PATROL for Microsoft Windows Servers v Reviewer s Guide
|
|
|
- Charity Perkins
- 10 years ago
- Views:
Transcription
1 PATROL for Microsoft Windows Servers v Reviewer s Guide
2
3 Contents Welcome! Management of Microsoft Windows Servers Installation Requirements PATROL Terminology Installing the Product Server Operating System Availability with Quick Value Statistics Advanced Features and Functionality Alarm Thresholds Automated Recovery Actions Combination Parameters Custom Views and Graphs Event Monitoring Microsoft Performance Counters and PATROL Monitoring Process Monitoring Registry Monitoring Services Monitoring Text Log Monitoring Environment-Specific Functionality Active Directory/Domain Management Cluster/Network Load Balancing Management Datacenter Server Management Microsoft Certification MTS/COM+ Management MSMQ Management Reporting Helping You Maintain Advantage About BMC Software
4 2 PATROL for Microsoft Windows Servers v Reviewer s Guide
5 Management of Microsoft Windows Servers Welcome! This reviewer s guide outlines step-by-step instructions for you to quickly install, configure, and evaluate the PATROL for Microsoft Windows Servers product in a Microsoft Windows NT or Microsoft Windows 2000 test environment. The installation procedures in this guide assume that the product will be installed locally on a single computer that does not already have PATROL installed. For more advanced PATROL installations, including upgrades from previous versions and remote installations, please consult the PATROL for Microsoft Windows Servers Getting Started guide. Management of Microsoft Windows Servers PATROL for Microsoft Windows Servers provides automated management of Microsoft Windows servers and proactively manages server availability, performance, and utilization. Through enterprise-level PATROL service reporting or the easy-to-use Microsoft Excel-based reporting wizard, you can create reports to assist administrators in maintaining an optimal environment. In addition, the PATROL console provides management tools to ease administration. The real-time graphs, alerting, and notification capability in PATROL helps ensure that your servers are constantly available and running at peak capacity. Having servers available and running at peak capacity is critical to meeting service level agreements. PATROL for Microsoft Windows Servers monitors Microsoft Windows NT, Windows 2000, and.net Server operating systems, printers, disk, memory, and other core OS functions. Administrators also can scan event logs for trouble and set PATROL to take corrective action, such as automatically restarting a service. Operating system availability is critical to system administrators because server failures can result in lost productivity and lost revenue. All too frequently, administrators learn about server crashes after irate users call. PATROL provides the administrator with proactive tools to detect problems before they impact users. 3
6 Management of Microsoft Windows Servers Installation Requirements Before installing PATROL for Microsoft Windows Servers, check that the requirements listed in Table 1 have been met. Table 1 PATROL for Microsoft Windows Servers Install Requirements Resource Minimum Requirements Comments Platform Operating system RAM Disk space PATROL Intel Windows 2000 Server (SP1 and SP2 are supported) Windows 2000 Advanced Server (SP1 and SP2 are supported) Windows 2000 Datacenter Server (SP1 and SP2 are supported) Windows NT Server 4.0 (SP5 and SP6A are supported) Windows NT 4.0 Enterprise Edition (SP5 and SP6A are supported) Windows NT 4.0 Terminal Server Edition (SP4, SP5, and SP6 are supported) 32 MB for an agent More memory is required to run PATROL with larger applications. 48 MB for a console More memory is required to run PATROL simultaneously with other Windows applications. 20 MB for an agent (without components and KMs) 50 MB for a console (without components and KMs) 148 MB for an agent (with all solution components and KMs) 116 MB for a console (with all solution components and KMs) PATROL Console 3.3.x or later PATROL Agent 3.3.x or later More memory is required to run PATROL with larger applications. More memory is required to run PATROL simultaneously with other Windows applications. PATROL Terminology The core components of PATROL include the PATROL Agent, which collects data, the KMs or Knowledge Modules, which contain the application-specific monitoring knowledge (they tell the agent what to monitor), and the PATROL Console (the user interface). The PATROL Agent and several Windows Knowledge Modules (KMs) are components of the PATROL for Microsoft Windows Servers product. The console is a separately licensed product. 4 PATROL for Microsoft Windows Servers v Reviewer s Guide
7 Management of Microsoft Windows Servers The console includes a tree view that you can expand to view the four levels of monitoring provided by PATROL (Figure 1 on page 5). Traditionally, under the PATROL main map, you can see these four monitoring levels: Server or Host (represented by the computer name) Application Class Instance Parameter Each object has a menu of actions (menu commands) that you can view by right-clicking the object in the tree or icon view. Annotated data points in PATROL are data points in a PATROL graph, represented by an asterisk, that provide additional details when an item is in an alarm state. One example is an annotated data point for peak CPU usage. By clicking on this annotated data point, you can see a list of the top ten processes that were running at the time the CPU usage peaked. Figure 1 PATROL window showing the expanded tree view with the four levels of monitoring. 5
8 Installing the Product Installing the Product For your evaluation, install PATROL from the CD. Before launching the install program, make sure to log into Windows with a user account that has local administrative privileges for the machine on which you are installing PATROL products. Note: Although you can use an existing Windows user account to install PATROL, BMC Software recommends that you create a separate Windows user account for PATROL. This account should be a member of the local administrators group on the server where PATROL is being installed. The minimum user rights that must be assigned for PATROL to execute tasks are as follows: act as part of OS debug programs increase quotas log on as service log on locally profile system performance replace a system token Note: Before attempting to view Microsoft Excel based reports in PATROL, please make sure you have Excel installed on the local machine. 1. Insert the PATROL for Windows Servers CD into the CD-ROM drive 2. The installation procedure begins automatically by using the Microsoft Windows auto-run functionality. Note: If the installation program does not start automatically, from the Start menu, choose Run, and type the following command: D:\Setup.exe where D is your CD-ROM drive. 3. Install console components, KMs, and PATROL Agent as discussed in the following section. 6 PATROL for Microsoft Windows Servers v Reviewer s Guide
9 Installing the Product To Install Console Components, Knowledge Modules, and PATROL Agent The installation procedures in this guide assume the product will be installed locally on a single computer that does not already have PATROL installed. For more advanced PATROL installations, including upgrades from previous versions and remote installations, please consult the PATROL for Microsoft Windows Servers Getting Started guide. Your first task is to decide which products to install on which machines. For evaluation purposes, you can install all components and products on a single test machine. In a production environment, you install the KMs and PATROL Agents on all computers to be managed (Managed Systems) and install the console components only on the few computers that will provide the PATROL user interface (Console Systems). By launching auto-run from a CD install, or by double-clicking on the setup.exe file, you can begin the install program. As it launches, it displays in a Web browser interface. 1. Click Next on the welcome screen. 2. Read the license agreement and select Accept, then click Next. Note: PATROL ships with a 30-day trial license. This license will expire in 30 days if you do not purchase the product and enter a permanent license key. 3. From the Select Type of Installation window, select Typical and click Next. Note: With a Typical installation, PATROL automatically selects the default port number of In the Specify Installation Directory window, enter the location where you want to install PATROL or accept the default directory and click Next. 5. From the Select System Roles window, select Console Systems and Managed System, then click Next. 6. Expand the PATROL Solutions for Microsoft Windows - QuickStart Packages tab and select Manage Microsoft Windows Servers and click Next. 7. Enter a valid Windows account log-in name with administrator privileges and then type the password twice as requested and click Next. 8. On the PATROL 3.x Product Directory window, specify a subdirectory location or accept the default directory and click Next. 7
10 Installing the Product 9. Select the option to start the PATROL Agent automatically, then click Next. 10. Review the installation summary screen, and click Start Install. 11. After successful installation, click Next. 12. To exit the install utility, click Finish. 13. Click OK, then Yes to close all browser windows. To Set Basic Configuration Complete the following steps to start monitoring and managing with PATROL in your environment: 1. From the Windows Start menu, select Programs => BMC PATROL => Developer Console. Note: You will need Developer Console authority to complete some of the configuration and customization tasks in this guide. If you only want to view PATROL data, you can use the Operator Console. To add the host (computer) that you want to monitor to the PATROL console, 2. Select Hosts => Add from the PATROL console main menu. 3. Next to Host Name, type the name of the local machine. 4. Type the Windows user name and type the password twice as requested. Note: The Interactive System Output Window is an optional feature that might be helpful. The Interactive System Output Window allows you to view real-time descriptions of PATROL Agent activity from the console. To activate, right-click on the computer (host) name in the PATROL tree view. Then, select Show System Output Window. 5. Click OK. Note: When you selected the Typical install option, the minimal set of monitoring parameters were automatically configured for you. However, to do some of the advanced functions in this reviewer s guide, you need to load additional KMs. 6. Within the PATROL console, select File => Load KM. 8 PATROL for Microsoft Windows Servers v Reviewer s Guide
11 Server Operating System Availability with Quick Value Statistics 7. Select the NT_LOAD.kml file, then click Open. Note: The NT_LOAD.kml is the most comprehensive (and the most resource intensive) of the KM files. This file is loaded for evaluation purposes so that you can see the full breadth of PATROL capability. In a production environment, the Typical install components may be sufficient for many servers. Save your KMs so that PATROL automatically loads the selected KMs the next time you start the PATROL Console. To do so, select File => Save KM from the PATROL main menu. You are now ready to monitor with PATROL. To immediately view data (instead of waiting for PATROL s next scheduled monitoring interval), 1. Right-click your computer s (host) name in the PATROL tree view (right under PATROL Main Map). 2. Select KM Commands => Utilities => Patrol => Force Discovery. Note: If you make a mistake, or later want to change the Windows user account used for PATROL, you can do this from the PATROL Console. Right-click on the computer (host) name in the PATROL tree view. Select Properties, then select the Security tab. Type a new user account and password with local administrative privileges. Click OK. For advanced features including notification, and enterprise-wide, consolidated, service reporting and event management contact your BMC Sales Representative for documentation on PATROL Operations Manager and PATROL Service Reporting. Server Operating System Availability with Quick Value Statistics The following table lists some of the statistics (parameters) available in PATROL to ensure Windows server availability. The items are listed in the order that they appear on the PATROL console. To view the PATROL tree view, 9
12 Server Operating System Availability with Quick Value Statistics 1. Expand the PATROL MainMap icon in the top left corner of the console. 2. Expand the computer name and then expand Windows Operating System. 3. To view data for any item represented in Table 2 on page 10, double-click the item in the tree view of the PATROL console. Table 2 How PATROL Ensures Server Availability (Part 1 of 3) Parameter Name by Application Class Health At A Glance Container NT_PERFMON KM Windows Operating System KM NT_CACHE CACcachCopyReadHitsPercent CACcachCopyReadsPerSec NT_COMPOSITES Application Class NT_CPU CPUprcrInterruptsPerSec CPUprcrPrivTimePercent CPUprcrProcessorTimePercent CPUprcrUserTimePercent NT_EVENTLOG NT_LOGICAL_DISKS LDldDiskQueueLength How PATROL ensures server availability This high level container includes a few of the most critical statistics you need to monitor on each server This KM is used to create new custom KMs from any existing set of Microsoft Performance Counters available on a server. This high level container includes all of the operating system application classes and parameters listed below and on the next few pages. The next two parameters monitor caching performance. the percentage of cache copy read requests A copy read is a file read operation that is satisfied by a memory copy from a cache page to the application s buffer. the frequency of reads from cache pages that involve a memory copy of the data from the cache to the application s buffer This application class is used to create new custom parameters by combining multiple parameters into a single alarm. See Combination Parameters on page 14. The next four parameters monitor CPU utilization. the number of device interrupts encountered by the processor per second An interrupt occurs when a device has completed a task or when it requires attention. the percentage of processor time spent in privileged mode in non-idle threads the percentage of time that a processor is busy executing the threads of a process Threads are units of work that make up a process. Consistently high numbers (greater than 75 percent) can indicate performance problems that can slow your system down. the percentage of CPU time currently being spent in user mode doing commands and tasks initiated by users This application class is used to monitor events in the Windows event logs. See Event Monitoring on page 17. The next four parameters monitor logical disk availability. the number of requests outstanding on the disk, including requests currently in service 10 PATROL for Microsoft Windows Servers v Reviewer s Guide
13 Server Operating System Availability with Quick Value Statistics Table 2 How PATROL Ensures Server Availability (Part 2 of 3) Parameter Name by Application Class LDldDiskTimePercent LDldFreeMegabytes LDldFreeSpacePercent NT_MEMORY MEMmemAvailableBytes MEMmemPageFaultsPerSec MEMmemPagesPerSec NT_NETWORK NETniPktsOutboundErrors NETniPcktsPerSec NT_PAGEFILE PAGEpgUsagePercent NT_PHYSICAL_DISKS PDpdDiskQueueLength PDpdDiskTimePercent NT_PROCESS PROCPageFaultsPerSec PROCPageFileBytes PROCProcessorTimePercent PROCStatus How PATROL ensures server availability the percentage of elapsed time that the selected disk drive is busy servicing read or write requests the amount of unused space on the disk drive in megabytes (MB) the percentage of free space available on the selected logical disk drive Automated Recovery: PATROL can automatically clear the temp directory when LdldFreeSpacePercent enters an alarm state. The next three parameters monitor memory availability. the number of megabytes of physical memory currently available to processes (is not directly related to the amount of physical memory installed in your server) the number of hard and soft page faults in the processor the number of hard page faults for the processor; the value often determines whether or not your system needs more RAM The next two parameters monitor TCP/IP network traffic. the number of outbound packets that could not be sent as a result of errors the rate that packets are sent and received on the network The next parameter monitors page file use. the amount of the page file currently in use The next two parameters monitor physical disk availability. the number of requests outstanding on the disk at the time the performance data is collected the percentage of elapsed time that the disk spends servicing read or write requests Good disk performance enhances virtual memory performance and reduces the elapsed time required to load programs that perform a large number of I/O requests. The next four parameters are displayed after you configure specific processes for monitoring. See Process Monitoring on page 19. the number of page faults per second by the threads executing in this process A page fault occurs when a thread refers to a virtual memory page that is not in its working set in main memory. the current number of bytes this process has used in the paging file the percentage of elapsed time the selected process used to execute instructions Automated Recovery: PATROL can automatically kill a process when PROCProcessorTimePercent is in alarm for a specified amount of time. the status of the associated process A value of 0 indicates the process is running. A value of 1 indicates that the parameter is not running. 11
14 Server Operating System Availability with Quick Value Statistics Table 2 How PATROL Ensures Server Availability (Part 3 of 3) Parameter Name by Application Class NT_REGISTRY_GROUP Total_UpdateFrequency NT_SECURITY SECsvrErrorsAccessPermissions SECsvrErrorsGrantedAccess SECsvrErrorsLogon NT_SERVER SVRsvrServerSessions SVRsvrSessionsErroredOut NT_SERVICES ServiceStatus NT_SYSTEM SYSobjProcesses SYSobjThreads SYSsysSystemUpTime How PATROL ensures server availability The next parameter is displayed after you configure specific registry keys for monitoring. See Registry Monitoring on page 20. tracks all update activities of the keys in the group The next three parameters monitor file access security. the number of times people attempted to open files and failed because of insufficient permissions to the file A high number of failures can indicate that someone is trying to randomly access files that are not adequately protected. the number of times people attempted to open files and were denied A high number of denied-access errors can indicate that someone is attempting to access files without the correct authorization. the number of failed logon attempts on the server A high number of failed logon attempts can indicate that someone is trying to guess passwords, possibly using a password-cracking program, which could pose a breach in the security of the server. The next two parameters monitor server process activity. monitors the number of sessions currently active in the server monitors the number of sessions that have been closed because of unexpected error conditions This value indicates how frequently network problems are causing dropped sessions on the server. The next parameter monitors service availability. indicates whether a service is up or down Automated Recovery: PATROL can automatically restart a failed service if it has a startup type of automatic. The next three parameters monitor system performance. the number of processes in the computer at the time of data collection the number of processes in the computer at the time of data collection the time, in seconds, that the computer has been up and running 12 PATROL for Microsoft Windows Servers v Reviewer s Guide
15 Advanced Features and Functionality Advanced Features and Functionality The following sections highlight some key features you will want to review in your evaluation of PATROL for Microsoft Windows Servers. Alarm Thresholds PATROL monitors server activity and sends alerts to the PATROL console based on predefined threshold ranges. This procedure uses an example to show you how to change these ranges to settings specific to your organization. 1. Switch from the desktop to the KM tab on the console (tabs are at the bottom of the tree view). 2. Once in the KM view, expand the Knowledge Module icon, then expand the Application Classes folder. 3. Expand the NT_LOGICAL_DISKS application class. 4. Expand the Global folder. 5. Expand the Parameters folder. 6. For this example, double-click on the LDldFreeSpacePercent parameter. The Parameter Properties are displayed. 7. Select the Alarm Ranges tab. Alarm 1 is for alarms. Alarm 2 is for warnings. You can select Enable for either or both alarm ranges and set the minimum and maximum ranges for when an alarm should be sent to the console. Notice that out-of-the-box PATROL gives you a warning when your free space gets below 10 percent. Then it will go into alarm when the free space is below 5 percent. 13
16 Advanced Features and Functionality Automated Recovery Actions PATROL includes automated methods to recover from common failures. To view the defaults for the automatic recovery action that automatically clears a temp directory when the disk gets full: 1. Return to the Desktop tab, right-click the computer (host) name in the PATROL tree view, and select KM Commands => Configure Recovery Actions. 2. Select Clean Temp Directory and click Accept. 3. Select the NT_LOGICAL_DISKS application class and click Edit. 4. Select the mode Run Attended. This setting lets you acknowledge all recovery actions before they take place. 5. Click Accept. 6. Click Close twice to exit. To activate the recovery action: 1. Right-click the NT_LOGICAL_DISKS icon, and select KM Commands => Edit Recovery Action List. 2. Select Include All, then click Apply. 3. Click Close. Combination Parameters With PATROL, you can combine several individual parameters into a single parameter (composite parameter) to see how events are correlated. For example, you can create a composite parameter to alarm only when both CPU and memory exceed predefined thresholds. To create a composite parameter, 1. Right-click on the NT_CompositesColl application class, and select KM Commands => Create Expressions. 2. Create a name for the new parameter. For this example, type MemCPU, and click Create. 14 PATROL for Microsoft Windows Servers v Reviewer s Guide
17 Advanced Features and Functionality 3. On the initial Edit screen, accept the default values and click Wizard. 4. Select Patrol KM parameter and click Continue. 5. Select NT_CPU and click Continue. 6. Select CPU_Total and click Continue. 7. Select CPUprcrProcessorTimePercent and click Continue. 8. Select Greater than or equal to and click Continue. 9. Select Constant value and click Continue. 10. Type 10, and click Continue. You have now finished the first half of the procedure to set the alarm when CPU utilization exceeds 10 percent. The following portion of the procedure guides you through setting the limit for available bytes. 11. Click More, select And, and click Continue. 12. Select Patrol KM parameter and click Continue. 13. Select NT_MEMORY and click Continue. 14. Select MEMmemAvailableBytes and click Continue. 15. Select Less than or equal to and click Continue. 16. Select Constant value and click Continue. 17. Type 100 and click Continue. 18. Exit the remaining open windows by clicking the appropriate buttons in this sequence: Done, Done, Save, OK, and Done. You now have a new object that alerts only when both criteria are met CPU greater than 10 percent and available bytes less than 100 MB. 15
18 Advanced Features and Functionality Custom Views and Graphs It may be useful to create custom views that represent domains, departments, or other logical groupings of servers and parameters in the PATROL console. To create a custom folder: 1. Select File => New => Folder from the PATROL main menu. 2. Give your custom folder a name and a title. 3. Click Browse and select an icon for the custom folder. 4. Click Open, then click OK. The new folder is displayed below the PATROL Main Map icon in the PATROL tree view. 5. To move specific servers to this new folder, drag and drop server icons into the folder. You can also create custom graphs of the parameters that are most important to your organization. 1. Select File => New => Graph Folder. 2. Give your custom graph a name and a title. 3. Click Browse and select an icon for the custom graph. 4. Click Open, then click OK. The new custom graph is displayed below the custom folder in the PATROL tree view. 5. To move specific parameters to this graph, drag and drop parameter icons into the graph. You can include multiple parameters in a single graph. 16 PATROL for Microsoft Windows Servers v Reviewer s Guide
19 Advanced Features and Functionality Event Monitoring By default, PATROL for Microsoft Windows Servers monitors all Microsoft event logs including System Log Security Log Application Log DNS Server Directory Service File Replication Service PATROL can monitor all event levels including informational, warning, and error. However by default PATROL alarms only on errors. PATROL, also by default, forwards all Windows error events to the PATROL event window. You can forward additional filtered events to the PATROL console based on event source, event type, text strings, users, event categories, and event IDs. To view the PATROL event window, select Tools => Event Manager from the PATROL main menu. For this evaluation, use the example of monitoring the Windows application log for a specific event source. To create a new monitoring item (instance) that represents a particular source in the Windows application log: 1. Double-click the NT_EVENTLOG application class in the tree view of the PATROL console. 2. Right-click the Application icon in the display pane on the right. 3. Select KM Commands => Instances => Defined by Template. 4. Create a name for your new monitored object and type it in the Instance Name box (for example, type MyEvents). 5. Select Create, then click Apply. A screen is displayed where you can select different properties for event filtering. 6. In the From Sources drop-down box, select an event source. For this example, select DrWatson and select Add next to the source. 7. Change the annotation option to Yes so that any events that are found will include the event details when they are forwarded to the PATROL event window. 17
20 Advanced Features and Functionality 8. Click Apply and then click Close twice to exit. To send additional Windows events to the PATROL Event Manager (PEM) window in the PATROL console: 1. Double-click on the NT_EVENTLOG application class in the tree view of the PATROL console. 2. Right-click the Application icon in the display pane on the right. 3. Select KM Commands => Utilities => Forward NT Events to PEM. 4. In the resulting window, select Yes to choose Forward filtered NT events from the Application Log to PEM. 5. Click Apply, then click Close to exit. Microsoft Performance Counters and PATROL Monitoring Microsoft Windows NT and Microsoft Windows 2000 provide hundreds of performance monitor counters that collect various data about the operating system. By default, PATROL includes the industry-typical performance-monitor counters. If your organization has interest in additional counters, you can add them by using the PATROL Perfmon Wizard tool in the PATROL Console - NT_PERFMON. To add Microsoft performance counters, 1. Within the PATROL Console, select File => Load KM. 2. Select the NT_PERFMON.kml file, then click Open. Within a few minutes, NT_PERFMON will display in the PATROL tree view. 3. Right-click on the NT_PERFMON application class icon and select KM commands. 4. Select Update PerfMon Parameters. 5. Type a User ID and Password with administrative rights for the server you want to monitor, and click Next. A list of available performance groups is displayed. 18 PATROL for Microsoft Windows Servers v Reviewer s Guide
21 Advanced Features and Functionality 6. Select a performance group (for example, Internet Information Services Global, if it is listed). 7. Select the Create PATROL Application, then click Select. A list of available counters in this performance group is displayed on the left. 8. Select a performance counter such as File Cache Hits. 9. Select Add and click the Add/Delete/Explain. The counter now appears in the selected counters list on the right. 10. Repeat these steps for each counter of interest in this performance-monitoring group. 11. When you are finished adding counters, click Done, click Finish, and then click OK on the resulting summary screen. The new items you added to monitoring will be displayed under the NT_PERFMON application class. To load the new KM for monitoring by the PATROL console, 1. From the main menu on the PATROL console, select File => Load KM. 2. In the File Type box, change the kml files (*.kml) default to KmFiles (*.km). 3. From the Look in drop-down list, find the lib folder, then open the Knowledge folder. 4. Select the new KM that has a name starting with PERF, such as PERF_InetInfoSvcGbl.km. 5. Click Open. Process Monitoring PATROL monitors processes out of the box by reporting on the top ten processes consuming resources (PROCTopProcs). You can also customize PATROL to view continuous historic usage for a specific process or group of processes. 19
