agents are installed. Installing Remote Control On new installations, run the ProactiveWatch Gateway or Agent installer as you normally would. You will supply a password of 8 characters or less for the remote control. You may change the password by running the ProactiveWatch Agent Manager on the target machine (choose Views, Remote Control). v RapidFire Tools, Inc. All Rights Reserved 63

64 For existing installations of ProactiveWatch, perform the following: From the ProactiveWatch Explorer, use Settings->Manage Updates and update the systems if necessary. Run ProactiveWatch Agent Manager on the target machine select Views-> Remote Control. This will display a list of the necessary components that need to be installed (shown On Right). Click Install Needed Updates Now to install the Remote Control components. o (If an update to any of the FreeMyIT components is necessary you will need to click Install Needed Updates Now, then refresh (File->Refresh), and click Install Needed Updates Now a second time to install the Remote Control components). Finally set a password for the remote control for this machine. Troubleshooting 1. Ensure that Windows Firewall (or other firewall or anti-virus) is not blocking any of the ProactiveWatch or FreeMyIT components, including Reflector and Reflector-Client. 2. Connection Closed dialog box. The integrated VNC is not very friendly in terms of error reporting. If the password is invalid, you will get the Connection Closed pop-up box. You will also get the same Connection Lost pop up box if the connection is actually lost. You may also see the Socket error message, which also indicates an incorrect password or connection problem. Try again with the correct password. Using Alternate Remote Control ProactiveWatch still provides the ability to launch either LogMeIn Pro (IT Reach), LogMeIn Free or your own command line (e.g. mstsc) when selecting Remote Control from the Tools or Right-Click menus. To use an alternate program use Fill Cells or the Properties dialog to set the Remote Control column as follows: Remote Control Column LMI Action Runs LogMeIn Pro (assuming it is installed on the machine and the Network Console was activated/running) v RapidFire Tools, Inc. All Rights Reserved 64

65 lmi <cmd line> <blank column> Initiates a remote control session for LogMeIn Free. Note that you should already be logged into LogMeIn s Central website. You can also use this option to launch Pro without having the Network Console licensed/running. Other command line, such as MSTSC (without the angle brackets). If the column is blank, it will run the ProactiveWatch Remote Control. To configure a different remote control method other than LogMeIn: 1. Use SettingsManage Columns to add the Remote Control column to the grid view of your Explorer as shown below (this is not essential, but it lets you see what you are doing). 2. Highlight the row containing the server that you would like to set up your own remote control session to. 3. Right-click and select Properties 4. Find the remote control field and put the launch string for your remote control method into the blank field for remote control. 5. Note you can use the data in any column as input to your remote control launch string. In the example below, Microsoft Terminal Services (MSTSC) is used being launched to the IP address of the ProactiveWatch Gateway for that site. Since Gateway IP is an Explorer field, you can put it into the remote control launch string bracketed by $ (mstsc /v:$gateway IP$). You can also create custom fields and put custom data in those fields if you like. 6. Once you get a general remote control launch string that will work for more than one computer, go back to properties and copy the string into the clipboard. Then select the rows that you would like to apply this string to, right click, select Fill Cells, choose Remote Control as the field to fill, and then paste your string into the data field. v RapidFire Tools, Inc. All Rights Reserved 65

66 X. Updating Agents and Gateways to Future Versions Your subscription to ProactiveWatch includes automatic access and upgrades to all future hot fixes, patches, updates, and major versions. ProactiveWatch also includes an incredibly easy process to distribute these new versions of the product to your internal and customer systems. In the cases where future versions include updates to the Gateway or the Agent components, you use the SettingsManage Updates feature of the Explorer to distribute and install the new versions. Manage Updates allows you to control which servers and workstations get updated, and you have this control on a per customer or per server/workstation basis. To use Manage Updates, take the steps below: 1. Go to SettingsManage Updates. 2. The Express tab will tell you how many of each type of agent and gateway components need to be updated. 3. If you would like to update all of your workstations and servers at one time, hit the Schedule All Updates button. 4. If you would like individual control over which customers and serves to upgrade, select the Advanced Tab. This will bring up the dialog to the right. 5. You can choose to only display the computers at one customer site in the Customer pull down. 6. The Status pull down allows you to display All Computer, Computers for which an Update is Available, and Computers for which the Update has been scheduled. 7. To update a set of computers, multi-select them in the table and then hit the Schedule Updates button. v RapidFire Tools, Inc. All Rights Reserved 66

