Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries.

Size: px
Start display at page:

Download "Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries."

Transcription

1

2 Legal Notices Copyright 2011 All rights reserved. Under the copyright laws, this manual or the software described within, can not be copied, in whole or part, without the written consent of the manufacturer, except in the normal use of the software to make a backup copy. The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) can be sold, given, or loaned to another person. Under the law, copying includes translating into another language or format. Specifications and descriptions subject to change without notice. Trademarks Quest, Quest Software, the Quest Software logo, are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. For a complete list of Quest Software's trademarks, please see Other trademarks and registered trademarks are property of their respective owners. The name PacketTrap Networks, the software, the product name PacketTrap pt360 Tool Suite, PacketTrap MSP, Perspective MSP, and the PacketTrap logo are registered trademarks of PacketTrap Networks, Inc. PacketTrap Networks (the Software) is copyright 2011 by PacketTrap Networks, a division of Quest Software. All rights are reserved. Microsoft Windows 98, Windows NT, Windows 2000, Windows XP, Windows Server 2003, Vista, Windows 7, Internet Explorer, and Active Directory are trademarks or registered trademarks of Microsoft Corporation. Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries. Firefox is a trademark of the Mozilla Foundation

3 Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies and are the sole property of their respective manufacturers

4 Contents Legal Notices 2 Contents 4 Overview 10 About PacketTrap MSP 10 What's New in PacketTrap MSP 10 Using the Quest PacketTrap MSP Community 12 Watching Videos 12 Contacting Support 13 Getting Started 15 System Requirements 15 Things to Consider Before You Install PacketTrap MSP 16 Host Server Hardware and Software System Requirements 17 Device and Collection Agent System Requirements 19 PacketTrap MSP Studio System Requirements 20 SQL Server System Requirements 20 Installing PacketTrap MSP on a Virtual Machine 22 Logging in to the PacketTrap MSP Studio 23 Configuring Your SMTP Settings 24 Setting Up PacketTrap MSP 25 How to Set Up PacketTrap MSP 25 Adding Sites 26 Adding Groups 27 Enabling Devices for Monitoring 29 Enabling SNMP on a Device 30 Enabling WMI on Windows Devices 31 Updating Your Version of PacketTrap MSP 32 Running Network Discovery 33 Pre-Network Discovery Checklist 34 Adding Devices by SNMP 35 Network Discovery Techniques 36 Setting Device Credentials for Network Discovery 38 Adding Devices by Deploying Agents 39 Benefits of Deploying an Agent

5 Installing Agents Manually 41 Managing Credentials 42 Applying Smart Policies to Devices 43 Monitoring Devices 45 Monitoring Your Devices By SNMP 45 Monitoring Your Devices by WMI 46 Monitoring Your Devices by Deploying Agents 47 Collecting Syslog, NetFlow, and SNMP Traps Data 48 Using Dashboards 51 Touring the Dashboard View User Interface 52 Customizing Your Dashboard 53 About Gadgets 54 Adding Dashboard Tabs 59 Adding Gadgets to Your Dashboard 60 Editing a Gadget 62 Creating Custom Gadgets 62 Managing Devices 65 Viewing the Current Logged-on User 65 Displaying the Current Logged-on User 66 Viewing the Logged-on User History 68 Monitoring Current Logged-on User for Windows 70 Troubleshooting: How do I solve the "access denied" error when I use qwinsta.exe/rwinsta.exe or WTSOpenServer Windows API function? 71 Monitoring Data from a Cisco Wireless Access Controller 73 Viewing the Wireless Controller Dashboard 74 Creating Custom Reports for Wireless Access Controllers 74 Connecting Remotely to Devices - Overview 76 Using ExpertAssist 76 Managing Devices Using a Web Proxy 78 Troubleshooting: How do I Access Devices That Use Java When Google Chrome Times Out? 78 Configuring the Remote Control Settings 79 Collecting Real-time Data Using Go Live! 79 Verifying the Device Monitor Status 80 Deciphering Error Codes 80 Viewing the Details of a Device

6 Monitoring Avaya VoIP Systems 88 Preparing the PBX 89 Configuring RTCP Monitoring 89 Configuring CDR Monitoring 91 Adding Node Names 92 Adding an IP CDR Service 93 Setting CDR System Parameters 94 Enabling Intra-switch CDRs 95 Enabling CDR Reporting for Trunk Groups 96 Monitoring Avaya IP Office Systems 97 Avaya IP Office VoIP Systems - Overview 97 Understanding Avaya IP Office Modules 98 Configuring Modules for Avaya IP Office Systems 99 Monitoring Avaya Aura Communication Manager Systems 101 Avaya Aura VoIP Systems - Overview 101 Understanding Avaya Aura Modules 102 Configuring Modules for Avaya Aura Systems 104 Analyzing Traffic Flow Data 106 How PacketTrap MSP Collects Network Traffic Flow Data 107 Enabling NetFlow 107 Enabling ptflow 109 Viewing Traffic Flow Information 113 How to Scope Your NetFlow Traffic Data 115 Understanding the Various Groups of Traffic Flow Information 116 Seeing How Traffic Flow Information is Trending 118 Managing Policies 121 Adding New Policies 122 Adding Devices to New Policies 123 Adding Monitors to New Policies 123 Editing Policies 124 About Monitors in Policies 127 Removing Policies 133 Migrating Devices from the Default Policy 133 Creating Custom SNMP Monitors 135 Installing the SNMP MIB Library 137 Creating Custom SNMP Monitors

