MonitorIT Online Help Guide
Transcription
MonitorIT Online Help Guide
The Complete Server & Network Monitoring System Monitor, Detect, Alert, Diagnose, Measure, Collect & Report on Windows Servers/Workstations, SNMP & SYSLOG Servers & Devices User’s Guide Sentry II version 8.0 Table of Contents Introduction.............................................................................................................................7 Overview .............................................................................................................................8 Sentry II's Internet Explorer Based ‘Console’..............................................................13 Accessing Sentry II with a Remote ‘Console’ ...............................................................14 Sentry II Licensing...........................................................................................................14 Installation Instructions .......................................................................................................15 Upgrade Your Current Sentry II to the Latest .............................................................15 Installing the Sentry II Server ........................................................................................15 Sentry II Server as a Windows Service..........................................................................16 Optional Microsoft SQL Server Installation Steps.......................................................17 Sentry II Agent Installation Steps ..................................................................................18 Uninstalling the Sentry II Agent.....................................................................................20 Feature Overview ..................................................................................................................22 Sentry II Menus ...............................................................................................................22 Introduction Options .......................................................................................................28 Online Help.......................................................................................................................29 What Next After Installation ................................................................................................30 Performance Tips..................................................................................................................33 Internet Explorer Console...............................................................................................33 Default Access Database..................................................................................................33 SQL Server Database ......................................................................................................33 Hardware Platform..........................................................................................................34 Frequently Asked Questions.................................................................................................35 Configure Servers/Agents & Devices ...................................................................................42 Licensing Note ..................................................................................................................43 Current Selected Server/Device Buttons .......................................................................47 Eligible Watches...............................................................................................................48 Assign Watches ................................................................................................................49 Track Hardware Asset/Configuration Details ..............................................................50 Properties..........................................................................................................................50 Sentry II 8.0 User’s Guide p. 2 Version 8.0.12 July 2006 IP Services Tab.................................................................................................................50 Windows Tab....................................................................................................................54 SNMP Tab ........................................................................................................................55 Global Configuration Buttons ........................................................................................56 Manage Agents .................................................................................................................57 Discovery Processing .......................................................................................................59 Manage SNMP .................................................................................................................62 Import ...............................................................................................................................64 Configure Groups .................................................................................................................66 Configure Security ................................................................................................................69 Active Directory View for Selecting User or Group.....................................................72 Global Security Settings ..................................................................................................73 Session Logon Report ......................................................................................................74 User Security Report .......................................................................................................74 Configure SNMP Trap Definitions ......................................................................................75 Configure Domain Information ...........................................................................................78 Configure Watches/Alerts.....................................................................................................80 Watch/Alert Type Views .................................................................................................83 IP Service Tab................................................................................................................83 PROCESS Tab ...............................................................................................................86 SERVICE Tab................................................................................................................89 EVENTLog Tab.............................................................................................................90 FILE Tab........................................................................................................................93 COUNTER Tab .............................................................................................................96 CUSTOM Tab................................................................................................................98 SNMPTrap Tab............................................................................................................100 SYSLOG Tab...............................................................................................................101 USER Tab ....................................................................................................................104 Schedule View.................................................................................................................104 Actions View ...................................................................................................................107 User Alerts ......................................................................................................................121 Cycle Multiple Displays ......................................................................................................122 Network Status Display.......................................................................................................123 Groups View ...................................................................................................................124 Devices View ...................................................................................................................124 Sentry II 8.0 User’s Guide p. 3 Version 8.0.12 July 2006 Device Alert Details Dialogue Box................................................................................126 ServerWatch Display...........................................................................................................128 Server Status Log View .................................................................................................128 Specify Status Log Display Filter Dialogue Box .........................................................130 AlertWatch Display .............................................................................................................132 Alert Log View ...............................................................................................................132 Alert Log Filter View.....................................................................................................134 Configure Alert Log Filter Dialogue Box ....................................................................135 EventLogWatch Display .....................................................................................................137 EventLogWatch Display View ......................................................................................137 EventLogWatch Display Filter View ...........................................................................139 Configure EventLogWatch Display Filter Dialogue Box...........................................139 SYSLOGWatch Display ......................................................................................................141 SYSLOGWatch Display View ......................................................................................141 SYSLOGWatch Display Filter View............................................................................143 Configure SYSLOGWatch Display Filter Dialogue Box ...........................................143 SNMPTrapWatch Display ..................................................................................................145 SNMPTrapWatch Display View...................................................................................145 Configure SNMPTrapWatch Display Filter View......................................................146 Configure SNMPTrapWatch Display Filter Dialogue ...............................................147 System Monitor ...................................................................................................................149 Memory Monitor .................................................................................................................151 HDD Monitor ......................................................................................................................153 Registry Monitor .................................................................................................................155 Manage Registry Monitoring Specifications Dialogue Box .......................................156 CounterWatch Graphs ........................................................................................................159 Monitored Objects Tree View ......................................................................................159 Creating and Configuring Charts ................................................................................159 Chart Configure Wizard ...............................................................................................162 Dynamic Chart Play ......................................................................................................163 Fine Tune Chart Play ....................................................................................................165 Schedule CounterWatch Monitoring .................................................................................167 