67 8. If you like to track the progress of the update, go to SettingsManage Columns and add Agent Version as a column in the Grid View. This will give you a real time display of the progress of the updates as you will see the version numbers of the components change as they are updated. v RapidFire Tools, Inc. All Rights Reserved 67

68 XI.Autotask Integration ProactiveWatch can easily be seamlessly integrated with Autotask. In order to integrate the two products, configuration must be done on both ends. Autotask must be set up to recognize ProactiveWatch, and viceversa. Configuring Autotask You must first enable third party integration with your AutoTask site by navigating to the Admin/Setup screen and expanding the navigation tree to display the AutotaskExtend, Tools, Add Ticket Service node. v RapidFire Tools, Inc. All Rights Reserved 68

69 Click on the Add Ticket Service node. You will then be shown a configuration dialog box similar to the following: Copy your Service Provider ID and Service Provider Password to a temporary file or the clipboard where you will be able to access it when configuring the ProactiveWatch Explorer. After storing the id and password, set the default values for tickets created by ProactiveWatch. These are the values that new tickets created by ProactiveWatch will contain. In order to verify that your installation is working correctly, click on the Notification tab and add entries for both the Successful Ticket Creation and Unsuccessful Ticket Creation portions of the notification tab. This will allow you to see if there are errors or if the ticket from ProactiveWatch was processed successfully. Press the Save and Close button at the top of the dialog box. v RapidFire Tools, Inc. All Rights Reserved 69

70 Configuring ProactiveWatch There are several options that need configuring within the ProactiveWatch Explorer in order to integrate with Autotask. Open the ProactiveWatch Explorer and go to SettingsOptionsAutotask. A dialog box will be presented and you should select the Autotask tab. Copy the Service Provider ID and Service Provider Password that you recorded from the Autotask site and input them into the Service Provider ID and Service Provider Password textboxes, respectively. Next, you must map your ProactiveWatch customers to your Autotask customers. To do so, add a row in the ProactiveWatch to Autotask Customer Mapping grid for each customer. Within each row, specify a ProactiveWatch Customer Id, the corresponding Autotask Customer ID and the corresponding Autotask Contact . The Autotask Customer ID should be the Account ID of your customer within Autotask. If no match can be found for the Autotask Customer ID, Autotask will attempt to match to an address specified by the Autotask Contact field. If no match can be found there, then the notification will fail. v RapidFire Tools, Inc. All Rights Reserved 70

71 The last step in the integration of ProactiveWatch and Autotask, is to configure ProactiveWatch alerts that use the Autotask compatible format. Go to SettingsNotification Rules in the ProactiveWatch Explorer. Pull down the Rules dialog, and select Add Rule In the Format pull-down, select Autotask as the desired format for the Notification Rule you are creating. When you select Autotaks as the Format, and To field becomes grayed out since sendmail is not used to send s from ProactiveWatch to Autotask (a dedicated web service is). Now choose the ProactiveWatch alarms that you would like to have be a part of this new Notification Rule by moving them to Selected column on the right. When these alarms occur, notification of them will be automatically passed to Autotask. You can also create customer specific rules for notifications that get passed to Autotaks by using the Filter pull downs. v RapidFire Tools, Inc. All Rights Reserved 71

72 XII. The ProactiveWatch Mobile Web Console In addition to the full.net Console that is used to control all aspects of ProactiveWatch, a web console that is specifically formatted for mobile devices is also available. To access the mobile web console for your account go to: This will take you to the web page below, where you can log onto the web console with your VAR ID, your Explorer Logon ID, and your Explorer password. If you have sold a customer console to one of your customers, they can also log on to this console with the Explorer credentials that you provided them. The mobile web console is a great way to stay in touch with the systems at your customer sites while you and your consultants are travelling. v RapidFire Tools, Inc. All Rights Reserved 72

ProactiveWatch System Administrators Guide

ProactiveWatch System Administrators Guide ProactiveWatch System Administrators Guide 2012 ProactiveWatch, Inc. All Rights Reserved. V120323 Table of Contents Table of Contents 1 I. ProactiveWatch Technical Architecture 1 II. Installing ProactiveWatch

More information

What s new in ProactiveWatch 2.1!

What s new in ProactiveWatch 2.1! What s new in ProactiveWatch 2.1! 1. ProactiveWatch 2.1 brings tighter integration with the RemoteCommand (FreeMyIT) system, providing new Task Manager -like features available from Manage Computers, including

More information

ProactiveWatch Monitoring For the Rest of Us

ProactiveWatch Monitoring For the Rest of Us Citrix Server Monitoring Without the Hassles and Cost ProactiveWatch Monitoring For the Rest of Us Written by: Douglas. Brown, MVP, CTP President & Chief Technology Officer DBCC, Inc. www.dabcc.com Page

More information

Rapid Assessment Key User Manual

Rapid Assessment Key User Manual Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

ProactiveWatch 2.0 Patch Management and Reporting

ProactiveWatch 2.0 Patch Management and Reporting ProactiveWatch 2.0 Patch Management and Reporting V090908 2009 ProactiveWatch, Inc. All Rights Reserved. Purpose of this Guide... 1 II. Patching View... 1 Main Patching Screen... 2 Filtering by Patch Attribute...

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Remote Control 5.4 Setup Guide

Remote Control 5.4 Setup Guide Remote Control 5.4 Setup Guide A remote control solution designed for Network Administrators Copyright 2014, IntelliAdmin, LLC Revision 5/15/2014 http://www.intelliadmin.com Page 1 Table of Contents Quick

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Citrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4

Citrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4 Citrix EdgeSight User s Guide Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

Resolving H202 Errors (INTERNAL)

Resolving H202 Errors (INTERNAL) Resolving H202 Errors (INTERNAL) Contents Scope and audience.......3 General H202 Error Information...... 3 System Recommendations....4 QuickBooks Multi User Mode - QuickBooks Over a Network......4 QuickBooks

More information

Installation Guide: Delta Module Manager Launcher

Installation Guide: Delta Module Manager Launcher Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Scheduling Software User s Guide

Scheduling Software User s Guide Scheduling Software User s Guide Revision 1.12 Copyright notice VisualTime is a trademark of Visualtime Corporation. Microsoft Outlook, Active Directory, SQL Server and Exchange are trademarks of Microsoft

More information

WhatsUp Event Alarm v10.x Listener Console User Guide

WhatsUp Event Alarm v10.x Listener Console User Guide WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Mercy s Remote Access Instructions

Mercy s Remote Access Instructions Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher OPERATION MANUAL MV-410RGB Layout Editor Version 2.1- higher Table of Contents 1. Setup... 1 1-1. Overview... 1 1-2. System Requirements... 1 1-3. Operation Flow... 1 1-4. Installing MV-410RGB Layout

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.1 Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.1 January 17, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

This document is intended to make you familiar with the ServersCheck Monitoring Appliance ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Help System. Table of Contents

Help System. Table of Contents Help System Table of Contents 1 INTRODUCTION 1.1 Features 2 GETTING STARTED! 2.1 Installation 2.2 Registration 2.3 Updates 3 VIEWING RECORDED DATA 3.1 Snapshots 3.2 Programs 3.3 Websites 3.4 Keystrokes

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

orrelog Ping Monitor Adapter Software Users Manual

orrelog Ping Monitor Adapter Software Users Manual orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

User Manual. IP Camera Recorder. www.allthings.com.au

User Manual. IP Camera Recorder. www.allthings.com.au User Manual IP Camera Recorder I. Preface IP Camera Recorder is a 36 Channel Camera recording software which supports IP Camera, and Camera Server. Users use this software to monitor real-time Camera,

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

User Guide. version 1.0

User Guide. version 1.0 User Guide version 1.0 December 16, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Kaseya 2. User Guide. for VSA 6.3

Kaseya 2. User Guide. for VSA 6.3 Kaseya 2 Remote Control User Guide for VSA 6.3 May 10, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Chapter 3 Application Monitors

Chapter 3 Application Monitors Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer

More information

VMware vcenter Operations Manager Administration Guide

VMware vcenter Operations Manager Administration Guide VMware vcenter Operations Manager Administration Guide Custom User Interface vcenter Operations Manager 5.6 This document supports the version of each product listed and supports all subsequent versions

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

ERserver. iseries. Work management

ERserver. iseries. Work management ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

CHAPTER. Monitoring and Diagnosing

CHAPTER. Monitoring and Diagnosing CHAPTER 20. This chapter provides details about using the Diagnostics & Monitoring system available through ShoreTel Director. It contains the following information: Overview... 661 Architecture... 661

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Monitoring Configuration User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Remote Support. User Guide 7.23

Remote Support. User Guide 7.23 Remote Support User Guide 7.23 Copyright 1997 2011 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks or registered trademarks

More information

Quick-Start Guide. Remote Surveillance & Playback SUPER DVR MONITORING SOFTWARE. For use on Q-See s QSDT series of PC Securitiy Surveillance Cards

Quick-Start Guide. Remote Surveillance & Playback SUPER DVR MONITORING SOFTWARE. For use on Q-See s QSDT series of PC Securitiy Surveillance Cards Quick-Start Guide SUPER DVR MONITORING SOFTWARE Remote Surveillance & Playback For use on Q-See s QSDT series of PC Securitiy Surveillance Cards 2 CONFIGURING ROUTER FOR REMOTE ACCESS REMOTE SURVEILLANCE

More information

WebEx. Remote Support. User s Guide

WebEx. Remote Support. User s Guide WebEx Remote Support User s Guide Version 6.5 Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior notice. The reader should

More information

SyAM Software Management Utilities. Creating Templates

SyAM Software Management Utilities. Creating Templates SyAM Software Management Utilities Creating Templates Step 1: Setting Up Folder Paths The Management Utilities utilize a server share to perform centralized network deployment of applications and patches.

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

CamGuard Security System CamGuard Security System Manual

CamGuard Security System CamGuard Security System Manual CamGuard Security System Manual JMC Electron Co.,LTD Brief Introduction... 3 Features... 3 System Requirements... 3 Configuration... 4 Add Camera... 4 Device Options... 4 About Alarm... 5 Alarm Actions...

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

iview (v2.0) Administrator Guide Version 1.0

iview (v2.0) Administrator Guide Version 1.0 iview (v2.0) Administrator Guide Version 1.0 Updated 5/2/2008 Overview This administrator guide describes the processes and procedures for setting up, configuring, running and administering the iview Operator

More information

WhatsUp Event Alarm v10x Quick Setup Guide

WhatsUp Event Alarm v10x Quick Setup Guide WhatsUp Event Alarm v10x Quick Setup Guide Contents CHAPTER 1 WhatsUp Event Alarm Quick Setup Guide Microsoft Vista/Server 2008/Windows 7 Requirements/Recommendations... 3 Before You Begin... 7 Installation

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

User Manual. 3CX VOIP client / Soft phone Version 6.0

User Manual. 3CX VOIP client / Soft phone Version 6.0 User Manual 3CX VOIP client / Soft phone Version 6.0 Copyright 2006-2008, 3CX ltd. http:// E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data

More information

VPOP3 Your email post office Getting Started Guide

VPOP3 Your email post office Getting Started Guide VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information