7 Adding Custom SNMP Monitors from the MIB Browser 139 SNMP Walking the Device 140 Manually Adding Custom SNMP Monitors 143 Adding Custom SNMP Monitors to Policies 144 Removing Custom SNMP Monitors from Policies 145 Editing Custom SNMP Monitors 146 Deleting Custom SNMP Monitors 148 Viewing Custom SNMP Monitor Details 149 Setting Up Alerts 152 Adding Alerts 152 Escalating Alerts 154 Managing Alert Notification Rules 155 Adding Monitoring Templates to Policies 156 Available Monitoring Templates in PacketTrap MSP 157 Setting Up Alerts for Custom SNMP Monitors 164 Creating and Running Scripts 166 Understanding Script Types 167 Importing Scripts to PacketTrap MSP 167 Exporting Scripts from PacketTrap MSP 168 Deploying VIPRE AntiVirus 170 Creating AntiVirus Policies 171 Configure Advanced Scan Settings 173 AntiVirus Scan Definitions 174 Managing Routine AntiVirus Tasks 175 Scanning on Demand 178 Viewing AntiVirus Alert Logs 179 Patch Management 182 Adding New Patch Management Groups 182 PSA Integration 184 Using PacketTrap PSA 184 Integrating PacketTrap MSP with Autotask 185 Integrating PacketTrap MSP with ConnectWise 187 Integrating PacketTrap MSP with Tigerpaw 188 Generating Reports 190 Running Reports

8 Changing Devices in a Report 192 Changing the Report Period 193 Changing the Report Type 193 Creating Custom Reports 194 Scheduling Reports 197 ing Reports 198 Exporting Reports 199 Network Maps 200 Touring the Network Map Editor User Interface 200 Creating a Network Map 202 Adding Devices to a Network Map 204 Adding Groups 205 Copying Network Maps 206 Editing Your Network Maps 206 Setting the Background 209 Resetting the Background 210 Rebuilding Relationships 210 Deleting Network Maps 211 Updating the Network Map Layout 211 Administration 212 Agent Migration 213 Auto Patch Settings 213 Baseline Configuration 214 Branding Configuration 215 Checking for Updates 215 Flow Configuration 216 License Update 216 Log Alert Configuration 217 Port Management 217 Retention Configuration 218 SMTP Settings 218 Studio Deployment 219 Switching to the New Database 219 User Management 220 Web Service Entry Point API Overview 220 Migrating Your Database

9 Important Information You Should Know Before You Migrate the Database 222 Migrating SQL CE to SQL Server Standard or Enterprise 223 Migrating from SQL Server Standard or Enterprise 223 Index i - 9 -

10 Overview About PacketTrap MSP PacketTrap MSP (Managed Service Provider) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is capable of monitoring and managing your customer's IT infrastructure in a secure and customized environment. PacketTrap MSP installs on your system and starts discovering your devices in less than 15 minutes. Alongside with discovering your devices, PacketTrap MSP automatically discovers key metrics for network resources, such as hardware, operating systems, virtual infrastructure, databases, middleware, applications, and services. You can then use this information to easily and quickly pinpoint and diagnose network issues. What's New in PacketTrap MSP These features are new to PacketTrap MSP in this release. Avaya Monitoring Support As a network professional with increased responsibility and continually evolving technology, you may experience the challenge of effectively monitoring VoIP systems. You worry that you have adequate visibility into how your IT infrastructure and VoIP systems are working together and may use any number of point tools to manage and monitor them. Still VoIP implementations often suffer from dropped calls, poor voice quality, and other issues. How do you create the most efficient VoIP monitoring environment, enhance user satisfaction and meet SLAs? PacketTrap MSP provides in-depth and detailed monitoring of VoIP quality metrics like MOS, Jitter, packet-loss, delay, network utilization and comprehensive set of reports and alerts on all VoIP related voice metrics. Monitoring for Cisco Wireless Access Controller Devices like Cisco wireless controllers are being used increasingly more to manage all the wireless access points, instead of individually managing access points. Now PacketTrap MSP has the capability to provide the deep monitoring stats that you are used to at the access point level through a central wireless controller. Out of box monitoring includes: health status, access points managed and their performance, and who is connected to what device

11 Application Monitoring Template Ease of use and out of box configuration is a critical foundation piece for PacketTrap MSP. This exciting new feature automatically groups monitors, alerts, and actions to completely monitor and manage applications. This one-click setup dramatically simplifies configuration time and allows you to spend your time on other projects. You can use a monitoring template across global policies, site policies, or on a particular device. One-click Help and Tutorial Videos IT infrastructure management is difficult and complex. Our goal is to provide you with resources at your fingertips to help you quickly find answers to your questions. We ve taken a leap forward in 6.2 with a newly launched Knowledgebase that is directly linked from features and configuration screens. With a single-click you can peruse topics in the new PacketTrap MSP Knowledgebase or you can get feature-specific help from anywhere in the product. PacketTrap PSA Integration Whether you are using spreadsheets and sticky notes or clunky software, PacketTrap PSA will transform your service management into an efficient dare we say enjoyable process. Companies like yours will surely benefit from significant time savings and a dramatic increase in profitability. PacketTrap MSP 6.2 release has seamless integration into PacketTrap PSA, creating a single workflow and solution to meet your business needs. Importing and Exporting Scripts You can import and export a large number of scripts to/from PacketTrap MSP. Scripts that you select to import or export must be formatted in XML. Network Map Enhancements Visual representation of the IT infrastructure is a quick and easy way to identify the root cause of many problems. This release of PacketTrap MSP has two new improvements for Network Maps: o Ability to show or not show connected devices for the devices already on the map. For example, you can now choose to not show a core switch that is connected to a device. o Update the map layout when devices are added or removed. You can drag and drop devices to specific areas on the map and they will not change unless you select this new option