Sentry II 8.0 User’s Guide p. 4 Version 8.0.12 July 2006 Schedule View.................................................................................................................167 Status View .....................................................................................................................168 Manage CounterWatch Monitoring...................................................................................171 Current Counters Monitored View..............................................................................171 Monitor Objects Tree View ..........................................................................................173 Server/Device Monitor Schedule Property Sheet .......................................................174 Counter Value Summary Report .................................................................................175 Create CounterWatch Reports............................................................................................177 Review Mode ..................................................................................................................177 Edit and Update Mode...................................................................................................178 Customizing Collection Sets..........................................................................................180 Schedule Periodic Reports..................................................................................................184 Schedule View.................................................................................................................184 Queued View...................................................................................................................188 Brand View .....................................................................................................................189 Run/Analyze & View Reports .............................................................................................190 Report Types ..................................................................................................................190 Status View .....................................................................................................................191 Service Report Analysis.................................................................................................193 Results View ...................................................................................................................195 Event Log View/Archive & Report .....................................................................................198 View Archived Event Logs............................................................................................198 View Monitored Events .................................................................................................200 View Current Event Logs..............................................................................................200 Event View......................................................................................................................200 Manage Archive Schedules ...........................................................................................203 Set Maximum File Size ..................................................................................................204 Syslog View/Archive & Report ...........................................................................................205 View Archived Syslogs...................................................................................................205 Content Search Substring(s) Filter ..............................................................................206 View Monitored Syslogs ................................................................................................206 Messages View................................................................................................................207 Sentry II 8.0 User’s Guide p. 5 Version 8.0.12 July 2006 Server/Device Maintenance................................................................................................209 Current Maintenance Schedules ..................................................................................209 Specify Maintenance Schedule for Servers/Devices ...................................................210 Net Toolbox .........................................................................................................................212 Trace Route Parameters ...............................................................................................212 SNMP Parameters .........................................................................................................213 Database Maintenance .......................................................................................................215 AutoPurge Tab ...............................................................................................................215 Objects Tab ....................................................................................................................216 Purge Tab .......................................................................................................................217 Sentry II Server Log............................................................................................................219 Sentry II Server Control Center .........................................................................................221 Appendix A – Local SQL Server Database ........................................................................227 Installing the Sentry II MDF File on a Local SQL Server.........................................227 Sentry II Security Issues for Accessing SQL Database ..............................................230 Appendix B – Remote SQL Server Database .....................................................................231 Sentry II Security Issues for Accessing SQL Database ..............................................234 Appendix C–SQL/ORACLE Requirements........................................................................235 Microsoft SQL Server Checking ..................................................................................235 Oracle Database Checking ............................................................................................235 Appendix D–Moving from Access to SQL Server..............................................................236 Revision Version 8.0.12 - 7/ 10 /2006 Sentry II 8.0 User’s Guide p. 6 Version 8.0.12 July 2006 Introduction Sentry II® is the complete and affordable Server and Network Monitoring System for any business. It is designed as an intranet / internet based, comprehensive Windows, SNMP and SYSLOG monitoring, alerting, diagnosing, collecting and reporting tool for managing availability and performance of servers, workstations, and network devices in IP based networks. Sentry II itself requires Microsoft Windows NT / 2000 / XP / 2003, and for its centralized database operations, it supports Microsoft Access, which by default is installed with the included Access database engine, or optionally Microsoft SQL Server. Sentry II uses Microsoft Internet Explorer to provide easy, remote, secure console access to the Sentry II Server’s built in HTTP server (you do not need IIS or any other web server software), and is best viewed with at least a screen resolution of 1024 x 768 and 16-bit color. Sentry II provides nine monitoring components to accomplish the monitoring, and ties all the monitoring together with its alerting, graphing and reporting components. All monitoring, alerting, diagnosing, graphing, collecting and reporting is centrally available at the Sentry II Server, which in turn can be accessed from anywhere with Sentry II’s remote IE based console. Sentry II 8.0 User’s Guide p. 7 Version 8.0.12 July 2006 Overview ServerWatch Sentry II’s ServerWatch component ensures the smooth operation of all network infrastructure devices, and IP services on any server/device, regardless of the operating system. ServerWatch monitors your WEB, Email and Database services for proper operation --- it lets you monitor and check server IP services such as SNMP, HTTP, FTP, SMTP, POP3, DNS, TELNET, Lotus NOTES servers, and SQL & ORACLE database servers. PING is also available for testing general machine & device availability, and you can create a custom TCP check called USER to connect to any specified port with the option to send a request string and check for a specific response string. With Sentry II’s flexible and powerful alert notification component, you define how, when, and if you are alerted when ServerWatch detects failures of any of your IP services being monitored. When defining ServerWatch watches, you can optionally specify time periods throughout the week when monitoring is automatically suppressed, to accommodate maintenance down-time periods, for example, and/or you can define watches that are dependent on other watches (primary) so that if the primary watched device is down, alert notifications and actions are suppressed on the dependent watched device; for example, suppress alert notifications from servers/devices from half your network if they become unreachable when a particular router or switch is down. ServerWatch provides a dynamic display for “at-a-glance” view of availability and performance of all servers & devices being monitored. Optionally, always display down or failed services at the top of the display to insure visibility. ServerWatch also provides a Discovery feature that automatically locates servers & devices and associated IP services based on servers/workstations in your Windows Domains/Workgroups, and/or based on an IP address range scan. Servers/devices found in the IP address range scan can optionally determine the domain name for identification purposes. ServerWatch Discovery makes Sentry II extremely easy to configure. All ServerWatch monitoring results are logged to Sentry II’s Access or SQL Server database and there is an “IP Service Availability & Performance” report available for either a summary or detailed report on “up-time” and performance of all or selected servers/devices and IP Services, for any timeframe you specify. You can also use the “Alert Notifications” report to see the details of all failures, whether they resulted in an alert notification or not according to your specifications, and view these details on a selected server/device & IP service basis for any selected time frame. For all of ServerWatch’s features and benefits, it is just the tip of the capability of Sentry II for monitoring your Windows servers, and network infrastructure devices. Read on and see the other capabilities that Sentry II provides, and the benefits of implementing this powerful, yet affordable, Server and Network Monitoring System. CounterWatch for Windows & SNMP. Sentry II’s CounterWatch proactively monitors both Windows and SNMP Counters. CounterWatch for Windows monitors the performance of your Windows servers and workstations via the available performance counters installed with Windows, all Microsoft applications, and from various 3rd party applications that take advantage of the performance counter option in Windows. You selectively monitor and gather detailed data about virtually every aspect of server/workstation operation via these available performance Counters. Performance Counters are available for all aspects of the hardware, including CPU, Disk, Memory, and Network, and software including applications such as IIS, SQL Server and Exchange Server. CounterWatch for SNMP, proactively monitors via a poll any SNMP Counter. SNMP Counters are derived via server/device MIBs that you provide to Sentry II for parsing. By default, the Sentry II Server component provides the SNMP CounterWatch polling. However, you can now optionally Sentry II 8.0 User’s Guide p. 8 Version 8.0.12 July 2006 designate one or more deployed Sentry II Agents to act as remote, distributed SNMP CounterWatch polling monitors that forward the SNMP CounterWatch data to the Sentry II Server via the Agent connection. For both Windows and SNMP CounterWatch monitoring, you