Using BMC Defender UTS
The BMC Defender UTS program augments the existing syslog capability of the site and is not required to monitor a UNIX platform comprehensively. Many sites forego installing the UTS software, and rely completely on the native UNIX syslog capability. However, sites can employ UTS to generate syslog messages if they require:
- Monitoring of streaming log files
- Data filtering at the UNIX platform
- Special data encryption functions
- Monitoring of file object modifications,
At many sites, the entire usage of the BMC Defender UTS consists of installing the program (as discussed in Installing) and then rarely, if ever, revisiting the installation. The BMC Defender UTS does not require program maintenance and cannot interfere with other system processes. The system configuration file (discussed in CO-logmon-configuration-file) is ready-to-run and does not require any customization, other than the destination syslog host supplied by the installation.
This section provides detailed notes on the UTS software options and application notes suitable for use by administrators and developers wanting to extend the UNIX syslog monitoring capabilities of their organization. The section is also of interest to other users wanting to assess the capabilities of the UTS tools, and syslog protocol in general.
This section provides information about the following topics: