Monitoring Microsoft Exchange to Improve Performance and Availability

Size: px
Start display at page:

Download "Monitoring Microsoft Exchange to Improve Performance and Availability"

Transcription

1 Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in traffic, the number and size of attachments, spam, and other factors, organizations need to provide high levels of service and availability in their systems. Any shortcomings in response time can impact business. Losing access for even an hour can significantly affect an organization s bottom line. Concord s ehealth Application Insight Module (AIM) for Microsoft Exchange enables IT operators to monitor the performance and availability of their Microsoft Exchange servers and their underlying systems. The Exchange AIM extends Concord s SystemEDGE agent to actively manage and monitor the Microsoft Exchange Server. It provides standard, real-time snapshots of Exchange performance, availability, configuration, and virus scanning activity. Accessible anytime and anywhere from a Web browser, these status snapshots are ideal for troubleshooting your systems and tracking the behavior of critical Exchange servers. The AIM also verifies that all the components of the Exchange application service are working and responding within service thresholds. ehealth AIM for Microsoft Exchange integrates with Concord s ehealth Suite to deliver end-to-end, real-time content with historical context to meet growing business needs. Additionally, users can integrate with ehealth Live Health for real-time detection of performance problems, potential outages, and delay for the Exchange application as well as the underlying system and network infrastructure. The Exchange AIM: Monitoring Your Critical Services If your is slow, your business is slow. The ehealth AIM for Microsoft Exchange continuously monitors Microsoft Exchange services and system resources, allowing you to optimize Exchange application and server performance. This results in the following benefits: Deliver real-time problem detection. Provide self-healing, corrective action. Identify potential viruses. Achieve intelligent capacity planning.

2 Deliver Real-Time Problem Detection Exchange problems often start off small. They may appear, at first, as unexpected peaks in traffic at the same time each day. Over time they may begin to affect the amount of disk space available on your server and the size and length of the queues. They may even impact system memory and gradually affect overall capacity. Before long these problems have compromised server performance and limited your ability to meet the daily requirements of the business. Taking control of your network requires an automated monitoring solution with continuous, around-the-clock, 24x7 coverage. You can set thresholds unique to your environment and generate traps and alarms notifying you via or pager when those thresholds are violated. Concord s solution provides monitoring capabilities that allow you to see peaks in CPU, disk, and memory usage as well as various Exchange metrics before they impact the performance of your mission-critical Exchange servers. Controlling events ensures that your network is properly aligned with and fully capable of supporting your business needs. 100GB capacity. Of the 63GB used, the Private Store is using 54GB and the Public Store is using 9GB. Figure 1. Disk Usage The Footprint report also provides Exchange CPU and memory utilization over the last SystemEDGE measurement interval. This snapshot report can be used as a means of troubleshooting. In this case, Exchange is currently using 60% of the CPU. Of the available physical memory (1GB), Exchange is currently using 72%. The Exchange Footprint The Footprint and FootPrint Details Reports (shown in Figure 1 and Figure 2) are both available through AdvantEDGE View and provide a current snapshot of system resources consumed by the Exchange application. Footprint information is presented at varying levels of detail, ranging from summary values to those for individual folders in the Exchange store. The Exchange AIM monitors and reports back on Exchange CPU, memory, and disk resource consumption, and helps you to detect and correct resource exhaustion due to viruses, security incidents, and hardware failures. In Disk Usage, you can see that Exchange is consuming 63GB of the overall disk s Figure 2. Footprint Details 2

3 Analysis of footprint information is useful for anticipating and avoiding bottlenecks in CPU, memory, or disk usage that may impact Exchange performance. To see the total system CPU percentage in use for a query period and the percentage of time spent in idle, user, system, and wait modes, run an AdvantEDGE View CPU Statistics Query (shown in Figure 3). This report shows the overall performance statistics for each CPU in a server. Figure 3 shows that the CPU is idle 48% of the time, with users consuming 50% of available resources, and system processes consuming 2%. Figure 3. CPU Statistics Query Monitoring Variables in Real Time Proactively monitoring your business extends to services where users require continuous availability and high performance. AdvantEDGE View provides templates that you can use and customize to configure performance monitoring for your Exchange servers. The Exchange AIM, in association with SystemEDGE, can monitor, alarm, and report on the following variables: CPU Utilization, Memory and Disk Space. The AIM can identify CPU, disk, or memory shortages that can affect application performance. Information Store. This store is comprised of public folder messages (public store) and user mailboxes (private store). These stores can grow up to 16 GB for the Exchange 2000/2003 Standard edition or up to 16 TB for the Enterprise edition. Performance problems, including mail service stoppages, occur when the when these stores exceed their maximum size or when they fill the disk capacity where they reside. Message Queues. These queues contain messages waiting to be processed or delivered. You can configure the AIM to monitor these queues to watch for increasing sizes that exceed specified thresholds. Unusual changes in the size of a queue can indicate a problem with sending or receiving of , as well as potential malicious activity such as spamming or viruses. Threads. Every remote procedure call (RPC) process that is initiated in Exchange creates a thread. If the number of threads exceeds the configured limit, Exchange performance can suffer. SMTP. The Simple Mail Transfer Protocol server is an inter-server mail transport service. The Exchange AIM provides over 75 variables associated with SMTP server metrics that can be monitored using SystemEDGE. These metrics include badmail (improperly formatted mail), message counts, connection counts, categorizerrelated information, LDAP information, and delivery status notification (DSN), indicating that messages cannot be delivered. Log File Monitoring. SystemEDGE can monitor any ASCII-based log files for user-specified patterns such as error or warning messages. When a match occurs, SystemEDGE can send a trap and/or run a script or program to take corrective action or notify IT personnel. Windows Events. SystemEDGE can monitor the NT System, Application, and Security event logs for a user-specified string or a specific event ID. When a match occurs, SystemEDGE can send traps and/or notifications. In Exchange, examples of these dedicated NT events could include data write errors or data read errors, service failures, excessive virtual memory fragmentation, and space management events which indicate that a store has reached a maximum size. Directory Services Cache, DS Proxy. These variables help determine how effectively Exchange is caching information that is frequently queried from Active Directory. If the number of cache hits is 3

4 low relative to the number of LDAP searches performed, the server may be imposing an excessive load on the Active Directory server. ehealth Live Exceptions Profiles ehealth offers several Live Health profiles that you can use to monitor your Exchange resources for real-time performance degradations relating to delay, failure, and unusual workload problems. Live Health can raise alarms and notify IT personnel whenever a problem begins with your Exchange resources. Provide Self-Healing, Corrective Action To automate your Exchange environment, the Exchange AIM works with SystemEDGE to identify system and application problems in real-time and activate scripts to perform corrective actions. SystemEDGE s self-healing capability ensures that your systems and applications will continue to provide business services without fail. SystemEDGE runs specific commands or scripts when real-time problems are detected, such as: Restarting failed processes and services Sending SNMP traps to third party tools, allowing you to preserve your investment in your existing solutions Identify Potential Viruses New viruses emerge constantly. Many of these can defeat your existing virus detection software and overwhelm your Exchange server. Most Internet worms and viruses exhibit a pattern of behavior that typically results in substantial increases in the amounts of and Internet traffic. Rapid increases in the message queues and message traffic are good early indicators of a virus outbreak. The AIM provides information that allows these conditions to be detected. With System-EDGE s monitoring and action script capabilities, you can configure various ways to notify IT staff immediately before a virus spreads across your organization. To identify potential virus activity, you can set up monitoring for the following three variables: 1) SMTP connections. Many viruses and worms move through the Internet and corporate networks using SMTP, the protocol used for sending and Rebooting a system upon failure Removing core files and cleaning up full file systems Stopping CPU-intensive processes when CPU utilization reaches peaks levels Logging out unauthorized users SystemEDGE includes a pair of out-of-the-box applications (restartproc.exe and restartsvc.exe) that can restart a Windows process or service. SystemEDGE also allows you to leverage scripts and applications that you have developed internally in support of your Exchange processes. receiving in data networks, as their transport mechanism. The AIM can monitor and report the total number of active SMTP connections. A substantial and rapid increase in the number of new SMTP connections could indicate virus or worm attack and warrants further investigation. 2) SMTP queues. During message categorization and delivery, the advanced queuing engine sends all outbound mail through the SMTP queues of an SMTP virtual server. Viruses, spammers, DNS problems and the like can cause hundreds, sometimes thousands of s to fill the SMTP queues. The AIM can monitor queue lengths and report on unusual message accumulation occurring in the SMTP queues. If there is a sudden and unusual increase in queue sizes, a worm or virus may be to blame. 4

