Cloud Services MDM. Reports & Alerts Admin Guide



Similar documents
Mobile Device Manager Admin Guide. Reports and Alerts

Integrate ExtraHop with Splunk

EventTracker: Integrating Imperva SecureSphere

TUTORIAL: Marketing Automation Gold-Vision 7

There are numerous ways to access monitors:

Cloud Services MDM. Overview & Setup Admin Guide

NAS 272 Using Your NAS as a Syslog Server

Fax and SMS Quickguide

NMS300 Network Management System

Vodafone Secure Device Manager Administration User Guide

How do I Configure, Enable, and Schedule Reports?

LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT

TSM Studio Server User Guide

NETWRIX EVENT LOG MANAGER

NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW)

NETWRIX EVENT LOG MANAGER

WebSphere Business Monitor V7.0 Business space dashboards

How to Program a Commander or Scout to Connect to Pilot Software

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Link and Sync Guide for Hosted QuickBooks Files

Using AppMetrics to Handle Hung Components and Applications

First Financial Bank Online Banking Quick Reference. February, 2013

Setting up Microsoft Office 365

Quick Start Guide Sendio Hosted

Salesforce Integration

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE page 1

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Cloud Services MDM. Management Admin Guide

NETWRIX EVENT LOG MANAGER

Integration Guide. Help Desk Authority, Perspective and sl

Protecting the Home Network (Firewall)

Process Document Campus Community: Create Communication Template. Document Generation Date 7/8/2009 Last Changed by Status

Remote Monitoring Service - Setup Guide for InfraStruXure Central and StruxureWare 1 5

Managing Virtual Servers

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

Quick Setup Guide. FaxGwise Version 6.0. SKyPRO AG, Gewerbestrasse 7, 6330 Cham Switzerland, SKyPRO USA,

WebSphere Business Monitor V6.2 Business space dashboards

LogLogic Trend Micro OfficeScan Log Configuration Guide

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

How To Configure Syslog over VPN

Dynamic DNS How-To Guide

McAfee Network Threat Response (NTR) 4.0

SonicWALL GMS Custom Reports

Monitoring Oracle Enterprise Performance Management System Release Deployments from Oracle Enterprise Manager 12c

Important Notes for WinConnect Server VS Software Installation:

Altaro Hyper-V Backup - Getting Started

Setting up Microsoft Office 365

XpoLog Center Suite Log Management & Analysis platform

Zoho CRM and Google Apps Synchronization

Hyperoo 2.0 A (Very) Quick Start

Integrating with IBM Tivoli TSOM

ExactTarget GENESIS I N TEGRATION GUIDE

DocuSign Connect for Salesforce Guide

HDA Integration Guide. Help Desk Authority 9.0

How To Use A Help Desk With A Pnettrap On A Pc Or Mac Or Mac (For A Laptop)

Configuring NetFlow Secure Event Logging (NSEL)

Configuring Situation Events in Action Manager for WebSphere Business Monitor Version 6.0

Onboarding for Administrators

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management How to forward logs...

How to Schedule Report Execution and Mailing

How To Manage Work Mode On An It Calendar On An Apa System

ShadowControl ShadowStream

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI)

11.1. Performance Monitoring

User Manual for Web. Help Desk Authority 9.0

NAS 224 Remote Access Manual Configuration

Verizon Firewall. 1 Introduction. 2 Firewall Home Page

Setting Up Message Notifications in Cisco Unity 8.x

F-Secure Messaging Security Gateway. Deployment Guide

Hosted Fax Mail. Hosted Fax Mail. User Guide

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

A quick guide to. Social Media

Cloud Services MDM. Application Management Admin Guide

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)

Comodo One Software Version 1.8

Decision Support AITS University Administration. EDDIE 4.1 User Guide

How to integrate Verax NMS & APM with Verax Service Desk

UM8000 Voic System Administration Guide

Nimsoft Monitor. dns_response Guide. v1.6 series

BroadWorks Call Center Guide

Introduction to Directory Services

IBM. Vulnerability scanning and best practices

Startup Guide. Version 2.3.9

VMware vcenter Log Insight Getting Started Guide

LiveText for Salesforce Quick Start Guide

Network/Floating License Installation Instructions

Containerchain. LIVE User Guide for Transporters

1 Requirements. 2 Configuration. Axis-compatible Camera Application Integration.

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

Administration: General Overview. Astra Schedule VII Training Manual

Frequently Asked Questions

Ans.: Spam Monitor support all popular programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Chapter 10 Encryption Service