12 Using the Quest PacketTrap MSP Community The Quest PacketTrap MSP Community is a resource for users to find answers, share ideas, and upload documents. It is a great resource if you are looking for solutions to common questions or would like to share best practices. You can access the community the following ways: From the PacketTrap MSP Studio, click the Community button in the main menu. Go to Registering for the Community If you are new to the Quest Community, click here to create a new account. Your new account allows you to comment on discussions, post documents, and participate in other Community features. If you have an account on Quest.com, click here to log in to the Community with your address and Quest.com password. You can create a community profile and get started on the community from there. PacketTrap MSP Knowledgebase A variety of articles, videos, and documents are available in the PacketTrap MSP Knowledgebase to help you get the most out of PacketTrap MSP. To access the knowledgebase, go to Watching Videos Learn more about PacketTrap MSP by watching the following videos: PacketTrap MSP Setup User Guide This video explains how set up your product after you install it. You will learn how to run network discovery, initial application configuration, and configuring dashboards and alerts

13 Netflow Setup Guide This video explains how to configure NetFlow, JFlow, sflow and ptflow. With flows, PacketTrap MSP can capture packets for any device on the network including routers, switches, servers, and desktop. See traffic from the perspective of each device for easier troubleshooting. Agent Deployment Guide This video explains how to deploy, configure, manage, and report on agents distributed locally or throughout the WAN. Packet Trap FAQ This video goes over frequently asked questions about Packet Trap, and how to go about troubleshooting the most common issues. You will learn how to configure devices, flows, backups, and alerts, and how to obtain technical support. SNMP Traps Guide This video explains how to setup SNMP traps on a device monitored by SNMP, an Agent device as well as networking device. Contacting Support Support for PacketTrap MSP is available to customers who have a trial version of PacketTrap MSP or who have purchased PacketTrap MSP. You can retrieve solutions to any issues that you may have in the following ways: Visit the PacketTrap MSP Community by going to communities.quest.com/community/packettrap/ptmsp. The PacketTrap MSP community is a resource for you to find answers, share ideas, or view and upload documents. Visit the PacketTrap MSPKnowledgebase to see detailed instructions on how to use the features in PacketTrap MSP. You can access the knowledgebase by going to

14 communities.quest.com/community/packettrap/ptmsp/knowledgebase_(beta)?view=overview Call Support at (415) or (866) (toll-free) your questions or issues to support at : support@packettrap.com

15 Getting Started This section provides you with an overview setting up customer profiles, deploying the PacketTrap MSP agent (ptagent) to your customer s network, and discovering your devices. You will also learn more about the PacketTrap MSP architecture, as well as receive an introduction to some of the main features in PacketTrap MSP. Topics in this section PacketTrap MSP Features Overview How to Set Up PacketTrap MSP Logging in to the PacketTrap MSP Studio Configuring Your SMTP Settings Pre Network Discovery Checklist Managing Credentials Setting Up PacketTrap MSP System Requirements This section contains information on the minimum system requirements for PacketTrap MSP. Before you can begin to download PacketTrap MSP, you must make sure that your computer meets the minimum system requirements. This document contains information on the minimum system requirements for PacketTrap MSP. Before you can begin to download PacketTrap MSP, you must make sure that your computer meets the minimum system requirements. Topics in this section Things to Consider Before You Install PacketTrap MSP Host Server Hardware and Software System Requirements Device and Collection Agent System Requirements PacketTrap MSP Studio System Requirements

16 SQL Server System Requirements Installing PacketTrap MSP on a Virtual Machine Things to Consider Before You Install PacketTrap MSP Installing PacketTrap MSP with the default monitor settings, this basic type of installation will perform well on a Dual-Core system with 4 GB of RAM. If you adjust the policies to monitor larger networks or use the Network Traffic Flow module, you need to consider which hardware and system configuration you plan to use. As shown in the tables in the following sections, the minimum system requirements are dependent upon the number of devices that you are monitoring. You must consider the following scalability issues before installing PacketTrap MSP: Number of monitored devices: If you monitor 500 or more devices, you may need to do some performance tuning on your system. Amount of data collected for each device: If you increase the number of monitors on a device, a spike in the amount of data collected will occur. Changing the default time intervals: If you set a time interval to collect data every five minutes, using a high performance server is recommended to complete the data collection in an efficient and timely manner. Number of Studio connections: A large number of Studio connections simultaneously accessing the system will impact performance. To optimize performance when collecting traffic analysis data, it is recommended that you use a dedicated high performance server when the following conditions exist: You configure the application to collect Traffic Flow data from multiple routers or switches. There exists a large amount of traffic conversations. You set up the application to monitor more than 500 devices

17 Host Server Hardware and Software System Requirements See the following table for the minimum hardware and software system requirements for your host server. Updating Your.Net Framework Before you can install PacketTrap MSP, you must upgrade your.net framework to version 4.0 or higher. When you install PacketTrap MSP, if you have not upgraded your.net framework to version 4.0 or higher, the PacketTrap MSP installer will automatically update your target server. You will see a message indicating that the.net framework is being upgraded. NOTE: Keep in mind that updating the.net 4.0 framework on your target server will take several minutes to complete. When the Next button becomes active, you can proceed with completing your product installation. Updating Your Server to SQL Server Standard or Enterprise Edition When you download PacketTrap MSP, the application comes with an optimized version of SQL CE installed. This optimized version works when you are trying out PacketTrap MSP and supports no more than 20 devices at default monitor settings and 1 traffic flow device. If you are monitoring more than 20 devices or running the application in your production environment, you must install PacketTrap MSP on SQL Server Standard or Enterprise Edition. NOTE: The following minimum requirements apply when you install the default configuration. Significantly increasing the device monitoring intervals and network traffic collection may cause an additional load on the server, which may require you to increase your RAM and upgrade your CPU power. Host Server System Requirements Operating System For 32-bit or 64-bit: Microsoft Windows 2003 SP2 or later Microsoft Windows 2008 Server CPU Memory Dual Core, 3.0 GHz or higher (Recommended) 4 GB RAM

