2 About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes, from small corporate LANs to large enterprises or highly distributed environments. You can install and configure Foglight NMS in minutes, which will then automatically start discovering system resources and their metrics, including hardware, operating systems, virtualization, databases, middleware, applications and services. Key features of the product include: Monitoring applications where you can view the performance of an application and identify issues which may help you prevent an application from failing. Dashboards that you can manage and customize to display information about your sites' networks, such CPU load, memory, disk space utilization, network interface traffic, network latency, and packet loss. Analyzing network traffic to identify patterns and usage, which will allow you to determine how traffic impacts the overall health of a network through real-time packet capture. Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices. Creating alerts and notifications that automatically notify you when there is a network performance issue, allowing you to resolve it before it impacts your sites' networks. Creating custom SNMP monitors to provide complete SNMP (Simple Network Management Protocol) coverage on any network by defining a SNMP OID to monitor a SNMP device regardless of the manufacturer or type of device.
3 What's New in Foglight NMS Version 6.0 These features are new to Foglight NMS in this release. Global Policies A policy defines how you work with the information collected from your devices. Global Policies work very similar to local policies with a few exceptions. With global policies you can: view all policies across a site and change any setting on an individual device without applying that change to all the devices in the policy. For more information on the new Global Policies feature, see Overview of Global Policies. Creating Custom Reports Any data that PacketTrap collects from the devices in the network can be shown in a report. Using the custom reports feature, you can determine what type of data to show and how to organize it in the report. After you create a custom report, you can generate it, schedule it, send a PDF or HTML version of the report by , and export it from Foglight NMS to any location. For more information on the new Custom Reports feature, see Creating Custom Reports.
4 Finding Information Topics in this section Viewing Online Documentation Contacting Support
5 Viewing Online Documentation There are a variety of documents available online to help you get the most out of your Foglight products, as well as an online version of this help. You can view the following Foglight NMS documents online: Foglight NMS Integration User's Guide. Go to to view this guide. API User's Guide Go to to view this guide.
6 Contacting Support Support for Foglight NMS is available to sites who have a trial version of Foglight NMS or who have purchased Foglight NMS. Visit the Foglight NMS support site at From the Support page, click the Case Management link. You must create an account or sign in to your account to enter a support case. From the Support page, you can retrieve solutions from the online Knowledgebase or contact a technical support representative for more information. You can also contact support in the following ways: In the Foglight NMS Studio: Click Technical Support in the Help drop-down menu. Phone: (949) , press option 1 or (800) When you send an to the Support team, it is recommended that you include "Foglight Network Management System" in the subject line along with a brief description of the issue or question. You should include as many details as possible about the issue, including your contact information, and any other relevant details in the body of the . Quest Support will create a support ticket and you will receive an about your case. If you are updating a support case or ticket, you should include the following string in the subject line of your "CaseID:8xxxx" where "8xxxx" is your case number that you wish to update. Keep in mind the string is case sensitive (capital C, I, and D) and there are no spaces. If you follow the syntax protocol, the case will be updated and the support representative will receive an with your update.
7 Setting Up Your Product Topics in this section How to Set Up Foglight NMS System Requirements Adding sites Adding Groups Enabling Devices for Monitoring Running Network Discovery
8 How to Set Up Foglight NMS There are a couple of factors that you must keep in mind when setting up your product: It is recommended that you assign a public DNS to your product platform server instead of using an IP address. Make sure you open the correct outbound and inbound firewall ports. For more information, click here. The following diagram shows how your product monitors and collects data from your devices and sends it to your product platform server.
9 See Also System Requirements Enabling Devices for Monitoring
10 System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the minimum system requirements. Topics in this section Things to Consider Before You Install Foglight NMS Host Server Hardware and Software System Requirements Device and Collection Agent System Requirements Foglight NMS Studio System Requirements SQL Server System Requirements Installing Foglight NMS on a Virtual Machine
11 Things to Consider Before You Install Foglight NMS When you apply Smart Policy assignments to install Foglight NMS with the default monitor settings, this basic type of installation will perform well on a Dual-Core system with 4 GB of RAM. If you adjust the policies to monitor larger networks or use the Network Traffic Flow module, you need to consider which hardware and system configuration you plan to use. As shown in the tables in the following sections, the minimum system requirements are dependent upon the number of devices that you are monitoring. You must consider the following scalability issues before installing Foglight NMS: Number of monitored devices: If you monitor 500 or more devices, you may need to do some performance tuning on your system. Amount of data collected for each device: If you increase the number of monitors on a device, a spike in the amount of data collected will occur. Changing the default time intervals: If you set a time interval to collect data every five minutes, using a high performance server is recommended to complete the data collection in an efficient and timely manner. Number of Studio connections: A large number of Studio connections simultaneously accessing the system will impact performance. To optimize performance when collecting traffic analysis data, it is recommended that you use a dedicated high performance server when the following conditions exist: You configure the application to collect Traffic Flow data from multiple routers or switches. There exists a large amount of traffic conversations. You set up the application to monitor more than 500 devices.
12 Host Server Hardware and Software System Requirements See the following table for the minimum hardware and software system requirements for your host server. When you download a trial version of Foglight NMS, the application comes with an optimized version of SQL CE installed. This optimized version of SQL CE works when you are trying out Foglight NMS or loading device count installations. However; in your production environment, you must install SQL server Standard or Enterprise Edition. NOTE: The following minimum requirements apply when you install the default configuration. Significantly increasing the device monitoring intervals and network traffic collection may cause an additional load on the server, which may require you to increase your RAM and upgrade your CPU power. Host Server System Requirements Operating System For 32-bit or 64-bit: Microsoft Windows 2003 SP2 or later Microsoft Windows 2008 Server CPU Memory Hard Drive Space.Net Framework Firewall Exceptions - Allowed Programs Dual Core, 3.0 GHz or higher (Recommended) 4 GB RAM NOTE: You will need to increase the amount of memory based on the high-volume data that you are collecting, such as netflow, syslog, and windows event logs. 50 GB NOTE: You will need a minimum of 3 GB of free space to install the SNMP MIB Library. NOTE: You will need to increase your hard drive space based on the retention settings. 2.0 or higher Version 3.5..NET Framework 3.5 SP1 (Recommended) The following are automatically configured during installation:
13 Host Server System Requirements ptserverservice ptserverconfig ptagentservice ptagentconfig ptstudio Ports The following are the firewall rules for inbound connections: 5053 (TCP) = (128 AES Encrypted Host Server port) 5054 (TCP) = Agent deployment CAB file downloads 5055 (TCP) = (Encrypted Remote Control Tunnel port) 61 (UDP) SNMP Trap collector 69 (UDP) - TFTP Server 514 (UDP) - Syslog collector 2055 (UDP) NetFlow collector 6343 (UDP) sflow collector 9555 (UDP) - NetFlow Alternative port #2 collector 9995 (UDP) NetFlow Alternative port #3 collector
14 Device and Collection Agent System Requirements See the following table for the minimum hardware and software system requirements for your host server in order to deploy device and collection agents on it. NOTE: When you install a collection agent on Microsoft Windows XP or Microsoft Vista, the limited TCP connections available with these operating systems may impact the monitoring performance. It is recommended that you use Windows Server 2003 or Windows Server 2008 when possible. System Requirements for Device and Collection Agents Operating System For 32-bit or 64-bit: Windows Server 2003 SP2 or later Windows Server 2008 Windows XP SP2 or later Windows Vista SP1 (all versions) Microsoft Windows 7 Ubuntu Server 8 Fedora release 10 Debian 4.0 OpenSuse 11.0 Apple Mac OS X NOTE: Windows Server 2003 or Windows Server 2008 is required if you are collecting Syslog, NetFlow, ad SNMP Traps data..net Framework Ports 2.0 or higher Version 3.5..NET Framework 3.5 SP1 (Recommended) The following are the firewall rules for Outbound connections: 5053 (TCP) = (128 AES Encrypted Host Server port) 5054 (TCP) = Agent deployment CAB file downloads
15 System Requirements for Device and Collection Agents 5055 (TCP) = (Encrypted Remote Control Tunnel port)
16 Foglight NMS Studio System Requirements You can use the following operating systems and browsers to run the web version of the Foglight NMS Studio. Microsoft Windows (all versions) Microsoft Internet Explorer 6 or later Mozilla Firefox 3.6 Google Chrome
17 SQL Server System Requirements See the following table for the minimum SQL Server system requirements. When you download a trial version of Foglight NMS, the application comes with an optimized version of SQL CE installed. This optimized version of SQL CE works when you are trying out Foglight NMS or loading device count installations. However; in your production environment, you must install SQL server Standard or Enterprise Edition. System Requirements for SQL Server Database For 32-bit or 64-bit: Microsoft SQL Server 2005 Standard or Enterprise Editions Windows Server 2008 Standard or Enterprise CPU Memory Dual Core, 3.0 GHz or higher (Recommended) 4 GB RAM NOTE: You will need to increase the amount of memory based on the high-volume data that you are collecting, such as Net- Flow, syslog, and windows event logs. Hard Drive Space Additional Hardware Requirements for SQL Server If you choose to run SQL Server on a separate machine from your Foglight NMS server, the following requirements apply: You must install SQL server on a physical machine. You must have a minimum of 32 GB of RAM. You must use SQL authentication instead of windows authentication.
18 If your machine is collecting traffic and log data, the following minimum system requirements apply: Additional Requirements Operating System Perspective Agent Service Perspective Service Additional RAM per Netflow Device(s) Additional RAM per Netflow Device(s) 2 GB 1 GB 1 GB NoOfFlowDevices * 300MB 1 GB
19 Installing Foglight NMS on a Virtual Machine Because of intense I/O requirements and a high threshold of additional hardware specifications, installing Foglight NMS on a virtual machine in a production environment is not recommend. You should install Foglight NMS in a testing environment to ensure that you and your colleagues and sites have the best user experience possible. The following items are the minimum hardware and software system requirements when installing Foglight NMS on a virtual machine (VM). Operating System: For 64-bit, both Windows Server 2008 or Windows Server 2008 R2 are recommended; however, you can use Windows 7. CPU: Two physical cores dedicated to perspective VM (no hyper-threading core). Memory: 4 GB RAM. NOTE: If you install SQL server, you must include an additional 4 GB RAM. You must provide a minimum of 100Mbs of bandwidth dedicated. You must make sure that your VM is using a physical partition rather than a virtual harddisk.