5 3) Non-delivery reports (NDRs). A substantial growth in the number of undeliverable to addresses that are not local often indicates that external, unknown clients are attempting to use to gain entry to your network. If the recipient address cannot be resolved, Exchange sends an NDR to the originator of the message. If the originator is a fake address, the SMTP retry queues could fill with undeliverable NDRs, impacting the performance of your Exchange server. The AIM reports on the number of NDRs on your network, which can help detect attacks or intrusion attempts. Error conditions that may cause NDRs include: Local address could not be found Forwarding loop detected Ambiguous address Illegal address At-a-Glance Reports for Virus Monitoring ehealth Release 5.7 has an At-a-Glance Report for Exchange Virus information that shows the virus scanning activity for your server. It provides information about the number of messages and folders that have been scanned, as well as details about the messages that have been cleaned and quarantined due to viruses. Figure 4 shows the Messages Processed and Messages charts of the Ata-Glance report. These samples indicate that over the report period, the Exchange server processed anywhere from 20 to 200 or more messages every five minutes, and at times, a very small number (0.035 messages) were cleaned of viruses. This report helps to baseline the typical virus processing activity of the Exchange server and identify changes or increases in virus cleaning or quarantines. If you observe a large increase in the ratio of cleaned and/or quarantined messages and the total messages processed, you may be encountering malicious attacks on the network. Other charts on a virus At-a-Glance report include: Files Scanned the total number of files (usually attachments) scanned for viruses. Files the total number of files cleaned or quarantined as a result of suspected viruses. Figure 4. Exchange Virus Info At-a-Glance Report Scanned Background the total number of messages and folders re-scanned in the background, usually following a virus update. Queue Length the length of the virus scanning queue, which holds requests for virus scanning. Queues lengths are typically zero or 1 because requests are processed very quickly. Queue lengths greater than 1 usually indicate a performance problem for the scanning software. Figure 5 shows a sample Queue Length chart where most of the activity is normal; a significant spike on March 9 that may indicate a problem for the virus software. Figure 5. Virus Scan Queue Length 5