22 Advanced Features and Functionality To monitor specific processes, 1. Right-click on the NT_PROCESS application class in the PATROL tree view. 2. Select KM Commands => Process Monitoring. 3. From the list of running processes listed on the left, select a process that you want to monitor. Note: If the process you want to monitor is not currently running, type the exact process name in the Specify a Process Name field. 4. Next to action, select Add and then click Apply. 5. On the Select Process with Argument List, keep the default values and click Apply. 6. Click Close twice to exit. Registry Monitoring PATROL can monitor for any changes in the Windows registry on the local machine. This ability alerts administrators to changes that could negatively affect the performance of their servers. To begin monitoring a group of registry keys, you will need to create a registry group monitoring object (instance) in PATROL. To create a registry group monitoring object, 1. Right-click the NT_REGISTRY application, and choose KM Commands => Define Registry Group. 2. Create a name for your new monitored object and type it in the Instance Name box. 3. Select Create and then click Apply. 4. Select the item that you want to monitor from the Select Root Key drop-down list (for example, HKEY_LOCAL_MACHINE to capture all registry changes on the local machine). 5. Leave all the other options in their default states. 6. Click Apply, then click Close twice to exit. 20 PATROL for Microsoft Windows Servers v Reviewer s Guide
23 Advanced Features and Functionality Services Monitoring By default, PATROL monitors availability of all services that are running on the managed server. This functionality helps administrators ensure the availability of their critical applications. You can customize this list of monitored services to add services that are not yet running or to exclude services that are of less concern. Also, PATROL will restart any services that go down if they are configured to start automatically. In addition to the default availability monitoring, you can customize PATROL to monitor how much memory and CPU a service consumes. To monitor memory and CPU for a specific service, 1. Right-click the NT_SERVICES application and choose KM Commands => Service Executable Monitoring. 2. Select the name of the service that you wish to include for more detailed monitoring. 3. Select Include Selected. 4. Click Apply and click Close. Text Log Monitoring PATROL includes the ability to monitor custom application logs or any text file for file size, for file growth, and for a particular text string found in the log. If the log file grows too large, PATROL also can automatically back up and clear the log file. To monitor a new text file: 1. Use Microsoft Windows Wordpad to create a text file with the letters XYZ in it and save it as test.txt. 2. Double-click on the NT_EVENTLOG application class in the tree view of the PATROL console. 3. Right-click on the TextLogs icon in the display pane on the right. 4. Select KM Commands => Edit List of Monitored Files. 5. Select Add and click Apply. 21
24 Advanced Features and Functionality 6. Type in the full name and path of the file that you want to monitor (for example, C:test.txt) in the File Name box. 7. Type the maximum acceptable size for this file in Size Limit (Bytes). Note: PATROL alarms if the file grows beyond the size that you set. 8. For the automated recovery action, you can leave the default, No Action, selected for now. 9. Click Apply, then Accept and Close to exit. To search for a specific text string in the log file, go back to the TextLogs icon in the display panel. 1. Right-click on TextLogs, and select KM Commands => Edit Search Template. 2. Select Add, and click Apply. 3. Create a name for the new template you are creating (for example, FindXYZ), and type XYZ for the Search String. 4. Select the name of the file to search for in the text string (c:test.txt). 5. Change the Alert Severity to 3 Alarm, then click Apply. 6. On the resulting Confirm screen, click Accept. 7. Click Cancel to exit. You will now have a PATROL alert each time the text string XYZ is found in the sample log file. 22 PATROL for Microsoft Windows Servers v Reviewer s Guide
25 Environment-Specific Functionality Environment-Specific Functionality The following sections give information about functionality that is available for PATROL for Microsoft Servers under specific environments. Active Directory/Domain Management PATROL for Microsoft Windows Servers ensures the connectivity, replication, and overall health of the active directory. The PATROL solution includes monitoring the local Domain Controller directory Local Security Authority Subsystem (LSASS) process Lightweight Directory Access Protocol (LDAP) connectivity Domain Name System (DNS) In addition, PATROL uses synthetic transactions, performance counters, and Windows Management Instrumentation (WMI) to ensure the availability of the customer's Active Directory. PATROL provides Dynamic Host Configuration Protocol (DHCP) and Domain Controller monitoring to help administrators track domain usage. For example, you can easily monitor DHCP lease usage to determine in advance when you will need to allocate more addresses on particular DHCP servers. Cluster/Network Load Balancing Management PATROL monitors and manages processes, network status, graphical views of dependencies, and cluster health. This capability monitors the health of the cluster services and cluster-resource status in addition to monitoring cluster uptime, cluster-specific errors, resource types, and cluster-specific connectivity. The PATROL for Windows Servers product monitors, manages, and balances the TCP/IP connection loads across clusters and nodes, improving network throughput. PATROL for Microsoft Network Load Balancing (NLB) allows you to obtain the following information: status of the NLB cluster status of nodes within the NLB cluster cluster-related events cluster performance data 23
