A - E
Access control list (ACL)
A list that is created by using a PATROL Agent configuration variable and that restricts access to a PATROL Agent. ACLs are used to restrict access to objects in the Common Object System (COS) namespace.
A memory array that contains an internal representation of the PATROL Agent object hierarchy.
A feature that constructs SQL-like statements for querying PATROL Agents. Agent Query produces a tabular report that contains information about requested objects and can be used to perform object management activities, such as disconnecting and reconnecting computers. Queries can be saved, reissued, added, or changed.
Application check cycle
The interval at which application discovery occurs. The PATROL Agent process cache (as opposed to the system process table) is checked to ensure that all application instances and files previously discovered still exist in the cache.
The object class to which an application instance belongs.
A PATROL Agent procedure carried out at preset intervals on each monitored computer to discover application instances. The application class includes rules for discovering processes and files by using simple process and file matching. Application definition information is checked against the information in the PATROL Agent process cache, which is periodically updated. Each time the PATROL Agent process cache is refreshed, application discovery is triggered.
The condition of an application class or an application instance. The most common application states are OK, warning, and alarm. An application class or instance icon can also show additional conditions.
A characteristic that is assigned to an object such as computer class, computer instance, application class, application instance, parameter, etc. that you can use to monitor and manage that object. Computers and applications can have attributes such as command type, parameter, menu command, InfoBox command, BMC PATROL setup command, state change action, or environment variable. Parameters can have attributes such as scheduling, command type, and thresholds. An attribute can be defined globally for all instances of a class or locally for a particular computer or application instance. An instance inherits attributes from a class; however, an attribute defined at the instance level overrides inherited attributes.
An internal command that monitors and manages functions such as resetting the state of an object, refreshing parameters, and echoing text. The command is identified by the naming convention
The object classification where global attributes can be defined. The attributes are then inherited by instances of the class. An instance belongs to a computer class or an application class.
Categorization of commands according to its manner of execution. This attribute must be defined for a parameter command, a parameter recovery action, a menu command, an InfoBox command, a configuration command, or a state change action.
A computer instance contains the information and attributes of the computer class to which it belongs.
A deployable package consists of monitoring solution components that you can select and install together. These components are also called installation components. You can reuse deployable packages on a single or multiple computers.
An event is a notification that indicates a change in the state of an application or device that you are monitoring. Thus, an event can represent an error or warning, it can mean the crossing of a set threshold, or it can mean everything is working as expected, and so on. Alarms are type of events that are generated when the user-specified threshold values are violated. PATROL events are events generated by the PATROL Agent.