Integrating LivePerson with Salesforce

WebSphere Business Monitor V6.2 KPI history and prediction lab

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

Capture Pro Software FTP Server System Output

Transcription:

Cloud Services MDM Reports & Alerts Admin Guide 10/27/2014

Reports and Alerts is one of nine sections of the overall Admin Guide for Mobile Device Manager. The following is the complete list of MDM Admin Guide components: MDM Overview and Setup Device Management Profile Management Geofencing Application Management Content Management Email Management Telecom Management Reports and Alerts REPORTS AND ALERTS REPORTS MDM has extensive reporting capabilities that provide administrators with actionable, result- driven statistics about their device fleets. IT administrators can leverage these pre- defined reports or create custom reports based on specific devices, User Groups, date ranges, or file preferences. In addition, the administrator can schedule any of these reports for automated distribution to a group of users and recipients on either a defined schedule or a recurring basis. These features are all centralized within the Web Console. To access the Reports page: Navigate to Reports & Alerts Reports. From here, there are several key pieces of functionality that administrators can use to leverage reporting capabilities: 1

Generating Custom Reports Administrators can create custom reports on the fly through Web Console. To generate a custom report: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list and then click the Actions icon on the right and then click View. 3. Specify all of the report parameters. Required fields are indicated with a red mark. 4. Select View Report. Adding a Report to My Reports Adding a report to My Reports allows administrators to bookmark popular reports that they find particularly useful. To add a report to My Reports: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list. 3. Click the Actions icon on the right. 4. Click the [Add to My Reports] button. From now on the report will be accessible from the My Reports View on the left side of the Reports page for quick access. Creating Report Subscriptions Report subscriptions can be used to send custom generated reports to specific recipients at a scheduled occurrence. To subscribe to a report: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list. 3. Click the Actions icon on the right. 4. Click the [Subscribe] button. 2

5. Complete the Report Subscriptions Form with all required information. General Information The name of the subscription, the email subject, etc. Report Parameters The parameters defining the scope and options of the report. Distribution List The recipients who will receive the custom report whenever the subscription is executed. Execution Schedule The time and schedule at which the custom report is generated. 6. Click [Save]. Additional Reporting Tools There are also several other additional tools that help administrators utilize MDM reporting capabilities: Search Assistance Tools The Report Category drop- down and Search Box at the top of the Reports page make finding particular reports very simple. Report Samples Tool To view a sample output from a particular report, click the Actions icon on the right and then click the [Sample] button. Report Export Tool To export a report in one of several formats, use the Export Bar on a custom generated report. ALERTS Alerts provide administrators with the ability to receive immediate notifications when specific events occur across the managed smart device fleet. They are comprised of two components: A Creation Policy that describes the criteria that must be met to trigger the alert A Routing Policy that describes the devices being monitored, when the alert will be sent, and who will receive it. Creation Policies In order to create a new creation policy: 1. Navigate to Reports & Alerts Alert Setup Creation Policy. From here, a list of all available creation policies can be seen. 2. If any policies are similar to the policy that needs to be created, try editing the policy by selecting the Edit icon on the left of the row. 3. Select Add Alert Creation Policy to open the Alert Creation Policy Form. 3

4. Enter all required information. Description The name of the creation policy that will be displayed in the Web Console. Resource The type of resource that is going to be monitored. o Select Device to monitor the smart device fleet. Attribute The parameter that will be used to determine whether the alert should go off or not. Comparison Operator The comparison operator to test whether the attribute will set off an alert. Value The value that will set off the alert when (Attribute) <Comparison Operator> (Value) = True. Duration The duration that the alert will last before stopping. 5. Click [Save] to complete the process. Routing Policies In order to create a routing policy: 1. Navigate to Reports & Alerts Alert Setup Routing Policy. 2. Select Add Alert Routing Policy to open the Alert Routing Policy Form. 4