6 Achieve Intelligent Capacity Planning In association with ehealth, the Exchange AIM and SystemEDGE deliver intelligent capacity planning data for your Exchange servers. By understanding how resources are being used and by whom, you can forecast your resource needs and identify when you may run out of capacity. With this information, you can make informed decisions about capacity requirements based on current trends as well as anticipated changes. Starting with a System Health report, you can leverage the Health Index charts and Exceptions reports to identify where the server hardware may be having capacity problems now. These charts can show you whether your servers are encountering CPU, memory, disk, and bandwidth issues. Schedule System Health reports to run daily and investigate problems reported on these charts. The Health report also includes optional supplemental reports called Capacity Projection and Capacity Provisioning which you can use to forecast growth based on the historical activity of your servers. These reports project memory, CPU, disk, and partition utilization to help you plan for additional system resources and future capital purchases. You should schedule these reports to run at the beginning of the month to review the previous month s activity. You can also use Trend Reports to examine Exchange capacity performance in detail. The AIM monitors many key variables that are critical for Exchange capacity planning such as: CPU Usage, Disk Space, Memory Number of users SMTP messages You could also run reports to review queue sizes, CPU utilization, or virus scanning activity over the past few months. Trend reports help you to visualize the activity so that you can identify when peaks in activity occur and baseline the overall performance history. For example, you might want to review a Trend report for the total disk space consumed by Exchange to determine how disk space consumption is changing over time. This can help you to plan for capital purchases such as larger disk drives for the Exchange servers. Figure 6 shows a Trend report for disk usage for an Exchange server over the past six months. (Although not shown in the report, the server has 200GB of total disk space.) The report shows that disk space has grown steadily from 100 GB to almost 120 GB, or 20% overall growth. For the 200 GB server, this indicates that the disks are 60% full. If the growth rate stays on track, in six months the disk usage would be 144 GB, or 72% full. In a year, the disk usage would be 173 GB, or 87% full. To avoid possible disk space problems in the near future, the Exchange administrator should plan to add about 50 to 100 GB more disk space in 6 to 9 months, before the disk usage reaches 90%. Figure 6. Trend Report of Exchange Total Disk Space 6

7 Supported Exchange Configurations Exchange AIM 2.0, released with ehealth 5.7, supports Exchange 5.5, 2000, and 2003 server platforms. The AIM also supports data collection in Mixed-Mode Exchange environments where 5.5, 2000, and 2003 Exchange servers coexist on the same network. Table 1 lists metrics that the Exchange AIM provides for enhanced performance and fault monitoring. Table 1. Performance Metrics Included in Exchange AIM Feature Exchange Server CPU, memory, and disk space Core server processes including information store, Message Transfer Agent (MTA), system attendant, and IIS. Administrators can use these statistics as an indication of overall MTA performance (how well messages move between Exchange servers, either to the local Information Store, connector, or remote MTA). Connector elements (Internet Mail Service, Lotus Notes cc:mail) that enable Exchange to communicate with other systems Mailbox stores disk footprint information including sizes for Exchange public and private mailbox stores Web service connections, logons, and uptime RPC Remote procedure call connections SMTP Server elements, including total bytes sent and received, total DSN failures and lookups SRS Site Replication Services for Exchange 2000/2003 servers in mixed-mode environments. SRS enables Exchange 2000 to emulate Exchange 5.5 directory services, replicating information between them. The AIM monitors SRS services that include Replication Updates, Replication Syncs Pending, Replication In Messages, and Replication Out Messages. IMAP Internet Message Access Protocol 4 connections POP3 Post Office Protocol 3 connections DS Directory Services cache and DSProxy, including Name Service Provider Interface (NSPI). These variables help determine how effectively Exchange is caching information that is frequently queried from Active Directory. ehealth AIM for Microsoft Exchange in a Clustered Environment By clustering Exchange, downtime due to hardware failures and maintenance activities can be reduced. A clustered Exchange environment involves one or more Exchange virtual servers distributed among two or more physical nodes. In a two-node failover cluster, two types of clustering are supported: active/passive and active/ active. Both types permit increased system availability for Exchange services. In active/ passive clustering, the cluster consists of one primary node and one secondary node. In this configuration, the primary node supports all clients while the secondary node is a backup server that is ready to take over whenever a failure occurs on the primary node. If the primary node fails, the secondary node picks up all operations and continues to service clients. In active/active failover clustering, both the primary as well as secondary node support Exchange services If one of the nodes fails, the other takes the full load with performance possibly reduced. With Exchange 2003 and the appropriate version of Windows Server, it is possible to build clusters consisting of up to eight nodes. In clusters with more than two nodes, only an active/passive configuration is supported. Running two Exchange virtual servers on the same node is not supported in clusters with three or more nodes. The ehealth AIM for Microsoft Exchange offers limited support for the active/passive type of cluster configuration up to the limit of nodes and virtual servers supported by the underlying platform (Exchange and Windows versions). Active/active clustering is not supported. In a cluster, the AIM provides basic information about the cluster itself, as well as the name and state of the current virtual server, if any, running on the node that is the target of a query. Information equivalent to that displayed in the Microsoft Cluster Administrator is also provided for all Exchange groups and resources in the cluster. Copyright 2005 Concord Communications, Inc. ehealth, the Concord Logo, Live Health, Live Status, SystemEDGE, AdvantEDGE and/or other Concord marks or products referenced herein are either registered trademarks or trademarks of Concord Communications, Inc. Other trademarks are the property of their respective owners. 7