can optionally have Sentry II use this comprehensive performance data to trigger alerts if specified thresholds are exceeded, and you can generate consolidated performance reports, or dynamic graphs. There is an option to export the raw graph data to a CSV file, which can be viewed and processed by Microsoft Excel. Create your own custom CounterWatch report collection set/templates to monitor, analyze, troubleshoot/diagnose, and report, and make recommendations for improving performance and for solving operational problems. All CounterWatch data is logged to Sentry II’s Access or SQL Server database, giving you centralized control of all the monitoring results, and providing baseline and trending data. EventLogWatch Sentry II’s EventLogWatch monitors your Windows servers and workstations in real-time for entries into the various available Event Logs. This provides you with the ability to monitor virtually any and every event of significance that occurs. You can choose to be alerted for those selected, critical events that you want to know about and act on immediately. When you enable Windows auditing, you can monitor for a variety of auditing events to the Security Event log to significantly increase your server security monitoring. These types of security events include a variety of events for Logon actions, Account Login actions, Account Management actions, Privilege Use actions, and Policy Change actions. EventLog monitoring now takes advantage of Sentry II’s Active Directory integration so that now you can use an Active Directory Groups as a parameter so that any event whose User parameter is a member of the selected Active Directory Group(s) is considered a match. You can centralize your Event Log management by capturing all events or just selected events to Sentry II’s Access or SQL Server database, and run the “Alert Notifications” report to see the captured events for all servers, or selected servers, for a selected time frame. Use the EventLogWatch Display feature to view received, monitored Events dynamically as they occur, and to display up to the previous 24 hours of previously received, monitored Events. For Sarbanes-Oxley and HIPAA compliance assistance with respect to the Event Logs, Sentry II provides a very flexible and powerful Event Log file archiving feature. You define one or more schedules or conditions when the Events Logs on your selected servers and workstations are automatically backed-up and optionally archived to a central storage that you specify. Archived Event Log files are automatically saved in a GZIP compressed format that is very economical on storage requirements. A powerful Event Log Viewer is provided where you can view selected events based on filters that you easily define for: 1) events in the Archived Event Log files, or 2) events in Monitor’s database that were captured with your real-time EventLog Watches, or even 3) events in the actual current Event Log files. You can filter the monitoring and viewing of Event Log data by Log type (Application, System, Security, DNS Server, File Replication Service & Directory Service) and specific Event types (Error, Warning, Information or Audit Success or Failure events), as well as filter based on Event Source, Event IDs, Event Category, User Name or substring in the Event Descriptions; and you can Save your filters and easily Load them again to use them next time you are back in the Viewer. For any events that match your view filter, you have the options to Print, Email, or Export to a CSV file. Sentry II 8.0 User’s Guide p. 9 Version 8.0.12 July 2006 ProcessWatch Sentry II’s ProcessWatch monitors your selected Windows processes to make sure they continue running; and also monitor for ‘rogue’ processes that should not be running. Define alert notifications so you know when critical Windows processes are not running, or ‘rogue’ processes are running. You can optionally have Sentry II attempt to restart the processes not running, or terminate the ‘rogue’ processes that are running. For running processes, you can optionally specify CPU & Memory utilization thresholds, and be alerted if these thresholds are exceeded. Or have ProcessWatch monitor all running processes, and be alerted if any CPU & Memory utilization thresholds you specify are exceeded by any running process, and optionally have ProcessWatch terminate processes that exceed your thresholds. All ProcessWatch alerts are logged to Sentry II’s database, and you can view the history of ProcessWatch alerts in Sentry II’s “Alert Notifications” report. WinServicesWatch Sentry II’s WinServicesWatch monitors your selected Windows services to make sure they are running. Define alert notifications so you know when critical Windows services are not running, including services that are ‘hung’ during startup. You can optionally have Sentry II attempt to restart these services that are not running or ‘hung’. All service failures are logged to Sentry II’s database, and you can view the history of service failures in Sentry II’s “Alert Notifications” report. FileWatch Sentry II’s FileWatch monitors your select Windows server & workstation files. You choose the files you want Sentry II to watch. You can specify wild-cards to monitor groups of files, or even specify a folder name and monitor the whole folder for any changes including file additions and deletions. You can optionally choose to be alerted, using Sentry II's standard alert notification options, when watched files or folders have met one of the optional conditions you specify. These options are: the file is created and exists, the file has exceeded a specified maximum size, the file size changes from its current size, the file last modified date/time changes, or the file contains a specified substring. There is a powerful ‘NOT’ option to check for the inverse of all of the above conditions, including watching for files to be deleted. The substring search is optimized to only check when new data is added to the file. Use FileWatch to monitor 3rd party application log text files, watch for “hacked” files that should not have changed, or monitor key files that you expect to change and be