18 Host Server System Requirements NOTE: You will need to increase the amount of memory based on the high-volume data that you are collecting, such as netflow, syslog, and windows event logs. Hard Drive Space.Net Framework Firewall Exceptions - Allowed Programs 50 GB NOTE: You will need a minimum of 3 GB of free space to install the SNMP MIB Library. NOTE: You will need to increase your hard drive space based on the retention settings. Version 4.0 or higher The following are automatically configured during installation: ptserverservice ptagentservice ptstudio Ports The following are the firewall rules for inbound connections: 5053 (TCP) = (SSL Encrypted Host Server port) 5054 (TCP) = Agent deployment CAB file downloads 5055 (TCP) = (128 AES Encrypted Remote Control Tunnel port) 161 (UDP) SNMP Trap collector 69 (UDP) - TFTP Server 514 (UDP) - Syslog collector 2055 (UDP) NetFlow collector 6343 (UDP) sflow collector 9555 (UDP) - NetFlow Alternative port #2 collector 9995 (UDP) NetFlow Alternative port #3 collector

19 Device and Collection Agent System Requirements See the following table for the minimum hardware and software system requirements for your host server in order to deploy device and collection agents on it. NOTE: When you install a collection agent on Microsoft Windows XP or Microsoft Vista, the limited TCP connections available with these operating systems may impact the monitoring performance. It is recommended that you use Windows Server 2003 or Windows Server 2008 when possible. System Requirements for Device and Collection Agents Operating System For 32-bit or 64-bit: Windows Server 2003 SP2 or later Windows Server 2008 Windows XP SP2 or later Windows Vista SP1 (all versions) Microsoft Windows 7 Ubuntu Server 8 Fedora release 10 Debian 4.0 OpenSuse 11.0 Apple Mac OS X NOTE: Windows Server 2003 or Windows Server 2008 is required if you are collecting Syslog, NetFlow, ad SNMP Traps data..net Framework Ports Version 4.0 or higher The following are the firewall rules for inbound connections: 5053 (TCP) = (SSL Encrypted Host Server port)

20 System Requirements for Device and Collection Agents 5054 (TCP) = Agent deployment CAB file downloads 5055 (TCP) = (128 AES Encrypted Remote Control Tunnel port) 161 (UDP) SNMP Trap collector 69 (UDP) - TFTP Server 514 (UDP) - Syslog collector 2055 (UDP) NetFlow collector 6343 (UDP) sflow collector 9555 (UDP) - NetFlow Alternative port #2 collector 9995 (UDP) NetFlow Alternative port #3 collector PacketTrap MSP Studio System Requirements You can use the following operating systems and browsers to run the web version of the PacketTrap MSP Studio. Microsoft Windows (all versions) Microsoft Internet Explorer 6 or later Mozilla Firefox 3.6 Google Chrome SQL Server System Requirements See the following table for the minimum SQL Server system requirements. When you download PacketTrap MSP, the application comes with an optimized version of SQL CE installed. This optimized version works when you are trying out PacketTrap MSP and supports no more than 20 devices at default monitor settings and 1 traffic flow device. If you are

21 production environment, you must install PacketTrap MSP on SQL Server Standard or Enterprise Edition. NOTE: When you create user account, you need to create a SQL Server login with the db-owner database role on the PacketTrap MSP database. System Requirements for SQL Server Database For 32-bit or 64-bit: Microsoft Windows SQL Server 2005 Standard or Enterprise Editions Microsoft Windows SQL Server 2008 Standard or Enterprise CPU Memory Hard Drive Space Dual Core, 3.0 GHz or higher (Recommended) 4 GB RAM NOTE: You will need to increase the amount of memory based on the high-volume data that you are collecting, such as NetFlow, syslog, and windows event logs. 50 GB Additional Hardware Requirements for SQL Server If you choose to run SQL Server on a separate machine from your PacketTrap MSP server, the following requirements apply: You must install SQL server on a physical machine. You must have a minimum of 4 GB of RAM. You must use SQL authentication instead of windows authentication. If you have SQL Server running on the same box as the PacketTrap MSP Platform Server, it is recommended that you limit the amount of installed memory that SQL Server consumes. 4 GB RAM -> 2 GB RAM 8 GB RAM-> 5 GB RAM 16 GB RAM->12 GB RAM

22 If your machine is collecting traffic and log data, the following minimum system requirements apply: Additional Requirements Operating System Perspective Agent Service Perspective Service Additional RAM per Netflow Device(s) Additional RAM per Netflow Device(s) 2 GB 1 GB 1 GB NoOfFlowDevices * 300MB 1 GB Installing PacketTrap MSP on a Virtual Machine Because of intense I/O requirements and a high threshold of additional hardware specifications, installing PacketTrap MSP on a virtual machine in a production environment is not recommended. You should install PacketTrap MSP in a testing environment to ensure that you, your colleagues, and your sites have the best user experience possible. The following items are the minimum hardware and software system requirements when installing PacketTrap MSP on a virtual machine (VM). Operating System: For 64-bit, both Windows Server 2008 or Windows Server 2008 R2 are recommended. You can use Microsoft Windows 7; however, it is not officially supported. CPU: Two physical cores dedicated to perspective VM (no hyper-threading core). Memory: 4 GB RAM. NOTE: If you install SQL server, you must include an additional 4 GB RAM. You must provide a minimum of 100 MBs of bandwidth dedicated. You must make sure that your VM is using a physical partition rather than a virtual harddisk

23 Logging in to the PacketTrap MSP Studio After you successfully install PacketTrap MSP and launch the Studio, you will need the default information to log in to the system: Username: Admin Password: Password In the Host And Port field, type a valid DNS name or IP address. NOTE: The DNS name is the name of the machine on which you installed PacketTrap MSP. It is strongly recommended that you use a DNS name instead of an IP Address. You should also keep the following items in mind before you start to use PacketTrap MSP: Make sure that you open ports 5053 and 5054 and check that no other application or process is using these ports. Verify that the PacketTrap MSP server has been started in Windows Services. You must manually start the service if it is not already started

24 Configuring Your SMTP Settings When you first log in to the Studio, the Let's Get Started window appears. This window allows you to set up your administrator account information and configure your SMTP settings. This information is important when it comes to receiving alert notifications and reports that you schedule in PacketTrap MSP. Alerts and reports are critical components of your business, which keep you informed about network events and issues that may occur. By configuring your SMTP settings, where you will identify the SMTP server name and port and provide the appropriate authentication information (if necessary), these alerts and reports are sent to your address when they happen. It is recommended that you set up your SMTP settings in the Let's Get Started window; however, you do have the option to set it up at a later time by clicking Configuration -> Administration -> SMTP Settings. To configure the SMTP settings 1. Click Configuration -> Administration -> SMTP Settings 2. In the SMTP Server field, type the name of your SMTP server. 3. In the SMTP Port, type the port number. The default port is If your SMTP server requires authentication, do the following in the Authentication section: Type the username, password, and domain name to allow PacketTrap MSP access to the SMTP server. 5. If your server requires secure socket layer (SSL) encryption, select the Enable SSL check-box. 6. (Optional) In the Send Test Message field, type your address and click Send to verify that you have properly configured your SMTP settings. You will receive a test shortly thereafter. 7. Click OK to save your changes. See Also

25 Adding Alerts Scheduling Reports Setting Up PacketTrap MSP This section will show you more about getting PacketTrap MSP up and running. Topics in this section How to Set Up PacketTrap MSP System Requirements Adding Sites Adding Groups Enabling Devices for Monitoring How to Set Up PacketTrap MSP There are a couple of factors that you must keep in mind when setting up your product: It is recommended that you assign a public DNS to your product platform server instead of using an IP address. Make sure you open the correct outbound and inbound firewall ports. For more information, click here. The following diagram shows how your product monitors and collects data from your devices and sends it to your PacketTrap MSP platform server

26 See Also System Requirements Enabling Devices for Monitoring Adding Sites When you have new sites, you can create profiles for them in PacketTrap MSP and then run network discovery to discover the devices in their networks. To create a new sites

27 1. In the PacketTrap MSP Studio, click New -> Customer. 2. In the Editor dialog box, type a name and description for the site. This information will appear in the Devices View. 3. Type the host name of the remote site. It is recommended that you use the DNS name of your host; however, you can use the IP address. 4. Click Save. 5. Click Copy URL to download the agent software or click URL to send the link to the machine where you want to install the collection agent on the remote site. NOTE: Every remote site needs an agent deployed to it. You will be prompted to select a polling agent or to manually install one. A polling agent is the agent the connects back to your platform server. For more information, see Installing Agents Manually. To add devices to your new site 1. In the Devices View, select the new site in the Customer drop-down list. 2. Click Add New Devices. 3. Go through the screens of the Network Discovery wizard to discover the devices in a site's network. See Also Adding Devices by SNMP Adding Devices by Deploying Agent Adding Groups You can create multiple groups to organize the various types of devices in a network. For example, you can group similar devices together, such as adding all the desktops in a network to a group called "Desktop". To add a new group

28 1. In the PacketTrap MSP Studio, New -> Group. 2. In the Add a New Group dialog box, type a name for the group. 3. In the Edit Group dialog box, click Add Device Member to start adding devices to the group. 4. In the Select New Device Members, select one or more devices and then click Add. 5. Click Add to finalize your selection and add the devices to the group. 6. Click Save to save your changes. To edit a group 1. In the tree view, right-click a group and click Edit. 2. (Optional) Type a new name in the Name field. 3. Click Add to add more devices to the group OR Select one or more devices and click Remove to remove the devices from the group. 4. Click Save to save your changes

29 To remove a group 1. In the tree view, right-click a group and click Remove. 2. When the message appears, click Yes. Enabling Devices for Monitoring Before PacketTrap MSP can begin monitoring and collecting data from the devices in a network, you must enable SNMP or WMI. You will need to enable the correct protocol depending on the type of data you are collecting. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on IP networks. SNMP allows you to collect data from all types of devices, such as desktops, servers, routers, and switches, across any operating system. When you enable SNMP on a device and provide the correct credentials, PacketTrap MSP can monitor that device and collect data from it. For more information on how you can enable SNMP, see Enabling SNMP on a Device. Windows Management Instrumentation (WMI) Windows Management Instrumentation (WMI) is a programming interface (API) in the Windows operating system that enables devices and systems in a network, typically enterprise networks, to be configured and managed. WMI is based on Web-Based Enterprise Management (WBEM), which stores all definitions in a Common Information Model (CIM) database. WMI allows network administrators to query and set information on workstations, applications and networks, and can also be used to access the Active Directory. Enabling WMI allows PacketTrap MSP to collect the following specific data from Windowsbased devices: Microsoft Exchange SQL Active Directory

30 Windows event logs Windows services Hardware Inventory For more information on how you can enable WMI, see Enabling WMI on Windows Devices. See Also Enabling SNMP on a Device Enabling WMI on Windows Devices Monitoring Your Devices by SNMP Monitoring Your Devices by WMI Enabling SNMP on a Device When you enable SNMP on a device and provide the correct credentials, PacketTrap MSP begin to monitor that device and collect data from it. Use the SNMP Enablement tool to enable SNMP on the devices in a network. 1. In the PacketTrap MSP Studio, select one or more devices in the Devices View. You can add more devices to your list by clicking Select Targets. 2. Right-click and then click Tools -> Enable SNMP. 3. In the Enable SNMP Wizard, click Next. PacketTrap MSP begins to determine if the devices are available for SNMP Enablement and will display the results. 4. Click Next. 5. Select the SNMP credential that you want to assign to the devices. Click the Manage Credential link to add new credentials to the Encrypted Credential Store. 6. Click Next. NOTE: If necessary, you can modify the preferred credential assigned to each device by selecting it and then clicking Set Preferred. 7. Click Next. SNMP is now enabled on the devices. 8. Click Finish to complete the process