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9. Reference IBM

Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9. Reference IBM Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9 Reference IBM Monitoring Agent for Microsoft Exchange Server 6.3.1 Fix Pack 9 Reference IBM Note Before using this information and the product

More information

WHITE PAPER September 2012. CA Nimsoft Monitor for Servers

WHITE PAPER September 2012. CA Nimsoft Monitor for Servers WHITE PAPER September 2012 CA Nimsoft Monitor for Servers Table of Contents CA Nimsoft Monitor for servers 3 solution overview CA Nimsoft Monitor service-centric 5 server monitoring CA Nimsoft Monitor

More information

Using Application Response to Monitor Microsoft Outlook

Using Application Response to Monitor Microsoft Outlook Focus on Value Using Application Response to Monitor Microsoft Outlook Microsoft Outlook is one of the primary e-mail applications used today. If your business depends on reliable and prompt e-mail service,

More information

MailEnable Scalability White Paper Version 1.2

MailEnable Scalability White Paper Version 1.2 MailEnable Scalability White Paper Version 1.2 Table of Contents 1 Overview...2 2 Core architecture...3 2.1 Configuration repository...3 2.2 Storage repository...3 2.3 Connectors...3 2.3.1 SMTP Connector...3

More information

Monitoring Microsoft Exchange Server in the Context of the Entire Network

Monitoring Microsoft Exchange Server in the Context of the Entire Network Monitoring Microsoft Exchange Server in the Context of the Entire Network Abstract: Virtually every business process and function relies in some way on messaging applications. Microsoft Exchange is one

More information

Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide

Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide Monitoring the Microsoft Windows Server System with PATROL - a Best Practices Guide Contents Introduction...1 Establishing a Baseline...1 The Operating System...1 CPU...2 Memory...4 Network...7 Disk...8

More information

Active Directory Monitoring With PATROL

Active Directory Monitoring With PATROL Active Directory Monitoring With PATROL Contents What is Active Directory?...1 Why Monitor?...1 Active Directory and PATROL...2 Critical Active Directory Components to Monitor...3 Address Book...3 Domain

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

ITIL A guide to Event Management

ITIL A guide to Event Management ITIL A guide to Event Management An event can be defined as any detectable or discernable occurrence that has significance for the management of the IT Infrastructure of the delivery of IT service and

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

pc resource monitoring and performance advisor

pc resource monitoring and performance advisor pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware

More information

MICROSOFT EXCHANGE 2010 4 MAIN CHALLENGES IT MANAGER HAVE TO FACE GSX SOLUTIONS

MICROSOFT EXCHANGE 2010 4 MAIN CHALLENGES IT MANAGER HAVE TO FACE GSX SOLUTIONS White paper September 2011 GSX SOLUTIONS MICROSOFT EXCHANGE 2010 4 MAIN CHALLENGES IT MANAGER HAVE TO FACE Project: Exchange 2010 Monitoring an reporting Targeted Product: GSX Monitor [ A d r e s s e d

More information

WINDOWS SERVER MONITORING

WINDOWS SERVER MONITORING WINDOWS SERVER Server uptime, all of the time CNS Windows Server Monitoring provides organizations with the ability to monitor the health and availability of their Windows server infrastructure. Through

More information

SOLARWINDS NETWORK PERFORMANCE MONITOR

SOLARWINDS NETWORK PERFORMANCE MONITOR DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

How To Block Ndr Spam

How To Block Ndr Spam How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

ITIL A guide to event management

ITIL A guide to event management ITIL A guide to event management Event management process information Why have event management? An event can be defined as any detectable or discernable occurrence that has significance for the management

More information

effective performance monitoring in SAP environments

effective performance monitoring in SAP environments WHITE PAPER September 2012 effective performance monitoring in SAP environments Key challenges and how CA Nimsoft Monitor helps address them agility made possible table of contents executive summary 3

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Windows Admins... & Long-term capacity planning... do the two go together?