26 Microsoft Certification Datacenter Server Management PATROL monitors and manages the advanced features in Microsoft Windows 2000 Datacenter Server including clusters and job objects, ensuring a highly manageable, enterprise-computing platform. BMC Software has worked closely with hardware vendors to ensure that PATROL maximizes customer investments on the Microsoft Windows 2000 Datacenter Server platform. In addition, PATROL for Microsoft Windows Servers has earned Microsoft certification on the Datacenter Platform. The job-object monitoring that PATROL for Microsoft Windows Servers performs includes monitoring process control service alarming when job objects are created or control limits are changed monitoring when a process tried to change its priority or affinity alarming when applications are shut down or crash due to violating a process-control limit Microsoft Certification BMC Software has earned Microsoft's approval to carry the Certified for Microsoft Windows 2000 Server logo on BMC Software's PATROL for Microsoft Windows Servers. BMC Software was the first enterprise systems management vendor to earn this certification for Microsoft Windows 2000 Servers. Certification assures our customers that PATROL will run predictably on Microsoft Windows 2000 Servers, Advanced Servers and Datacenter Servers, thereby reducing the overall time and cost spent implementing Microsoft Windows MTS/COM+ Management PATROL monitors and manages Microsoft Transaction Server (MTS) by monitoring processes, transactions, and events, and helping to manage multiprocessing services for higher scalability and availability. The PATROL for Windows Servers product provides functionality to monitor the run-time environment for Microsoft Transaction Server (MTS) on a Microsoft Windows NT 4.0 server and Microsoft COM+ (COM+) on a Microsoft Windows 2000 Server. 24 PATROL for Microsoft Windows Servers v Reviewer s Guide
27 MSMQ Management The PATROL for Microsoft COM+ product performs the following actions for Microsoft Windows 2000 servers: monitors the COM+ run-time environment monitors the status of COM+ applications monitors Microsoft Windows 2000 log events related to the Microsoft Distributed Transaction Coordinator (MS DTC) service and monitors the MS DTC service status manages the MS DTC service by providing the capability to start or stop the service monitors Microsoft Windows 2000 COM+ log events MSMQ Management PATROL monitoring of Microsoft Message Queue (MSMQ) enables administrators to monitor and manage sessions, messages, and queues, thereby ensuring the delivery of messages. The Microsoft MSMQ round-trip time metric tracks round-trip message time of each use. Reporting PATROL provides easy-to-use, canned reports on performance and availability of Microsoft Servers and applications. You can easily generate customizable, business reports using Microsoft Excel. For more advanced, enterprise-wide summary reports, you can install the PATROL Service Reporting component. 25
28 Helping You Maintain Advantage Helping You Maintain Advantage BMC Software Professional Services helps your company maintain its competitive advantage through a comprehensive suite of services that includes service level management consulting, installation, implementation, configuration, and customization. Our professional services and education offerings are designed to ensure the ongoing availability of critical business applications, maximize product potential, reduce project risk, deliver IT value to your business, and improve your operations. For more information about BMC Software Professional Services, visit About BMC Software BMC Software, Inc. [NYSE: BMC], is the leading provider of enterprise management solutions. Through its Assuring Business Availability approach, BMC Software delivers control over infrastructure management costs, control of market advantage and differentiation via service management, and growth of business value with solutions for business optimization. BMC Software is a member of the S&P 500, with fiscal year 2001 revenues exceeding $1.5 billion and offices worldwide. For more information, please visit the BMC Software Web site at 26 PATROL for Microsoft Windows Servers v Reviewer s Guide
29 About BMC Software 27
30 For more information visit BMC Software on the Web at BMC Software, the BMC Software logos and all other BMC Software product or service names are registered trademarks or trademarks of BMC Software, Inc. All other registered trademarks or trademarks belong to their respective companies. 2002, BMC Software, Inc. All rights reserved /02
3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
Active Directory Monitoring With PATROL
Active Directory Monitoring With PATROL Contents What is Active Directory?...1 Why Monitor?...1 Active Directory and PATROL...2 Critical Active Directory Components to Monitor...3 Address Book...3 Domain
13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES
LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Dell Active Administrator 8.0
What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,
5nine Cloud Monitor for Hyper-V
5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication... 9 5nine Cloud Monitor for Hyper-V
Desktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part
Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide
Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide Contents Introduction...1 Establishing a Baseline...1 The Operating System...1 CPU...2 Memory...4 Network...7 Disk...8
User's Guide - Beta 1 Draft
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Cluster Server Agent vnext User's Guide - Beta 1 Draft SC27-2316-05 IBM Tivoli Composite Application Manager for Microsoft
Network Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.
