Modifying an existing host
You can use this task to modify the configuration for an existing host.
You can log on to a remote host in one the following ways:
- Password-based authentication: You need to enter user name and password.
- Key-based authentication: You need to enter user name, public and private key file paths, and passphrase.
User name/password or user name /public and private key file paths and passphrase must be entered if your profile is set to NONE or if you have selected the Override Profile Credentials (for profile other than NONE) option.
To modify a host
- Access the Remote Monitoring application menu as described in Accessing-KM-Commands-and-InfoBoxes.
- Select Manage List of Monitored Hosts from the Remote Monitoring application menu. The Manage-List-of-Monitored-Hosts-dialog-box is displayed.
- Select a host from the Host List.
- Select Modify Host and click OK. The Modify-Host-instanceName-dialog-box is displayed.
- Select a profile from the Profile list. If you select a profile other than NONE, you don't need enter credentials.
- Select Override Profile Credentials (for profile other than NONE) if you want to override the default profile credentials.
- Type the user name
- Type the password.
- Type the paths in the Public Key File Path and Private Key File Path fields if you are using key-based authentication.
- Type the passphrase to access the public key and private key files if you are using key-based authentication.
- Click OK.
The configurations of the selected host will be modified.
Related topics
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*