20 Adding Sites When you have new sites, you can create profiles for them in PacketTrap and then run network discovery to discover the devices in their networks. To create a new site 1. In the Foglight NMS Studio, click New -> site. 2. In the Editor dialog box, type a name and description for the site. This information will appear in the Devices View. 3. Type the host name of the remote site. It is recommended that you use the DNS name of your host; however, you can use the IP address. 4. Click Save. 5. Click Copy URL to download the agent software or click URL to send the link to the machine where you want to install the PacketTrap agent on the remote site. NOTE: Every remote site needs an agent deployed to it. You will be prompted to select a polling agent or to manually install one. A polling agent is the agent the connects back to your platform server. For more information, see Installing Agents Manually. To add devices to your new site 1. In the Devices View, select the new site in the site drop-down list. 2. Click Add New Devices. 3. Go through the screens of the Network Discovery wizard to discover the devices on your site's network. For more information, see Running Network Discovery. See Also Adding Devices by SNMP Adding Devices by Deploying Agent
21 Adding Groups You can create multiple groups to organize the various types of devices in a network. For example, you can group similar devices together, such as adding all the desktops in a network to a group called "Desktop". To add a new group 1. In the Foglight NMS Studio, New -> Group. 2. In the Add a New Group dialog box, type a name for the group. 3. In the Edit Group dialog box, click Add Device Member to start adding devices to the group. 4. In the Select New Device Members, select one or more devices and then click Add. 5. Click Add to finalize your selection and add the devices to the group. 6. Click Save to save your changes. To edit a group
22 1. In the tree view, right-click a group and click Edit. 2. (Optional) Type a new name in the Name field. 3. Click Add to add more devices to the group OR Select one or more devices and click Remove to remove the devices from the group. 4. Click Save to save your changes. To remove a group 1. In the tree view, right-click a group and click Remove. 2. When the message appears, click Yes.
23 Enabling Devices for Monitoring Before Foglight NMS can begin monitoring and collecting data from the devices in a network, you must enable SNMP or WMI. You will need to enable the correct protocol depending on the type of data you are collecting. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on IP networks. SNMP allows you to collect data from all types of devices, such as desktops, servers, routers, and switches, across any operating system. When you enable SNMP on a device and provide the correct credentials, Foglight NMS can monitor that device and collect data from it. For more information on how you can enable SNMP, see Enabling SNMP on a Device. Windows Management Instrumentation (WMI) Windows Management Instrumentation (WMI) is a programming interface (API) in the Windows operating system that enables devices and systems in a network, typically enterprise networks, to be configured and managed. WMI is based on Web-Based Enterprise Management (WBEM), which stores all definitions in a Common Information Model (CIM) database. WMI allows network administrators to query and set information on workstations, applications and networks, and can also be used to access the Active Directory. Enabling WMI allows Foglight NMS to collect the following specific data from Windows-based devices: Microsoft Exchange SQL Active Directory Windows event logs Windows services Hardware Inventory For more information on how you can enable WMI, see Enabling WMI on Windows Devices.
24 See Also Enabling SNMP on a Device Enabling WMI on Windows Devices Monitoring Your Devices by SNMP Monitoring Your Devices by WMI
25 Enabling SNMP on a Device When you enable SNMP on a device and provide the correct credentials, Foglight NMS begin to monitor that device and collect data from it. Use the SNMP Enablement tool to enable SNMP on the devices in a network. 1. In the PacketTrap Studio, select one or more devices in the Devices View. You can add more devices to your list by clicking Select Targets. 2. Right-click and then click Tools -> Enable SNMP. 3. In the Enable SNMP Wizard, click Next. Foglight NMS begins to determine if the devices are available for SNMP Enablement and will display the results. 4. Click Next. 5. Select the SNMP credential that you want to assign to the devices. Click the Manage Credential link to add new credentials to the Encrypted Credential Store. 6. Click Next. NOTE: If necessary, you can modify the preferred credential assigned to each device by selecting it and then clicking Set Preferred. 7. Click Next. SNMP is now enabled on the devices. 8. Click Finish to complete the process. See Also Monitoring Your Devices by SNMP Enabling Devices for Monitoring
26 Enabling WMI on Windows Devices For Windows-based machines running Windows XP or Vista, by default Microsoft installs and configures WMI. Before you can start monitoring your devices by WMI, you must make sure that the following services are running: Windows Management Instrumentation Windows Management Instrumentation Driver Extensions To enable WMI 1. Go to the Control Panel and double click Administrative Tools. 2. In the Administrative Tools dialog, double-click Computer Management. 3. Expand Services and Applications, right-click WMI Control and follow the Windows menus. For more information on troubleshooting WMI related-issues on Windows XP, click here. For more information on connecting to WMI remotely on Windows Vista, click here. See Also Monitoring Your Devices by WMI Enabling Your Devices for Monitoring
27 Running Network Discovery Network Discovery scans the entire network, and then populates your database with the devices that you want to monitor and manage with Foglight NMS. Using various discovery techniques, such as ping and MAC resolution, network discovery provides a complete set of attributes for all devices. Using the data profile created for devices during discovery, Foglight NMS automatically assigns them to different policies, known as Smart Policies, that are comprised of monitors that best fit what kind of data you want to collect from the devices. The Network Discovery Wizard appears shortly after you install Foglight NMS and open it for the first time. However, if you need to add more devices to your database, you can run network discovery again. To run network discovery from the Studio 1. In the Foglight NMS Studio, click Add Devices. 2. In the Add Devices Wizard, select the method by which you want to add devices:.. See Adding Devices By SNMP for more information See Adding Devices by Deploying Agents for more information 3. Go through the remaining screens of the wizard to complete the process and click Finish. Things to Consider Before You Run Network Discovery Although network discovery detects a device in the network, the data profile that it creates for the device may not be complete because of several factors. It is recommended that you consider the following before you run network discovery: Enable SNMP or WMI on your devices in order to monitor and collect data from it. You do not need to enable SNMP on devices where an agent is deployed; however, if the agent is monitoring and collecting data from other devices, such as routers and switches, you will need to enable SNMP on those devices. NOTE: Enabling WMI allows you to monitor and collect data for Microsoft Exchange, SQL, Active Directory, Windows Event Logs, Windows Services, and Hardware Inventory data types only.