1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you
Crystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
Silect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Nexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
MGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
IXP120 Alarm Monitor Utility
IXP120 Alarm Monitor Utility SOFTWARE MANUAL Scope of Document This document provides a brief overview of the Alarm Monitor Utility and its interaction with the IXP120 Software. Document Conventions We
NOTE: You may want to choose the Word Wrap option from Notepad Edit menu to make this text more readable.
------------------ Interactions/Gas Exchange Version 1.2, CD Version Copyright 2003 by John Wiley & Sons, Inc. All rights reserved. ------------------ NOTE: You may want to choose the Word Wrap option
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
CA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Configuration Guide for IIS Server Monitoring iis v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change
CentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
Enterprise Server. Application Sentinel for SQL Server Installation and Configuration Guide. Application Sentinel 2.0 and Higher
Enterprise Server Application Sentinel for SQL Server Installation and Configuration Guide Application Sentinel 2.0 and Higher August 2004 Printed in USA 3832 1097 000 . Enterprise Server Application Sentinel
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
RSView 32 ACTIVE DISPLAY SYSTEM GETTING RESULTS GUIDE. PUBLICATION VW32AD-GR001E-EN-E July 2011 Supersedes Publication VW32AD-GR001D-EN-E
RSView 32 ACTIVE DISPLAY SYSTEM GETTING RESULTS GUIDE PUBLICATION VW32AD-GR001E-EN-E July 2011 Supersedes Publication VW32AD-GR001D-EN-E Contact Rockwell Copyright Notice Trademark Notices Customer Support
with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.
with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
Citrix EdgeSight for Load Testing User s Guide. Citrx EdgeSight for Load Testing 2.7
Citrix EdgeSight for Load Testing User s Guide Citrx EdgeSight for Load Testing 2.7 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.
User's Guide - Beta 1 Draft
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent vnext User's Guide - Beta 1 Draft SC27-2319-05 IBM Tivoli Composite Application Manager for Microsoft
Server & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
HP Server Management Packs for Microsoft System Center Essentials User Guide
HP Server Management Packs for Microsoft System Center Essentials User Guide Part Number 460344-001 September 2007 (First Edition) Copyright 2007 Hewlett-Packard Development Company, L.P. The information
NTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services
StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started
StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started Contents StrikeRisk v6.0 Introduction 1/1 1 Installing StrikeRisk System requirements Installing StrikeRisk Installation troubleshooting
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide
HP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual
GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.
Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Instruction Bulletin Retain for future use. POWERLOGIC SMS 4.0, SU1 System Manager Software Setup Guide
Instruction Bulletin Retain for future use. POWERLOGIC SMS 4.0, SU1 System Manager Software Setup Guide HAZARD CATEGORIES AND SPECIAL SYMBOLS Read these instructions carefully and look at the equipment
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
FactoryTalk Gateway Getting Results Guide
Performance and Visibility FactoryTalk Gateway Getting Results Guide Getting Results Guide Table of contents Chapter 1 Introduction Intended audience... 7 Where to find additional information... 7 Help...
Trend ScanMail. for Microsoft Exchange. Quick Start Guide
Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
Oracle Enterprise Manager. Description. Versions Supported
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft SQL Server Release 10 (4.0.3.1.0) E14811-03 June 2009 This document provides a brief description about the Oracle System
Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
Features - Microsoft Data Protection Manager
Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP
FIGURE 33.5. Selecting properties for the event log.
1358 CHAPTER 33 Logging and Debugging Customizing the Event Log The properties of an event log can be configured. In Event Viewer, the properties of a log are defined by general characteristics: log path,
Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide
Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey
GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
Planning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
Sage Timberline Enterprise Installation and Maintenance Guide
Sage Timberline Enterprise Installation and Maintenance Guide NOTICE This document and the Sage Timberline Enterprise software may be used only in accordance with the accompanying Sage Timberline Enterprise
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
12 NETWORK MANAGEMENT
12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
VMware for Bosch VMS. en Software Manual
VMware for Bosch VMS en Software Manual VMware for Bosch VMS Table of Contents en 3 Table of contents 1 Introduction 4 1.1 Restrictions 4 2 Overview 5 3 Installing and configuring ESXi server 6 3.1 Installing
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Non-ThinManager Components
Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about their
Citrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements.
ServerView User s Guide (For Windows Agent) Areas Covered - Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView
