Configuring Windows Remote Monitoring
On the Add Monitoring Configuration window, set the following preferences:
Monitoring Solution | Monitor Profile | Monitor Type |
---|---|---|
Microsoft Windows Servers | Remote Monitoring | Windows Remote Monitoring |
Provide the following details:
Field | Description |
---|---|
Remote Host Configuration | Click Add to add remote host configurations. |
Host Details | |
Remote host names | |
Host Names/File Path | Enter the host name of the server in any of the following ways:
|
Authentication Type | Select the type of authentication for adding the remote host.
|
Connection Protocol | Select the type of connection protocol for adding the remote host.
|
Port Number | Enter the remote host port number. By default, the port number is set to 5985 for HTTP and 5986 for HTTPS. |
Reconnect Interval | This field has been introduced to enable the KM to auto-reconnect to the remote host in case of access denied error due to server restart. If you want the KM to auto-reconnect to the remote host, enter a value greater than the collection interval of the _Status parameter. By default, the collection interval is 1 minute. 0 indicates the KM will not auto-reconnect if the _Status parameter displays an Access denied error. |
User Credentials | |
User Name | Enter the user name to connect to the remote host. To use the PATROL Agent default account, use $USERNAME and ensure that the default account is saved in the /AgentSetup/DefaultAccount pconfig variable of the PATROL Agent or configure the default account at the following location - Create Monitoring Policy > Agent > Agent Default Account. |
Password | Enter the common password of the hosts added in the Host Names/File Path field. |
Confirm Password | Reconfirm the password that you entered in the field above. |
Monitor Configuration | |
Operating System Monitoring | |
Monitoring options | Specify one of the following options:
|
Advanced Monitor Configuration | |
Memory | Select this checkbox to enable Memory monitoring |
Cache | Select this checkbox to enable Cache monitoring. |
System | Select this checkbox to enable System monitoring. |
Health Configuration | |
Health | Select this checkbox to enable Health monitoring. |
CPU Configuration | |
Enable Annotation for 'Total processor utilization' | Select this checkbox to enable annotation. Annotation refers to additional details about specific processes that consume the most CPU resources. |
CPU Threshold for Annotation (%) | Enter the CPU threshold (in percentage) to generate the annotation. The annotation displays the top 10 processes consuming the highest CPU resources on the system. The default value for the CPU threshold is 80%. |
Memory Configuration | |
Enable Annotation for 'Memory usage' | Select this checkbox to enable annotation. Annotation refers to additional details about specific processes that consume the most memory resources. |
Memory Threshold for Annotation (%) | Enter the memory threshold (in percentage) to generate the annotation. The annotation displays the top 10 processes consuming the highest memory resources on the system. The default value for the memory threshold is 80%. |
Processor Configuration | |
Processor | Select this checkbox to enable Processor monitoring. |
Exclude Criteria | Enter a comma-separated list of processor instances that you want to exclude from monitoring. Wildcard characters are not supported. For example: 0,1,2. If you leave this field blank, none of the CPU instances is excluded, and the field is ignored. |
Include Criteria | Enter a comma-separated list of processor instances that you want to include for monitoring. Wildcard characters are not supported. For example: 0,1,2. If you leave the field blank, all instances are monitored. |
Network Configuration | |
Exclude Criteria | Enter a comma-separated list of network interface instances that you want to exclude from monitoring. For example: Local Area Connection,6TO4 Adapter |
Include Criteria | Enter a comma-separated list of network interface instances that you want to include for monitoring. For example: Local Area Connection,6TO4 Adapter |
Physical Disk Configuration | |
Exclude Criteria | Enter a comma-separated list of physical disk instances to exclude from monitoring. For example: 0,1,2 |
Include Criteria | Enter a comma-separated list of physical disk instances to include for monitoring. For example: 0,1,2 |
Logical Disk Configuration | |
Exclude Criteria | Enter a comma-separated list of logical disk instances to exclude from monitoring.For example: C:,D:,E: |
Include Criteria | Enter a comma-separated list of logical disk instances to include for monitoring. For example: C:,D:,E: |
Page File Configuration | |
Exclude Criteria | Enter a comma-separated list of paging file instances that you want to exclude from monitoring. For example: _Total,C:\pagefile.sys. |
Include Criteria | Enter a comma-separated list of paging file instances that you want to include for monitoring. For example: _Total,C:\pagefile.sys. |
Process Configuration | |
List of Processes | Click Add to configure the process manually. |
Process Specification | |
Configure Process Monitoring | |
Process Label | Enter a label to identify a group of processes. The input that you specify must match the regular expression pattern, '^[0-9a-zA-Z_]+$'. |
Process Name | Enter a name or a regular expression pattern that matches the names of processes that must be monitored. Enter only the process name without extension. For example, if the process name is Notepad, enter Notepad. Do not enter Notepad.exe. |
Use Regular Expression for Process Name | Select this checkbox to monitor all the processes that contain the process name specified. |
Process Arguments | Enter the command line arguments for the processes that you want to monitor.