3. Fill out the form on the Criteria tab. Creation Policy The creation policy that will trigger this alert. Location Group The location group that contains the devices that are being monitored for the creation policy criteria. Location The location that contains the devices that are being monitored for the creation policy criteria. The default is Any. Device Any specific devices that are being monitored for this creation policy. The default is Any. Sample Time and Sample Days The date and time in which this policy is tested on the selected devices Severity & Priority Metrics to organize alerts in terms of priority and several for administrative purposes. Consolidation Window The period of time in which only one alert will occur from multiple triggers of the same creation policy. All alerts that occur within the consolidation window of one another, and stem from the same creation and routing policy, are consolidated into a single alert. 4. Select the Preferences tab to configure the recipients of these alerts: User Alerting Select an administrative user or users to receive this alert. Role Alerting Select a location group and subsequent role to receive this alert. o To add additional roles, use the [Add Role] button. 5. Click [Save] to complete this process. 5

VIEWING ALERTS Once alerts have been created, they can be viewed by navigating to Reports & Alerts Search Alerts. My Alerts View alerts by user or role that received the alert. You can also view alerts that were triggered by a particular device on the Device Details page by selecting System Activity Alerts. KEEP IN MIND... To enable the highest level of control and security over distribution of report information across the enterprise, edit role- based access to reports by navigating to Users User Accounts Add Role. Report Access is enabled or disabled by checking the boxes under Resource Categories. OVERVIEW OF SYSLOG Syslog is a client\server protocol used to integrate the event log data from Web Console on a separate server in a reliable and secure way. Syslog is used in MDM for logging and storing event logs that have occurred on Web Console and on managed devices. Syslog protocol is originally written on BSD Unix and the messages are sent using UDP/TCP protocol. The two major reasons for having a centralized Syslog server: For Security When an administrator wants to keep some of the event logs safely off- site in a secure location. For Convenience In case of crashed server, the administrator can check the kernel error logs on the centralized Syslog server. The Syslog pattern between various dates over an extended time can also be checked, and log files from the Syslog server can be matched, searched, and replaced at any time. 6

Integrating Syslog The administrator can configure Syslog integration on the Syslog settings page by navigating to Configuration System Settings Admin Syslog. 1. Enter information in all the fields. Required fields have a red asterisk ( * ). Server URL Enter the Syslog server URL to store event logs. Protocol Enter the protocol type for MDM console and the Syslog server to communicate, either UDP or TCP. Port Enter the destination port number the MDM console wants to send Syslog data to the Syslog server. When sending messages using UDP, the destination port is usually 514 and for TCP, the destination port is usually 1468. The port number is 514 by default. Syslog Facility Syslog facility lists the type of messages that are to be sent to the server. Select a Syslog facility from the drop- down list. Some Syslog accepts messages only from certain facilities. Event Types Logged o Enable Console check box To send console events. o Enable Device check box To send device events. Message Tag Enter a message tag to help Syslog server to identify where the message came from. Message Content Enter what the message should include. o Include lookup value helper control with: {EventType}, {Event}, {User}, {EventSource}, {EventModule}, {EventCategory}, {EventData} 2. Click [Save] or click [Test Connection] to test the connection setup. Once the integration is completed, the administrator has to schedule the time frequency limits. This allows the MDM server to know how often it has to send Syslog data to the Syslog server. 7

The time frequency limit is set using the MDM Scheduler by navigating to Configuration System Settings Device General Scheduler. The Scheduler has a built- in task called Syslog Task, where the time frequency is set. The administrator has permission to edit the Syslog Task only at the Global level. 1. Click [Edit]. The Syslog Task page displays (see below). 2. Enter information in the required fields. Recurrence Type Select a recurrence type and the corresponding frequency to send Syslog data to the Syslog server. The following recurrence types are available: o Daily o Weekly o Monthly o Time- Based Range Enter the start and end date and timings. 3. Click [Save]. 8