Windows Admins... & Long-term capacity planning... do the two go together? Windows Admins... & Long-term capacity planning... do the two go together? Carl Stanfield EMC Australia Capacity management requires a few minutes of your day to crunch some numbers. The results are priceless

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,

More information

GSX Monitor & Analyzer for Exchange On premise. Performance, Reporting, Management

GSX Monitor & Analyzer for Exchange On premise. Performance, Reporting, Management GSX Monitor & Analyzer for Exchange On premise Performance, Reporting, Management 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600

More information

Load Balancing & High Availability

Load Balancing & High Availability Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of

More information

Centerity Service Pack for Microsoft Exchange 2013 Keep your e-mail services up and running!

Centerity Service Pack for Microsoft Exchange 2013 Keep your e-mail services up and running! Centerity Service Pack for Microsoft Exchange 2013 Keep your e-mail services up and running! Key Features Client & server monitoring. Tens of monitored KPI s for in-depth inspection. Wide range of usage

More information

Understanding IBM Lotus Domino server clustering

Understanding IBM Lotus Domino server clustering Understanding IBM Lotus Domino server clustering Reetu Sharma Software Engineer, IBM Software Group Pune, India Ranjit Rai Software Engineer IBM Software Group Pune, India August 2009 Copyright International

More information

INTERNET INFORMATION SERVICES (IIS) IMPLEMENTATION BEST PRACTICES: By: Terri Donahue, Microsoft IIS MVP

INTERNET INFORMATION SERVICES (IIS) IMPLEMENTATION BEST PRACTICES: By: Terri Donahue, Microsoft IIS MVP INTERNET INFORMATION SERVICES (IIS) IMPLEMENTATION BEST PRACTICES: SECURITY, LOAD TESTING, SCALABILITY, LOAD BALANCING By: Terri Donahue, Microsoft IIS MVP Internet information services (iis) Implementation

More information

Monitoring Mail Servers

Monitoring Mail Servers Monitoring Mail Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY

More information

GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014

GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014 GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014 1 About GSX Solutions! Founded 1996, Headquartered in Switzerland! Offices in USA, UK, France, Switzerland, China! Indirect

More information

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set Dawn CF Performance Considerations Dawn CF key processes Request (http) Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Query (SQL) SQL Server Queries Database & returns

More information

MANAGEX 4.23 ACTIVE DIRECTORY SERVICES Policies & Reports

MANAGEX 4.23 ACTIVE DIRECTORY SERVICES Policies & Reports MANAGEX 4.23 ACTIVE DIRECTORY SERVICES Policies & Reports MANAGEX 4.23 ACTIVE DIRECTORY SERVICE REPORTS & POLICIES NOTICE Hewlett-Packard makes no warranty of any kind with regard to this material, including,

More information

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business Protect your business Enterprise Monitoring, Notification & Reporting Services echomountain 1483 Patriot Blvd Glenview, IL 60026 877.311.1980 sales@echomountain.com echomountain Enterprise Monitoring,

More information

User s Guide: Beta 1 Draft

User s Guide: Beta 1 Draft IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent vnext User s Guide: Beta 1 Draft SC23-6593-06 IBM Tivoli Composite Application Manager for Microsoft

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Module 10: Maintaining Active Directory

Module 10: Maintaining Active Directory Module 10: Maintaining Active Directory! Lesson: Backing Up Active Directory Topic: How to Back Up Active Directory! Lesson: Restoring Active Directory Topic: How to Perform a Primary Restore! Lesson:

More information

PATROL Internet Server Manager Technical Brief

PATROL Internet Server Manager Technical Brief PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

Managing your Domino Clusters

Managing your Domino Clusters Managing your Domino Clusters Kathleen McGivney President and chief technologist, Sakura Consulting www.sakuraconsulting.com Paul Mooney Senior Technical Architect, Bluewave Technology www.bluewave.ie

More information

[Document Title] SolarWinds Server & Application Monitor (SAM) [Document Subtitle] Angi Gahler. Share: Author: Manish Chacko

[Document Title] SolarWinds Server & Application Monitor (SAM) [Document Subtitle] Angi Gahler. Share: Author: Manish Chacko [Document Title] [Document Subtitle] SolarWinds Server & Application Monitor (SAM) Author: Manish Chacko Angi Gahler Table of Contents The Case for Application & Server Monitoring.. 3 Complete Visibility

More information

GSX Monitor & Analyzer. for IBM Collaboration Suite

GSX Monitor & Analyzer. for IBM Collaboration Suite GSX Monitor & Analyzer for IBM Collaboration Suite 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600 customers In 40 countries GSX Solutions

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture

Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager Best Practices and Reference Architecture WHITE PAPER Table of Contents Introduction.... 1 Why monitor PlateSpin Protect

More information

Lesson Plans Configuring Exchange Server 2007

Lesson Plans Configuring Exchange Server 2007 Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:

More information

GSX for Exchange. When End User performance... Matters! GSX Solutions 2015

GSX for Exchange. When End User performance... Matters! GSX Solutions 2015 GSX for Exchange When End User performance...... Matters! 1 About GSX Solutions Founded 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 6 millions mailboxes monitored

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Monitoring Forefront TMG

Monitoring Forefront TMG Monitoring Forefront TMG eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

Monitoring Microsoft Exchange 2013

Monitoring Microsoft Exchange 2013 Monitoring Microsoft Exchange 2013 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

Neverfail for Windows Applications June 2010

Neverfail for Windows Applications June 2010 Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication

More information

VMware vrealize Automation

VMware vrealize Automation VMware vrealize Automation Reference Architecture Version 6.0 or Later T E C H N I C A L W H I T E P A P E R J U N E 2 0 1 5 V E R S I O N 1. 5 Table of Contents Overview... 4 What s New... 4 Initial Deployment

More information

How To Check If Your Mailbox Is Running Properly

How To Check If Your Mailbox Is Running Properly CA Nimsoft Monitor Probe Guide for Exchange Server Monitor exchange_monitor v5.0 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

One of the database administrators

One of the database administrators THE ESSENTIAL GUIDE TO Database Monitoring By Michael Otey SPONSORED BY One of the database administrators (DBAs) most important jobs is to keep the database running smoothly, which includes quickly troubleshooting

More information

Monitoring IBM HMC Server. eg Enterprise v6

Monitoring IBM HMC Server. eg Enterprise v6 Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014 DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction

More information

Monitoring MSDynamix CRM 2011

Monitoring MSDynamix CRM 2011 Monitoring MSDynamix CRM 2011 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be

More information

Avira AntiVir MailGate 3.2 Release Notes

Avira AntiVir MailGate 3.2 Release Notes Release Notes 1. Features 1.1 Assigning recipient addresses to groups either by using Active Directory or a plain text file 1.1.1 Using a Active Directory server MailGate communicates with Active Directory

More information

Des Moines Area Community College

Des Moines Area Community College Des Moines Area Community College Course Information EFFECTIVE Aug. 2006 Acronym/Number NET 653 Historical Ref. MCSE 340 Title Microsoft Exchange Server Credit breakout 4 3 2 0 0 (credit lecture lab practicum

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Hosted Email Managed by Email Specialists

Hosted Email Managed by Email Specialists Hosted Email Managed by Email Specialists The Mailtrust email system is the premium hosted email platform that provides your business with powerful, secure, and reliable email with absolutely no maintenance