Example: C:\Windows\system32\svchost.exe -k NetworkService |
Use Regular Expression for Process Argument | Select this checkbox to enter process command line arguments by using a regular expression pattern. |
Minimum Count | Enter a value that will trigger an alarm when the process count falls below this value. |
Maximum Count | Enter a value that will trigger an alarm when the process count rises above this value. |
Acceptable Process Owner | Enter a name or regular expression pattern that matches the name of the acceptable process owner. |
Use Process Owners for Filtering | Select this checkbox to filter processes based on the process owners. |
Process Settings | |
Generate alarm on Process stop | Select this checkbox to generate an alarm when the process stops. |
Generate alarm on Process start | Select this checkbox to generate an alarm when the process starts. |
Restart Command | Enter the command that would be used to restart a stopped process. |
Time to terminate runaway Process | Enter the time for which a process is retained and not terminated when the CPU usage for the process exceeds the defined maximum CPU threshold. After the specified time, the process is terminated. The time that you enter must match the following regular expression pattern - ^[0-9]+$. |
Automatic Process Monitoring | |
Disable Automatic Process Monitoring | Select this checkbox to disable the default monitoring of processes. |
CPU Threshold in % | Enter the CPU threshold (in percentage) for automatic process monitoring. The value that you enter must match the following regular expression pattern - ^[0-9]+$.By default, this value is set to 90. |
Time Duration in secs | Enter the time limit (in seconds) to start the automatic process monitoring. The input that you specify must match the regular expression pattern, '^[0-9]+$'. By default, this value is set to 300. |
Service Configuration | |
Disable Automatic Restart | Select this checkbox to disable the automatic restart of the monitored services. |
Disable Alert For Paused Services | Select this checkbox to disable alerts for the paused services. |
List of Included Services | Click Add to add a list of services to monitor. |
Service Details | |
Generate an Alarm/Warning when service is stopped | By default, when a service is stopped, the PATROL Agent generates an alarm. However, for a particular service, you can specify a Warning instead. This feature is available for the services with a startup type of Automatic only. |
Alert State | Select one of the following options to define the type of alert that you want to raise when the service stops:
|
Restart service when stopped | Select this checkbox to restart a stopped service. |
Enable process monitoring for the services | Select this checkbox to monitor the processes that are associated with the configured service. By default, the PATROL Agent monitors only whether services are available. To monitor how much memory and CPU a service executable consumes, you must enable process monitoring for the service. When you enable process monitoring, the PATROL Agent monitors the service executable process and displays the monitored process beneath the NT_SERVICE application. |
Use command line for non-responsive services | Select this checkbox to use the command line and enter the command line in the Command line field. This option is used for the non-responsive services. |
Command line | Enter the command line name. |
Service Name | |
Service Name | Enter the display name or service name that you want to monitor. Use regular expressions for the display name only. If you enter the service name, clear the Use Display Name check box. The KM uses \| characters for OR operation instead of | character. Example:
|
Use Display Name | By default, this checkbox is selected. If you have entered a service name in the Service Name field, clear this check box. |
Service Startup Type | |
Automatic | Select this checkbox to monitor the services with Automatic Startup Type. This checkbox is enabled by default. |
Automatic Delayed Start | Select this checkbox to monitor automatic delayed start type services. |
Automatic Trigger Start | Select this checkbox to monitor automatic trigger start type services. |
Manual | Select this checkbox to monitor the services with Startup Type as Manual, Manual (Trigger Start). This checkbox is enabled by default. |
Disabled | Select this checkbox to monitor the services with Startup Type as Disabled. |
Exclude Services | |
List of Excluded Services | Click Add to add a list of services that you do not want to monitor. |
Service Name | Enter the display name or service name that you want to monitor. Use regular expressions for the display name only. If you enter the service name, clear the Use Display Name checkbox. |
Use Display Name | By default, this checkbox is selected. Clear this checkbox if you have entered a service name in the Service Name field. |
Event Log Configuration | |
Event Log | Select this checkbox to enable Event Log monitoring. By default, all Windows event logs are monitored if they are registered in the Windows registry at the following location: HKLM\SYSTEM\CurrentControlSet\Services\Eventlog |
List of Event Logs | Click Add to configure the event logs. |
Log Name | Enter the event log name for which you want to create a filter. |
List of Filters | Click Add to filter the event logs. |
Name | Enter a unique name that represents the event filter, and follow these rules:
|
Description | Enter a short description of the filter you are creating. This is additional information regarding the filter, and you can change the description at any time. |
Report/Notify | Select one of the following options, as appropriate:
|
Source Details | Click Add to configure the source name.
|
Use name as a regular expression | Select this checkbox if you have specified a regular expression in the Name field. |
Disable case sensitivity | Select this checkbox to disable case sensitivity for the source filtering. You can specify whether to make filter comparisons in a case-independent manner for the source, user, category, and string options of a Windows event filter. To disable case-independent comparisons for any of the options, make sure that the corresponding Disable Case Sensitivity check box while configuring Windows event monitoring is cleared. The /PSX_P4WinSrvs/PWK_PKMforMSWinOS_config/EventLogMonitoring/eventlog/EventFilters/filter/FilterDisableCase configuration variable stores information about case-sensitivity of the event filter options. This variable has five-bit values, depending upon case sensitivity, one bit corresponding to each of Source, User, Category, String, and Computer name, respectively. If any bit value is 1, a case-independent filter comparison is made for the corresponding field. Set this variable to any of the following values:
To disable case-sensitivity in the event filters, set the value of the FilterDisableCase configuration variable to 00000. |
Include/Exclude Source List | Select one of the following options, as appropriate:
|
Event Type Details | |
Event Types to Monitor | Select Windows event types to filter the events to monitor from the following:
|
Consolidate event types when reporting |
|
Event ID Details | |
Windows Event ID(s) | Select one or more multiple IDs in the following ways:
|
Use Event ID as a regular expression | Select this checkbox if you specified a regular expression in the Windows Event ID(s) field. |
Include/Exclude Event ID List | Select one of the following options, as appropriate:
|
Event Handling | |
Annotate Graph parameter with event details | Select this checkbox to annotate event details to Graph parameters. |
Write event details to a text parameter | Select this checkbox to add event details to text parameters. |
Use event details for a recovery action | Select this checkbox to enable using the event details for recovery actions. |
Report multiple events as a single event when the event occurs | Enter the number of events that must be reported as a single event depending on the value that you specify in the Time within seconds field. By default, this value is set to 1. |
Time within seconds | Enter the number of seconds that must be used for reporting multiple events as a single event. By default, this value is set to 0. |
Enter text automatic or Filter name to Acknowledge Alarm | Enter how you want to acknowledge the alarm raised by the event filter. Specify one of the following values:
By default, this value is set to automatic. |
Advanced Properties | |
List of Users | Click Add to configure user details.
|
Include/Exclude User List | Select one of the following options, as appropriate:
|
List of Categories | Click Add to provide category details for the events that you want to monitor.
|
Include/Exclude Category List | Select one of the following options, as appropriate:
|
String Details | Click Add to provide string details associated with the events you want to monitor. |
Include String | Enter the string associated with the events that you want to include for monitoring. When entering a string that includes special characters that are used in regular expressions, such as a dollar sign ($), a period (.), a parenthesis (), or a slash (), you must escape each special character with a slash. For example, if the string is $Error, you must enter the string as \$Error.
|
Exclude String | Enter the string associated with the events that you want to exclude for monitoring. When entering a string that includes special characters that are used in regular expressions, such as a dollar sign ($), a period (.), a parenthesis (), or a slash (), you must escape each special character with a slash. For example, if the string is $Error, you must enter the string as \$Error.
|
Computer Details |
|
Include/Exclude User List | Select one of the following options, as appropriate:
|
Disable Case Sensitivity | Select this checkbox to disable case sensitivity for computer comparison. |
WMI Monitors |
|
Raw Counter Data Configurations |
|