28 Make sure you have the correct credentials. When you run network discovery, you can only enter one credential at a time for each level of security. So you may have to run network discovery more than once to properly discover all devices in the network. You can also set the credentials for a device at a later time using the Set Credential link in the Devices View. If you do not have the correct credentials assigned to a device in Foglight NMS, Foglight NMS will not be able to monitor and collect data from that device. See Also Adding Devices by SNMP Adding Devices by Deploying Agents Managing Credentials Enabling SNMP on a Device Enabling WMI on Windows Devices
29 Adding Devices by SNMP Foglight NMS can use SNMP to discover devices in a network and then provide a complete set of attributes for each discovered device. This type of network discovery will gather technical data including hardware, software, and processes for each device, and then identify devices by responding status, protocols, type, and operating system. When you add a device by SNMP, it requires that you provide the SNMP credentials for the devices and you must make sure that you have the correct port open so that the target machine can accept SNMP packets from that device. 1. In the Foglight NMS Studio, click Add New Devices. 2. In the Add Devices Wizard, select Add Devices Via SNMP Network Discovery. 3. Click Next. 4. In the Enter Targets field, type any one of the following: CIDR, DNS, IP/Subnet Mask or range of IP Addresses. 5. In the Select Network Discovery Techniques section, deselect any of the check-boxes that do not apply to your discovery. For more information on these techniques and configuring the advanced ping settings, see Network Discovery Techniques. 6. In the Choose Device Credentials section, select a credential for each level of security that you want to use to discover each device. For more information on credentials, see Setting Device Credentials for Network Discovery. 7. Click Next to start the discovery process. 8. On page 2 of the Network Discovery Wizard, select the devices on which you want to do a complete discovery. You can use the options in the drop-down list to filter the devices shown on this screen. 9. Click Next. 10. On page 3 of the Network Discovery Wizard, select how you want to assign your devices to a policy. For more information about the Policy Assignment Options, see Applying Smart Policies to Devices. 11. Click Finish to complete the Network Discovery process.
30 See Also Running Network Discovery Network Discovery Techniques Setting Device Credentials for Network Discovery Applying Smart Policies to Devices
31 Network Discovery Techniques Foglight NMS provides 3 different techniques to help you discover the devices in a network. They are: Exclude Existing Devices in Database Use this technique if you have previously run network discovery. It does not include devices that are currently in the database in you new search, which allows Foglight NMS to scan a network faster. Ping Use this technique to send an ICMP command to a device. If the ping monitor is working as expected, a device will respond to the request. There are advanced ping settings that you can configure from the Network Discovery Wizard, which is explained further in the following section. MAC Resolution Foglight NMS uses the MAC Address to uniquely identify and profile a device in the network. Configuring Advanced Ping Settings Foglight NMS provides a way to configure the ping settings so that you can turn a resolution on to display or turn it off from displaying. Click the Advanced Settings link in the Select Network Discovery Techniques section to modify the following settings:
32 Ping Timeout (ms) Maximum amount of time in milliseconds that a ping waits for a response from the target IP address. If the target does not respond within the number of milliseconds set, ping assumes it is not working as expected. Ping Packet TTL (Time-To-Live) Number of hops along the way to the specified address. If you assign a value of 32 to this setting, your ping scan may pass through up to 32 different routers on the way to the remote address before the network throws it away. Pings Per Node You can control the number of ping attempts to send to each address during a scan. When a network containing a Cisco router is scanned, you should set this number to a number greater than 2. If the target IP address is not in the ARP cache of a Cisco router, the router discards the ICMP query while it requests the MAC address of the target IP. The first ping will never arrive at the subnet of the target IP address; however, the Cisco router will respond to the second ping. Delay Between Pings Time in milliseconds between each successive ping to the target address. If you assign a low value to this setting a constant stream of pings is sent to the target IP address. See Also Running Network Discovery Adding Devices by SNMP
33 Setting Device Credentials for Network Discovery When you run network discovery, selecting the correct credentials is essential in order for Foglight NMS to access the devices in a network. When a device is discovered during a scan of the network, Foglight NMS will add it to the database. However, if you incorrectly set the credentials for that device (in the product), Foglight NMS cannot monitor and collect data from it. In the Network Discovery Wizard, choose the correct credential for the devices in the network. Foglight NMS allows you to select a credential for the following protocols: SNMP Version 1 Credential SNMP Version 2 Credential SNMP Version 3 Credential WMI Credential From the Network Discovery Wizard, you can add new credentials to the Encrypted Credential Store by clicking the Managing Credentials link. For more information about credentials, see Managing Your Credentials. See Also Adding Devices by SNMP
34 Adding Devices by Deploying Agents The Deploy Agent Wizard allows you to select one or more devices where you can deploy a local or remote agent. Agents can only be deployed to Windows-based machines running Windows XP, Windows Vista, or Windows Server AS you work through the different screens of the wizard, you will select the device where you want to install the agent, determine if SNMP in enabled on the device, learn the status of that device (if it will support an agent deployed on it), set and manage the device's credentials, set the telnet/ssh credentials in order to connect to the device. For more information about the minimum system requirements the agent device needs to meet, such as which ports you need to open, see Device and Collection Agent System Requirements. 1. In the Foglight NMS Studio, click Add Devices. 2. In the Add Devices Wizard, select Add Devices By Deploying Agents and click Next. 3. In the Deploy Agent Wizard, type a CIDR, DNS, IP/SubnetMask or range of IP addresses in the Enter Targets field. 4. Click Next. NOTE: This process may take a few moments to complete. 5. In the Connectivity Results screen, select a device in the list.note: Check the Status column for information about the devices that were discovered. If the returned results have a "Fail" status, you may not be able to select that device. 6. Click Next. 7. Select a preferred credential and type a username and password. You can create a new credential by selecting (new credential) in the drop-down list. 8. Click Next. 9. In the Set Telnet/SSH Credential screen, select the device on which you are installing an agent and click Set Preferred. 10. Click Next. 11. In the Results screen the Results screen will notify you if the Telnet/SSH credential for the device is valid.