31 Visit the PacketTrap MSP Community Is your SNMP-enabled device not responding? Click here to find an answer to this issue. See Also Monitoring Your Devices by SNMP Enabling Devices for Monitoring Enabling WMI on Windows Devices For Windows-based machines running Windows XP or Vista, by default Microsoft installs and configures WMI. Before you can start monitoring your devices by WMI, you must make sure that the following services are running: Windows Management Instrumentation Windows Management Instrumentation Driver Extensions To enable WMI 1. Go to the Control Panel and double click Administrative Tools. 2. In the Administrative Tools dialog, double-click Computer Management. 3. Expand Services and Applications, right-click WMI Control and follow the Windows menus. For more information on troubleshooting WMI related-issues on Windows XP, click here. For more information on connecting to WMI remotely on Windows Vista, click here. See Also Monitoring Your Devices by WMI Enabling Your Devices for Monitoring

32 Updating Your Version of PacketTrap MSP There are two ways PacketTrap MSP will update. One approach is to manually update your software and the other approach is to let it automatically update. Manually Updating Your Product 1. From the PacketTrap MSP Studio main menu, click Administration. 2. In the Administration window, click Check For Updates. 3. Click Update Now to manually apply the software updates. The program will close and then reopen automatically. Automatically Updating Your Product Upon launching PacketTrap MSP, the software will check for any updates available at the patch server. The software automatically pulls the updates and stores them in cache. The updates are applied the next time the software is launched

33 Running Network Discovery Overview Network Discovery scans the entire network, and then populates your database with the devices that you want to monitor and manage with PacketTrap MSP. Using various discovery techniques, such as ping and MAC resolution, network discovery provides a complete set of attributes for all devices. Using the data profile created for devices during discovery, PacketTrap MSP automatically assigns them to different policies, known as Smart Policies, that are comprised of monitors that best fit what kind of data you want to collect from the devices. The Network Discovery Wizard appears shortly after you install PacketTrap MSP and open it for the first time. However, if you need to add more devices to your database, you can run network discovery again. To run network discovery from the Studio 1. In the PacketTrap MSP Studio, click Add Devices. 2. In the Add Devices Wizard, select the method by which you want to add devices: See Adding Devices By SNMP for more information See Adding Devices by Deploying Agents for more information 3. Go through the remaining screens of the wizard to complete the process and click Finish. Things to Consider Before You Run Network Discovery Although network discovery detects a device in the network, the data profile that it creates for the device may not be complete because of several factors. It is recommended that you consider the following before you run network discovery: Enable SNMP or WMI on your devices in order to monitor and collect data from it. You do not need to enable SNMP on devices where an agent is deployed; however, if the agent is monitoring and collecting data from other devices, such as routers and switches, you will need to enable SNMP on those devices

34 NOTE: Enabling WMI allows you to monitor and collect data for Microsoft Exchange, SQL, Active Directory, Windows Event Logs, Windows Services, and Hardware Inventory data types only. Make sure you have the correct credentials. When you run network discovery, you can only enter one credential at a time for each level of security. So you may have to run network discovery more than once to properly discover all devices in the network. You can also set the credentials for a device at a later time using the Set Credential link in the Devices View. If you do not have the correct credentials assigned to a device in PacketTrap MSP, PacketTrap MSP will not be able to monitor and collect data from that device. Topics in this section Adding Devices by SNMP Adding Devices by Deploying Agents Managing Credentials Enabling SNMP on a Device Enabling WMI on Windows Devices Pre-Network Discovery Checklist PacketTrap MSP installs on your system and starts discovering your devices in less than 15 minutes. However, there are important items that you must have in place in order to optimize your experience with PacketTrap MSP. This section will help you prepare your system before you run network discovery by providing you with the following checklist of items that you need to implement. Make sure your server meets the minimum system requirements The PacketTrap MSP platform server is the main database for monitoring and collecting all data from your devices. To verify that it meets the minimum system requirements, see Host Server Hardware and Software System Requirements for more information. Open the appropriate ports You will need to make sure that all the correct TCP Ports are open on your firewall to allow communication to the PacketTrap MSP platform server. For more information about inbound ports, see Host Server Hardware and Software System Requirements

35 Have your valid WMI credentials available You will need to have all your valid Windows administrative credentials available for the devices that you want to monitor by WMI. After you install PacketTrap MSP, you can use the WMI enablement tool to enable WMI on your devices. For more information about how you can accomplish this task, see Enabling WMI on Windows Devices. Have your valid read/write SNMP credentials available You will need to have all your valid read/write SNMP credentials available for the devices that you want to monitor by SNMP. After you install PacketTrap MSP, you can use the SNMP enablement tool to enable SNMP on your devices. For more information about how you can accomplish this task, see Enabling SNMP on a Device. Telnet/SSH access You must have Telnet/SSH access to all your routers, switches, and devices that you want to monitor with PacketTrap MSP. Compile a list of IPs and/or IP ranges You should make a list of all the IPs or IP ranges that you want to monitor during the PacketTrap MSP. Adding Devices by SNMP PacketTrap MSP can use SNMP to discover devices in a network and then provide a complete set of attributes for each discovered device. This type of network discovery will gather technical data including hardware, software, and processes for each device, and then identify devices by responding status, protocols, type, and operating system. When you add a device by SNMP, it requires that you provide the SNMP credentials for the devices and you must make sure that you have the correct port open so that the target machine can accept SNMP packets from that device. 1. In the PacketTrap MSP Studio, click Add New Devices. 2. In the Add Devices Wizard, select Add Devices Via SNMP Network Discovery. 3. Click Next. 4. In the Enter Targets field, type any one of the following: CIDR, DNS, IP/Subnet Mask or range of IP Addresses. 5. In the Select Network Discovery Techniques section, deselect any of the check-boxes that do not apply to your discovery. For more information on these techniques and configuring the advanced ping settings, see Network Discovery Techniques

36 6. In the Choose Device Credentials section, select a credential for each level of security that you want to use to discover each device. For more information on credentials, see Setting Device Credentials for Network Discovery. 7. Click Next to start the discovery process. 8. On page 2 of the Network Discovery Wizard, select the devices on which you want to do a complete discovery. You can use the options in the drop-down list to filter the devices shown on this screen. 9. Click Next. 10. On page 3 of the Network Discovery Wizard, select how you want to assign your devices to a policy. For more information about the Policy Assignment Options, see Applying Smart Policies to Devices. 11. Click Finish to complete the Network Discovery process. See Also Network Discovery Techniques Setting Device Credentials for Network Discovery Applying Smart Policies to Devices Network Discovery Techniques PacketTrap MSP provides 3 different techniques to help you discover the devices in a network. They are: Exclude Existing Devices in Database

37 Use this technique if you have previously run network discovery. It does not include devices that are currently in the database in you new search, which allows PacketTrap MSP to scan a network faster. Ping Use this technique to send an ICMP command to a device. If the ping monitor is working as expected, a device will respond to the request. There are advanced ping settings that you can configure from the Network Discovery Wizard, which is explained further in the following section. MAC Resolution PacketTrap MSP uses the MAC Address to uniquely identify and profile a device in the network. Configuring Advanced Ping Settings PacketTrap MSP provides a way to configure the ping settings so that you can turn a resolution on to display or turn it off from displaying. Click the Advanced Settings link in the Select Network Discovery Techniques section to modify the following settings: Ping Timeout (ms) Maximum amount of time in milliseconds that a ping waits for a response from the target IP address. If the target does not respond within the number of milliseconds set, ping assumes it is not working as expected. Ping Packet TTL (Time-To-Live)

38 Number of hops along the way to the specified address. If you assign a value of 32 to this setting, your ping scan may pass through up to 32 different routers on the way to the remote address before the network throws it away. Pings Per Node You can control the number of ping attempts to send to each address during a scan. When a network containing a Cisco router is scanned, you should set this number to a number greater than 2. If the target IP address is not in the ARP cache of a Cisco router, the router discards the ICMP query while it requests the MAC address of the target IP. The first ping will never arrive at the subnet of the target IP address; however, the Cisco router will respond to the second ping. Delay Between Pings Time in milliseconds between each successive ping to the target address. If you assign a low value to this setting a constant stream of pings is sent to the target IP address. See Also Adding Devices by SNMP Setting Device Credentials for Network Discovery When you run network discovery, selecting the correct credentials is essential in order for PacketTrap MSP to access the devices in a network. When a device is discovered during a scan of the network, PacketTrap MSP will add it to the database. However, if you incorrectly set the credentials for that device (in the product), PacketTrap MSP cannot monitor and collect data from it. In the Network Discovery Wizard, choose the correct credential for the devices in the network. PacketTrap MSP allows you to select a credential for the following protocols: SNMP Version 1 Credential SNMP Version 2 Credential SNMP Version 3 Credential WMI Credential

39 From the Network Discovery Wizard, you can add new credentials to the Encrypted Credential Store by clicking the Managing Credentials link. For more information about credentials, see Managing Credentials. See Also Adding Devices by SNMP Adding Devices by Deploying Agents The Deploy Agent Wizard allows you to select one or more devices where you can deploy a local or remote agent. Agents can only be deployed to Windows-based machines running Windows XP, Windows Vista, or Windows Server As you work through the different screens of the wizard, you will select the device where you want to install the agent, determine if SNMP in enabled on the device, learn the status of that device (if it will support an agent deployed on it), set and manage the device's credentials, set the telnet/ssh credentials in order to connect to the device. For more information about the minimum system requirements the agent device needs to meet, such as which ports you need to open, see Device and Collection Agent System Requirements. 1. In the PacketTrap MSP Studio, click Add Devices. 2. In the Add Devices Wizard, select Add Devices By Deploying Agents and click Next. 3. In the Deploy Agent Wizard, type a CIDR, DNS, IP/SubnetMask or range of IP addresses in the Enter Targets field. 4. Click Next. NOTE: This process may take a few moments to complete. 5. In the Connectivity Results screen, select a device in the list.note: Check the Status column for information about the devices that were discovered. If the returned results have a "Fail" status, you may not be able to select that device. 6. Click Next. 7. Select a preferred credential and type a username and password. You can create a new credential by selecting (new credential) in the drop-down list. 8. Click Next

40 9. In the Set Telnet/SSH Credential screen, select the device on which you are installing an agent and click Set Preferred. 10. Click Next. 11. In the Results screen the Results screen will notify you if the Telnet/SSH credential for the device is valid. 12. Select a device with the correct WMI credential so that you can monitor and collect specific Windows-based data. For more information, see Monitoring Your Devices by WMI. NOTE: Use the Manage Credential link on this screen to edit your existing credentials or to create a new credential. For more information, see Managing Your Credentials. 13. Click Next. The agent will now be deployed to the device. You can view the log in the agent deployment status. 14. Click Finish. See Also Monitoring Your Devices by Deploying Agents Benefits of Deploying an Agent Benefits of Deploying an Agent You will experience the following benefits when you deploy an agent on a machine: An agent captures and monitors all data from a machine eliminating the need to enable SNMP or WMI on a device. You can use the Patch Management feature. You can remotely gain access to a machine using Expert Assist. Increase a machine's performance by decreasing the amount of traffic between devices. Increase the quality of monitored data by missing fewer monitoring intervals than a SNMP connection. Gives you remote access to various mobile assets, such as laptops. Increase the amount of devices that you can monitor

41 See Also Monitoring Your Devices by Deploying an Agent Installing Agents Manually You can manually deploy an agent on any windows-based machine. When you install an agent manually, you are downloading the agent software from a known location on your PacketTrap MSP server. Also, you can use the URL feature to deploy an agent to all the desktops in a network. By ing the location of the agent software to each desktop owner, they can download the agent software onto their desktops. 1. In the PacketTrap MSP Studio, click Add Devices. 2. In the Add Devices Wizard, select Add Devices By Deploying Agents. 3. Click Next. 4. In the Deploy Agent Wizard, click Install Manually. 5. In the Manually Deploy Agent dialog, select an operating system and do one of the following: Click Copy URL to download the agent software from a known location on your PacketTrap MSP server. Click URL to send the location of the agent software to all the desktops in a network. 6. Click Close

42 See Also Adding Devices by Deploying an Agent Managing Credentials The Encrypted Credential Store is a secure repository of SNMP, WMI, and SSH credentials shared by all tools and gadgets which require them. It uses standard AES 256-bit encryption. Selecting the correct credentials is essential in order for PacketTrap MSP to access the devices in your network. When a device is found during Network Discovery, PacketTrap MSP will add it to the database. However, if you incorrectly set the credentials for that device in the Network Discovery Wizard, PacketTrap MSP cannot monitor and collect data from it. In the Encrypted Credential Store, you can store credentials for the following protocols: SNMP Version 1 Credential SNMP Version 2 Credential SNMP Version 3 Credential WMI Credential Telnet SSH From the Network Discovery Wizard, you can add new credentials or edit existing credentials by clicking the Managing Credentials link. 1. Click Credentials from tree options in Devices. 2. In the Credentials window, click New. 3. From the drop-down list next to Type select the type of credential protocol you wish to configure and save. The configuration of each of the three choices displayed is described in the following three sections. 4. Click Save. 5. Click Assign, and then in the Select Devices window, select one or more devices to assign the credential to those devices. 6. Click Close to finish

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices. About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes,

More information

How To Set Up Foglight Nms For A Proof Of Concept

How To Set Up Foglight Nms For A Proof Of Concept Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Remote Network Monitoring Software for Managed Services Providers

Remote Network Monitoring Software for Managed Services Providers http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network

More information

SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES

SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES DATASHEET SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Smart Business Architecture for Midsize Networks Network Management Deployment Guide Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Getting Started. Version 9.1

Getting Started. Version 9.1 Getting Started Version 9.1 Contents About this Guide 4 Other Resources 4 Product Documentation 4 Online Training Program 4 Daily Online Q & A sessions 4 Prepare Your Customer's Network 5 Create a Probe

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

PerleVIEW Device Management System User s Guide

PerleVIEW Device Management System User s Guide PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

PacketTrap One Resource for Managed Services

PacketTrap One Resource for Managed Services Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

WhatsUp Gold 2016 Getting Started Guide

WhatsUp Gold 2016 Getting Started Guide WhatsUp Gold 2016 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 5 STEP 1: Prepare

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

NMS300 Network Management System Application

NMS300 Network Management System Application NMS300 Network Management System Application Quick Start Guide December 2014 202-11288-04 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

How To Get Started With Whatsup Gold

How To Get Started With Whatsup Gold WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Using SolarWinds Orion for Cisco Assessments

Using SolarWinds Orion for Cisco Assessments Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide

SOLARWINDS ORION. Patch Manager Evaluation Guide SOLARWINDS ORION Patch Manager Evaluation Guide About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse requirements of

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Net Inspector 2015 GETTING STARTED GUIDE. MG-SOFT Corporation. Document published on October 16, 2015. (Document Version: 10.6)

Net Inspector 2015 GETTING STARTED GUIDE. MG-SOFT Corporation. Document published on October 16, 2015. (Document Version: 10.6) MG-SOFT Corporation Net Inspector 2015 GETTING STARTED GUIDE (Document Version: 10.6) Document published on October 16, 2015 Copyright 1995-2015 MG-SOFT Corporation Introduction In order to improve the

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

PRINT FLEET MANAGER USER MANUAL

PRINT FLEET MANAGER USER MANUAL PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

WEBCONNECT INSTALLATION GUIDE. Version 1.96

WEBCONNECT INSTALLATION GUIDE. Version 1.96 WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

Preinstallation Requirements Guide

Preinstallation Requirements Guide Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Request Manager Installation and Configuration Guide

Request Manager Installation and Configuration Guide Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

PrintSuperVision 4.0. Enterprise and Professional Editions. Installation, Configuration and Users Guide

PrintSuperVision 4.0. Enterprise and Professional Editions. Installation, Configuration and Users Guide PrintSuperVision 4.0 Enterprise and Professional Editions Installation, Configuration and Users Guide V. 1.0 1 January 2014 Contents Introduction... 6 What s New in Version 4.0... 7 Installing the Software...

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Getting Started with PRTG Network Monitor 2012 Paessler AG

Getting Started with PRTG Network Monitor 2012 Paessler AG Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

SolarWinds Toolset Quick Start Guide

SolarWinds Toolset Quick Start Guide SolarWinds Toolset Quick Start Guide Copyright 1995-2007 SolarWinds.net, Inc., all rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled,

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information