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

MSP End User. Version 3.0. Technical Solution Guide

MSP End User. Version 3.0. Technical Solution Guide MSP End User Version 3.0 Technical Solution Guide N-Compass Remote Networking Monitoring Architecture How Does N-Compass Help Small & Medium Businesses? Proactive IT management The ability to do predictive

More information

VMware vrealize Automation

VMware vrealize Automation VMware vrealize Automation Reference Architecture Version 6.0 and Higher T E C H N I C A L W H I T E P A P E R Table of Contents Overview... 4 What s New... 4 Initial Deployment Recommendations... 4 General

More information

Managing your Red Hat Enterprise Linux guests with RHN Satellite

Managing your Red Hat Enterprise Linux guests with RHN Satellite Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions

More information

VMware vcloud Automation Center 6.0

VMware vcloud Automation Center 6.0 VMware 6.0 Reference Architecture TECHNICAL WHITE PAPER Table of Contents Overview... 4 Initial Deployment Recommendations... 4 General Recommendations... 4... 4 Load Balancer Considerations... 4 Database

More information

Planning Domain Controller Capacity

Planning Domain Controller Capacity C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

More information

HP OpenView Smart Plug-in for Microsoft Exchange

HP OpenView Smart Plug-in for Microsoft Exchange HP OpenView Smart Plug-in for Microsoft Exchange Data sheet Email is no longer just a productivity application - it is a company s lifeline. When email slows down or stops altogether, the business loses

More information

Understand Troubleshooting Methodology

Understand Troubleshooting Methodology Understand Troubleshooting Methodology Lesson Overview In this lesson, you will learn about: Troubleshooting procedures Event Viewer Logging Resource Monitor Anticipatory Set If the workstation service

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012 Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

MONyog White Paper. Webyog

MONyog White Paper. Webyog 1. Executive Summary... 2 2. What is the MONyog - MySQL Monitor and Advisor?... 2 3. What is agent-less monitoring?... 3 4. Is MONyog customizable?... 4 5. Comparison between MONyog and other Monitoring

More information

F-Secure E-mail and Server Security. Administrator's Guide

F-Secure E-mail and Server Security. Administrator's Guide F-Secure E-mail and Server Security Administrator's Guide TOC F-Secure E-mail and Server Security Contents Preface: Disclaimer...vi Chapter 1: About This Guide...7 1.1 Introduction...8 1.1.1 Product contents...8

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft

More information

Can You Afford Network Downtime?

Can You Afford Network Downtime? Can You Afford Network Downtime? Secure network monitoring software you can rely on to proactively MONITOR, ALERT and RECOVER your critical applications and infrastructure equipment. Proven agentless architecture

More information

Monitoring Applications and Services with Network Monitoring

Monitoring Applications and Services with Network Monitoring Monitoring Applications and Services with Network Monitoring White Paper Author: Daniel Zobel, Head of Software Development Paessler AG Published: December 2013 PAGE 1 OF 8 Contents Introduction: Avoiding

More information

Running VirtualCenter in a Virtual Machine

Running VirtualCenter in a Virtual Machine VMWARE TECHNICAL NOTE VirtualCenter 2.x Running VirtualCenter in a Virtual Machine Running VirtualCenter in a virtual machine is fully supported by VMware to the same degree as if it were installed on

More information

Monitoring Best Practices for COMMERCE

Monitoring Best Practices for COMMERCE Monitoring Best Practices for COMMERCE OVERVIEW Providing the right level and depth of monitoring is key to ensuring the effective operation of IT systems. This is especially true for ecommerce systems

More information

WHITE PAPER [MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE] WHITE PAPER MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE

WHITE PAPER [MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE] WHITE PAPER MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE WHITE PAPER MICROSOFT EXCHANGE 2007 WITH ETERNUS STORAGE ETERNUS STORAGE Table of Contents 1 SCOPE -------------------------------------------------------------------------------------------------------------------------

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information