35 12. Select a device with the correct WMI credential so that you can monitor and collect specific Windows-based data. For more information, see Monitoring Your Devices by WMI. 13. NOTE: Use the Manage Credential link on this screen to edit your existing credentials or to create a new credential. For more information, see Managing Your Credentials. 14. Click Next. The agent will now be deployed to the device. You can view the log in the agent deployment status. 15. Click Finish. See Also Monitoring Your Devices by Deploying Agents Benefits of Deploying an Agent
36 Benefits of Deploying an Agent You will experience the following benefits when you deploy an agent on a machine: An agent captures and monitors all data from a machine eliminating the need to enable SNMP or WMI on a device. You can use the Patch Management feature. You can remotely gain access to a machine using Expert Assist. Increase a machine's performance by decreasing the amount of traffic between devices. Increase the quality of monitored data by missing fewer monitoring intervals than a SNMP connection. Gives you remote access to various mobile assets, such as laptops. Increase the amount of devices that you can monitor. See Also Monitoring Your Devices by Deploying an Agent
37 Installing Agents Manually You can manually deploy an agent on any windows-based machine. When you install an agent manually, you are downloading the agent software from a known location on your Foglight NMS server. Also, you can use the URL feature to deploy an agent to all the desktops in a network. By ing the location of the agent software to each desktop owner, they can download the agent software onto their desktops. 1. In the Foglight NMS Studio, click Add Devices. 2. In the Add Devices Wizard, select Add Devices By Deploying Agents. 3. Click Next. 4. In the Deploy Agent Wizard, click Install Manually. 5. In the Manually Deploy Agent dialog, select an operating system and do one of the following: Click Copy URL to download the agent software from a known location on your Foglight NMS server. Click URL to send the location of the agent software to all the desktops in a network. 6. Click Close. See Also Adding Devices by Deploying an Agent
38 Applying Smart Policies to Devices When you run a network discovery, Foglight NMS creates an intelligent profile of a device and assigns it to a pre-configured policy called a Smart Policy. A Smart Policy is a product default policy made up of recommended monitors and data gathering time intervals appropriate to a specific type of device, such as a wireless device or desktop device. For example, Foglight NMS assigns a desktop computer to the Desktop Policy, which monitors data specific to desktops such as CPU, memory, and disk volume. Applying Smart Policies during Network Discovery will save you time by automatically assigning all the devices discovered in your site's network to a qualifying Smart Policy. You can edit Local and Global Smart Policies in the Edit Policy window; however, you cannot delete a Global Smart Policy. Smart Policies in your product include: Default Policy NOTE: A device is applied to the Default Policy when Foglight NMS cannot identify what type of device it is. For example, during network discovery, if Foglight NMS cannot identify a device's description, OID, or which services are running on it, that device is assigned to the Default Policy. In the Default Policy, all monitors are selected to cover a wide range of devices to make sure that data is monitored and collected from these devices. It is recommended that you migrate these devices from the Default Policy to the appropriate Smart Policy. Networking Policy Server Policy Desktop Policy Wap Policy VMware Host Policy Applying the Default Policy to Devices By selecting the Default Policy option in the Network Discovery Wizard, you are assigning the discovered devices to the Default Policy (only the devices that you selected on page 2 of the Network Discovery Wizard are applied to it). After the network discovery process is complete, you
39 can reassign devices in the default policy to a different smart policy or to a policy that you created. See Also Overview of Network Discovery Migrating Devices from the Default Policy
40 Updating Your Product There are two ways this software will update. One approach is manual update and the other approach is auto update. Manually Updating Your Product 1. From the Foglight NMS Studio main menu, click Administration. 2. In the Administration window, click Check For Updates. 3. Click Update Now to manually apply the software updates. The program will close and then reopen automatically. Automatically Updating Your Product Upon launching Foglight NMS, the software will check for any updates available at the patch server. The software automatically pulls the updates and stores them in cache. The updates are applied the next time the software is launched.
41 Monitoring Your Devices Topics in this section Monitoring Your Devices by SNMP Monitoring Your Devices by WMI Monitoring Your Devices by Deploying an Agent Collecting Syslog, NetFlow, and SNMP Traps Data
42 Monitoring Your Devices By SNMP Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on IP networks. SNMP allows you to collect data from all types of devices, such as desktops, servers, routers, and switches, across any operating system. When you enable SNMP on a device and provide the correct credentials, Foglight NMS can monitor that device and collect data from it. Foglight NMS uses SNMP to gather much of the device performance information from a network. If you choose to monitor your devices by SNMP you must first do the following: Enable SNMP on all the devices that you want to monitor. Assign a credential to the device in Foglight NMS. The following diagram shows how Foglight NMS uses SNMP to monitor your devices.
43 See Also Enabling SNMP on a Device
44 Monitoring Your Devices by WMI Windows Management Instrumentation (WMI) is a programming interface (API) in the Windows operating system that enables devices and systems in a network, typically enterprise networks, to be configured and managed. WMI is based on Web-Based Enterprise Management (WBEM), which stores all definitions in a Common Information Model (CIM) database. WMI allows network administrators to query and set information on workstations, applications, and networks and can also be used to access the Active Directory. Similar to SNMP, monitoring your devices by WMI allows Foglight NMS to collect the following data from Windows-based devices: Microsoft Exchange SQL Active Directory Windows event logs Windows services Hardware Inventory The following diagram shows how Foglight NMS monitors your devices by WMI.
45 See Also Enabling WMI on Windows Devices
46 Monitoring Your Devices by Deploying Agents You can choose to deploy one or more agents to your site's site for monitoring and collecting data. Agents can be deployed to all Windows, Mac, and Linux devices. Foglight NMS can only monitor devices such as routers, switches, and printers need to monitor by SNMP. A collection agent is the device responsible for monitoring and collecting data from devices that cannot host an agent, such as a router. You can only deploy a collection agents to a windows-based machine. If you deploy an agent to a Mac or Linux device it can only monitor itself and cannot monitor other devices. NOTE: You do not need to enable SNMP or WMI on an agent machine. The following diagram shows how Foglight NMS monitors your devices by deploying an agent. Note that each desktop and server in this image has an agent deployed on it.
47 See Also Benefits of Deploying an Agent Adding Devices by Deploying Agents
48 Collecting Syslog, NetFlow, and SNMP Traps Data You must log on to the device to configure it to collect syslog, NetFlow, or SNMP Traps data. When you configure the device, you must tell it to export or send the data to the IP address of the collection agent that is monitoring the device. Additionally, when you collect Syslog and SNMP Traps data from devices, you must make sure that the Syslog Listener and SNMP Traps monitors are configured for the policy or policies to which the devices are assigned. Enabling NetFlow You must enable NetFlow on your devices and configure it to export its data to the collection agent that is monitoring NetFlow. Opening Ports for NetFlow, Syslog, and SNMP Traps In order to collect, syslog, NetFlow, and SNMP Traps data, you must make sure that you open the following ports on the devices from where you are collecting this data. 514 (UDP) - Syslog collector 61 (UDP) - SNMP Trap collector 2055 (UDP) - NetFlow collector 6343 (UDP) sflow collector 9555 (UDP) - NetFlow Alternative port #2 collector 995 (UDP) NetFlow Alternative port #3 collector NOTE: You only need to open one port for NetFlow. If port 2055 is in use by another device, you can select an alternate port to open. The following diagram shows how Foglight NMS collects syslog, NetFlow and SNMP Traps data.
49 See Also Enabling NetFlow
50 Using Dashboards to Quickly Diagnose Issues Topics in this section Overview of Dashboards Touring the Dashboard View User Interface Customizing Your Dashboard Adding Dashboard Tabs About Gadgets Adding Gadgets to Your Dashboard Creating Custom Gadgets Editing Gadgets
51 Overview of Dashboards The Dashboard view is a network management dashboard that displays a high-level overview of network performance, fault management, and device availability across all of your sites' networks. It provides you with critical device information, such as CPU load, network interface traffic, latency, and other key performance indicators (KPIs), which can expose devices that are not working as expected and reveal problem areas in a network. You can continuously monitor key assets of a network to make sure that it is always running at peak performance. In the Dashboard view, you can do the following: Monitor device availability, CPU load, memory, disk space utilization, network interface traffic, network latency, and packet loss. Perform advanced monitoring of running services, process availability, and performance counters for MS Exchange, SQL, Active Directory. Make an inventory of gadgets include charts, gauges, lists, text, and web links. Compare networks between sites and organizations. Create a custom view by dragging and dropping gadgets. Restore the default dashboard settings. NOTE: When you select to restore the default settings, all the gadgets and tabs that you created will be deleted from the Dashboard view. The restored default setting includes only the Top-Ten and Alerts and Logs dashboards. Topics in this section Touring the Dashboard View User Interface Customizing Your Dashboard Adding Dashboard Tabs About Gadgets Adding Gadgets to Your Dashboard Creating Custom Gadgets Editing Gadgets
53 Touring the Dashboard View User Interface
54 The Main Elements of the Dashboard View 1 The Dashboard Menu Tab: Use the main menu tabs to navigate through the product. You can click the Dashboard tab to navigate to your dashboard from any place in the product. 2 Dashboard Menu Buttons: Use the menu buttons for the following: Adding new dashboard tabs. Adding new gadgets to a dashboard. Restoring the product defaults to your dashboard. NOTE: This action will remove all gadgets and tabs that you added from the dashboard. Refresh the data in your gadgets. 3 Dashboard Navigation Tabs: Each tab represents a unique dashboard. Click a dashboard name to navigate to that dashboard. 4 Right-Click Menu Options: Use the right-click menu options to customize the Dashboard view. 5 Divider Bar: The Divider Bar allows you to adjust the size of each column. To activate the divider bar, place your cursor in the space between the columns. Click and hold the divider bar to move the columns left or right. 6 Gadget: The information displayed in a gadget will vary from gadget to gadget. You can do the following in a gadget: View the performance and activity of one or more devices in a network. Filter the data by clicking a column header. Edit the way in which data is displayed in a gadget. Move the gadget up in the Dashboard view when you click the gadget title bar. Remove the gadget from your dashboard by clicking the Close link.
55 Customizing Your Dashboard You can customize your dashboard by doing the following: Create new dashboard tabs to organize your gadgets. For example, you can create a new dashboard that will display only gadgets that are related to call path data. Add new standard gadgets or add custom gadgets that you created. Edit or remove any of the existing tabs or gadgets. Move gadgets around in the Dashboard view using drag and drop functionality. You can also click on the gadget title bar to move it up on a dashboard. Resize the widths of columns and gadgets by moving the divider bar left or right. Every Foglight NMS user can customize his or her own dashboard to fit their needs. The dashboard that you customize will be available to view only by you. Other Foglight NMS users cannot see your customized dashboard. Dashboard Tab Right-Click Menu Options You can use the right-click menu options to manage the tabs and gadgets on each dashboard. Configure Columns Defines the number of columns on a dashboard. Existing gadgets on the dashboard are automatically resized based on the number of columns you select. Clear Gadgets Removes all gadgets from the selected dashboard. Rename Tab Changes the name of the selected dashboard tab. Close Tab Permanently removes the selected dashboard and all the gadgets contained within it. See Also Adding Gadgets to Your Dashboard Adding Dashboard Tabs
56 Creating Custom Gadgets Editing Gadgets
57 About Gadgets The Dashboard view offers a wide range of gadgets to present any data being collected about your network. Every gadget takes you through a similar and intuitive configuration wizard that allows you to easily and quickly set one up. The following table lists all the available gadgets to add and view on a dashboard. Click a gadget name for more information. Gadget Name Description Location of Gadget Active Directory Monitors the performance counters for the active directory server. Application Performance Alerts In Process Displays a detailed list of triggered alerts. Alerts and Logs Average Latency Chart Average Latency Gauge Average Latency List Average Latency Text Displays the average latency of one or more nodes by charting the ping results. Displays the average latency of a node based on response time and average packet loss. Displays the average latency of a list of one or more nodes by showing the response time and a color indicator bar. Displays the average latency of a node by changing the color of the text to green or red. Device Availability Device Availability Device Availability Device Availability Configuration Backup Displays the current device configuration file and allows you to compare it to a previous configuration file. Alerts and Logs Call Path Jitter Chart Monitors call path jitter via IP SLA on Cisco routers. VoIP Call Path Latency Chart Monitors call path latency via IP SLA on Cisco routers. VoIP Call Path MOS Chart Monitors call path MOS via IP SLA on Cisco routers. VoIP Call Path Packet Loss Chart Monitors call path packet loss via IP SLA on Cisco routers. VoIP Call Path Statistics Monitors call path statistics via IP SLA on Cisco routers. VoIP CPU Chart Monitors the CPU usage percentage of a device. Device Performance CPU Gauge Monitors the CPU usage percentage and average usage percentage of a device. Device Performance
58 Gadget Name Description Location of Gadget CPU List CPU/Memory Chart CPU/Memory Gauge CPU/Memory List Monitors the CPU usage percentage of one or more devices within a network. Monitors the CPU and memory usage percentage of a device. Monitors the CPU and memory usage percentage of a device. Monitors the CPU and memory usage percentage of one or more devices. Device Performance Device Performance Device Performance Device Performance CPU/Memory Status Monitors processor and memory usage. Device Performance Device Alerts - Active Displays the alerts triggered for any given device. Alerts and Logs Device Alerts - All Displays the alerts triggered for any given device. Quest System Info Device Notes Displays notes about any given device. Quest System Info Dial Manager Configuration Displays dial manager configuration via IP SLA on Cisco routers. VoIP Dial Manager Phone Chart Dial Manager Registration Status Displays dial manager phones via IP SLA on Cisco routers. Displays dial manager registration status via IP SLA on Cisco routers. VoIP VoIP Discovered Devices TBD Network Interface Disk Volume Chart Disk Volumes Installed Applications Monitors the disk utilization on a hard drive of a specific device Monitors the disk utilization of each drive as a percent of capacity for a device Displays installed applications via SNMP (some devices will require Telnet or SSH) Device Performance Device Performance Device Performance IP Configuration Displays the IP Configuration information for a device. Device Performance IP SLA Overview Displays dial manager registration status via IP SLA on Cisco routers. VoIP Memory Chart Monitors the memory usage percentage of a device. Device Performance
59 Gadget Name Description Location of Gadget Memory Gauge Memory List MS Exchange Network Ethernet CRC Errors Network Token Ring CRC Errors Network Interface Chart Network Interface List Network Statistics Summary Network Traffic Flow Monitors the memory usage percentage and average usage percentage of a device. Monitors the memory usage percentage of one or more devices in a network. Monitors the performance counters for the MS Exchange server. TBD TBD Monitors the network interface performance for a device. Monitors the network interface performance for a device. Displays network statistics through SNMP. Displays the NetFlow, sflow, JFlow, and ptflow traffic for a switch or a router. Device Performance Device Performance Application Performance Device Performance Device Performance Device Performance Device Performance Device Performance Network Performance Open Source Web Viewer Allows you to choose a browser-based open source network management tool or web site to display. Application Performance Quest Log Information Displays all the log files generated in a single view. Quest System Info Policy Scheduled Actions Displays all the scheduled actions in a single view. Quest System Info Running Processes Shows all the processes that are currently running on a device. OS Details SNMP Traps TBD Alerts and Logs Software Inventory Provides a list of all the applications installed on a device. OS Details SQL Server Monitors the performance counters for SQL Server. Application Performance Syslog Displays all the collected syslog messages for a specific device. Alerts and Logs
60 Gadget Name Description Location of Gadget System Information Displays detailed system information for a device. OS Details Top 10 - Average CPU Usage Top 10 - Average Memory Usage Top 10 - Average Packet Loss Monitors the CPU performance of a list of one or more nodes. Monitors the memory performance of a list of one or more nodes. Displays the average packet loss of a list of one or more nodes. Top 10 Top 10 Top 10 Top 10 - Disk Volume Usage Displays the highest average disk volume usage as a percentage of drive capacity for a list of devices. Top 10 Top 10 - Highest Average Latency Displays the highest average latency of a list of one or more nodes. Top 10 Top 10 - Network Interface Usage Displays the highest network interface usage for a list of nodes. Top 10 Top Network Traffic: Applications (for one or multiple targets) Top Network Traffic: Convs (for one target) Top Network Traffic: Domains (for one or multiple targets) Shows network traffic data, organized by application and dependent on the scope that you select when you create the gadget. Shows network traffic data, organized by conversation and dependent on the scope that you select when you create the gadget. Shows network traffic data, organized by domain and dependent on the scope that you select when you create the gadget. Top 10 Top 10 Top 10 Top Network Traffic: Endpoints (for one or multiple targets) Shows network traffic data, organized by endpoints and dependent on the scope that you select when you create the gadget. Top 10 Virtual Machines Displays VMware ESX Server virtual machines. VMware VMware Host Summary Displays a summary of VMware ESX Server host information. VMware
61 Gadget Name Description Location of Gadget VoIP Active Calls VoIP Call History VoIP Phone Status Windows Event Logs Windows Services Wireless Access Point Displays active calls through IP SLA on Cisco call manager. Displays call history through IP SLA on Cisco call manager. Displays VoIP phone status through IP SLA on Cisco call manager. Displays all event logs collected for a device, including application, security, and system event logs. Displays critical windows services information, such as status and start type. Displays information about key variables of a wireless access point, such as signal strength and quality. VoIP VoIP VoIP Alerts and Logs OS Details Wireless Performance Wireless Access Point List Displays information about all wireless access points on a network. Wireless Performance Wireless Clients Chart Wireless Clients List Shows how many wireless clients are connected to a wireless access point within a given time frame. Displays key variables for each client connected to a wireless access point. Wireless Performance Wireless Performance Wireless Traffic Chart Shows the amount of received and transmitted network traffic generated by a wireless device within a spec- Wireless Performance ified interval of time. See Also Adding Gadgets to Your Dashboard
Legal Notices Copyright 2011 All rights reserved. Under the copyright laws, this manual or the software described within, can not be copied, in whole or part, without the written consent of the manufacturer,
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
DATASHEET SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.
http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
NMS300 Network Management System Application Quick Start Guide December 2014 202-11288-04 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing
MG-SOFT Corporation Net Inspector 2015 GETTING STARTED GUIDE (Document Version: 10.6) Document published on October 16, 2015 Copyright 1995-2015 MG-SOFT Corporation Introduction In order to improve the
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya
Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
SolarWinds Toolset Quick Start Guide Copyright 1995-2007 SolarWinds.net, Inc., all rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled,
812-0055-002D XMS Quick Start Guide Overview of Quick Start Steps This guide will quickly get you up and running with the Xirrus Management System (XMS). It includes instructions for setting up the XMS
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies,
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.1 January 17, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector
Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes The
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Product Manual Administration and Configuration Manual http://www.gfi.com email@example.com The information and content in this document is provided for informational purposes only and is provided "as is" with
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 firstname.lastname@example.org www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Resolving H202 Errors (INTERNAL) Contents Scope and audience.......3 General H202 Error Information...... 3 System Recommendations....4 QuickBooks Multi User Mode - QuickBooks Over a Network......4 QuickBooks
Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Kaseya 2 Monitoring Configuration User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
Network Monitoring User Guide 2007 Belkin Corporation. All rights reserved. F1DUXXX All trade names are registered trademarks of respective manufacturers listed. Table of Contents Pulse TM Overview 1 Pulse
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included