updated on a regular basis. And when you have appropriate Windows auditing enabled, you can know not only what, when, and where but also WHO caused the FileWatch alert. CustomWatch Sentry II’s CustomWatch monitors your Windows servers/workstations by executing any Windows program, command, script, or batch file executable that you provide. It runs the executable periodically on the monitored server/workstation according to a schedule that you specify. You can optionally specify a comparison of the executable’s Exit Code to an exit code you specify, and generate an alert notification if the comparison fails. You can optionally specify an Executable Time-Out value and Sentry II will terminate the executable if it does not complete on its own before the time-out expires; you can optionally specify Logon credentials and Sentry II will start the executable under the user context of these credentials; and the specification for the executable, and for the optional command-line options, support Environment Variable substitution when bracketed with the percent character; for example, %SystemRoot%. Use the powerful CustomWatch to create your own custom monitors but also use CustomWatch as a central Windows Job Scheduler, and easily manage the scheduled execution of all your jobs across all your servers and workstations from the central Sentry II Server. Logical Drive, Page File, Registry & HW Configuration, and Server Reboot Check In addition to the various Windows ‘Watch’ monitoring features described above, Sentry II also provides the ability to easily monitor and dynamically display select Registry values, and Logical Drive & Page File information including available Free Space. Sentry II 8.0 User’s Guide p. 10 Version 8.0.12 July 2006 For the Logical Drive & Page File monitoring, you can easily enable an alert notification and be notified when available Free Space drops below a threshold you define. For the Registry & Hardware Configuration monitoring, you optionally choose to be alerted when Hardware Configuration changes are detected, or select Registry Key/Value additions, changes, or deletions are detected. For the Server Reboot Check, you optionally choose to be alerted when a monitored server reboot/restart check is detected. SNMPWatch Sentry II’s SNMPWatch monitors your SNMP enabled servers and network devices for SNMP Traps. You specify the SNMP Traps that are monitored and the acceptable servers and network devices where they can originate. Optionally define alert notifications that are executed upon receipt of specific SNMP Traps. Review the history of all or selected SNMP Traps received in the Sentry II “Alert Notifications” report. There is a MIB parsing feature to extract and make available the SNMP Trap OIDs from your server and device MIBs, to make it simple to define the watches for SNMP Traps. Use the SNMPTrapWatch Display feature to view received, monitored Traps dynamically as they occur, and to display up to the previous 24 hours of previously received, monitored Traps. Similar to the SNMP CounterWatch monitoring, there is now an option to designate one or more Agents to act as remote distributed SNMP Trap monitors. Traps that match your defined watches are forwarded on to the Sentry II Server over the existing Agent connection for logging to the database and any alert notification processing. SYSLOGWatch Sentry II’s SYSLOGWatch monitors SYSLOG messages transmitted from your selected servers and network/infrastructure devices such as firewalls and routers. The Sentry II Server listens on the standard SYSLOG UDP port for these messages and processes them according to your specified SYSLOG Watch/Alerts. You can be alerted when selected SYSLOG messages are received, and you can use SYSLOGWatch to centralize your SYSLOG collection, management and reporting. Review the history of all or selected SYSLOG messages received in the Sentry II “Alert Notifications” report. Use the SYSLOGWatch Display feature to view received, monitored SYSLOG messages dynamically as they occur, and to display up to the previous 24 hours of previously received, monitored SYSLOG messages. For Sarbanes-Oxley and HIPAA compliance assistance with respect to the SYSLOG messages, Sentry II provides a very flexible and powerful SYSLOG message archiving feature. You optionally define in a SYSLOG Watch/Alert whether you want the SYSLOG messages archived for long term storage and saving. Archived SYSLOG messages are automatically saved in a GZIP compressed files that are very economical on storage requirements. A powerful SYSLOG Archive Viewer is provided where you can view selected Archived SYSLOG messages based on filters that you easily define for: 1) SYSLOG messages in the Archived SYSLOG files, or 2) events in Monitor’s database that were captured with your real-time SYSLOG Watches. You can filter the monitoring and viewing of SYSLOG messages based on content with the ability to specify compound/complex search string criteria. For any SYSLOG messages that match your view filter, you have the options to Print, Email, or Export to a CSV file. Now there is an option to designate one or more Sentry II Agents as remote, distributed Syslog collectors/servers. Agents so designated will optionally forward received Syslog messages to the Sentry II Server over the encrypted Agent connection for logging and alert notification processing, depending on your SyslogWatch rules. Archiving to flat text GZipped compressed files can also be optionally enabled to storage available from the Agent machine. Sentry II 8.0 User’s Guide p. 11 Version 8.0.12 July 2006 Alert Options Sentry II’s Alert options provide for Email, Pager, Beeper, SYSLOG, and/or SNMPTrap alert notifications. And you can optionally execute any program, command, or batch file, with macro substituted input arguments at run time, when an alert condition occurs. The execution can be local on the Sentry II Server, or remote on the Windows server/workstation that caused one of an EventLogWatch, ProcessWatch, WinServicesWatch, FileWatch, CustomWatch or CounterWatch alert. There is an Email Group feature so that it is very easy to manage sending Email alerts to multiple Email recipients. When defining the Alert notification action, you simply reference the Email Group name. There is a custom Email text option so you can compose the text for an Email alert the way you want it. Both the custom Email text and the Email subject parameter support the same macros as the program arguments, so that the specific information such as server/device name, IP address, date/time, status, and Watch/Alert name are substituted. Report Options Sentry II’s Report options include an “Alert Notifications” report where you can report on all logged occurrences of your active Watch/Alerts, including IP Service checks, EventLog events, ProcessWatch alerts, WinServicesWatch alerts, FileWatch alerts, CustomWatch alerts, SNMP Trap alerts, SYSLOG messages, and report on all or selected servers/devices, for any selected time-frame. There is an ”IP Services Availability & Performance” report where you can report on the up-time percentage and the response performance of all your active IP Services ServerWatch checks such as PING, HTTP, SMTP/POP3, and others. There is a summary option, and an option to report on all or selected servers/devices, for any selected time frame You can create any number of custom “CounterWatch” reports, for Windows or SNMP, and analyze monitored counter values from any one or more selected servers/devices, for minimum, maximum, and average values over any selected monitored time-frame, and including a Graph so you can pinpoint spikes and other periods of abnormal behavior. There is an “Exclude Time-Period” feature so that you can specify time-of-day and day-of-week time-periods that you want to exclude from the report analysis so that you can easily create reports consistent with your Service Level Agreements. All Sentry II reports can be optionally scheduled to run periodically, and automatically, with complete flexibility in selecting the servers/devices reported on, and for what time frame; and you can easily manage your queue of currently scheduled reports. Report output can be optionally emailed, or a link to the HTML report output can be emailed, to one or more recipients. The Email Group feature is supported for specifying recipients of the report Email. Graph Options With Sentry II’s Graph options you can create and save any number of Graph templates to view any selected set of Windows and SNMP Counters, from one or more servers/devices, for any time-frame, historic or current. Graphs can be customized and saved in terms of look, density, type and a number of other properties. Graph playback of historic or current data is dynamic, and can be stopped, played in fast speed, or reverse, to easily analyze any monitored period. The Graphs are a powerful tool for viewing and analyzing all your Windows and SNMP CounterWatch monitored data. Graphs, as previously mentioned, are included with all your CounterWatch Reports so that you can easily pinpoint unusual behavior of each monitored Counter for the time-frame being analyzed and reported Hardware Asset/Configuration Information With Sentry II’s WMI (Windows Management Instrumentation) support, you can now easily and automatically track the hardware asset/configuration details of all your Windows servers/workstations. View and optionally print the Sentry II 8.0 User’s Guide p. 12 Version 8.0.12 July 2006 hardware details report per server/workstation, and optionally choose to be alerted automatically when Sentry II detects changes to the Hardware Configuration. Security Options Sentry II provides very flexible Security options. You can define authorized Users, with different security and rights to access and use the various Sentry II features. You can restrict select Users to have access to only a subset of the various Groups of servers/devices you define. This way you limit different Users to different subsets of your monitored network. You can also assign ‘Ownership’ rights to Sentry II Reports and Graphs so that Users only can access and view Reports and Graphs that they own or are owned by ‘All’. Now with Sentry II’s Active Directory integration, you can specify an Active Directory Group so that any User who is a member of the Group is considered an authorized User. And if you choose, Sentry II will authenticate your LoginName/Password with Active Directory so you can use your standard Windows login for Sentry II’s console. Sentry II's Internet Explorer Based ‘Console’ You access the Sentry II Server and its associated Access or SQL Server database to observe the monitoring, track alerts, watch server status, and run performance reports and dynamic graphs from anywhere you have Internet Explorer and IP access to the Sentry II Server. (Sentry II is best viewed with a screen resolution of 1024x768 and 16-bit color or better. See Performance Tips below for more information about optimizing Sentry II use and access.) The Sentry II Server component manages the Sentry II Access or SQL Server database and functions as an HTTP web server. This capability is built in to Sentry II and you do NOT need any other web software such as IIS. The Sentry II user interface is designed and implemented around this web server feature. For this reason, you use Microsoft Internet Explorer installed on any computer, acting as the Sentry II console, for access to the Sentry II Server. (Note: The first time you connect from any particular machine acting as the Sentry II you must allow the secure and signed ActiveX console components to be downloaded and installed.) The Sentry II ‘Console’ uses HTTP to request and download the various user interface pages, and once the page is loaded, a secure encrypted and compressed TCP connection, using technology in the downloaded ActiveX Control, is created back to the Sentry II Server and all subsequent transmissions between the ‘Consol’ and the Sentry II Server are done over this ecure TCP connection. The Sentry II Server component also contains an "embedded" Internet Explorer browser that communicates with the built-in web server. When you run the Sentry II Server the first time as a foreground/desktop application the default view is with the embedded browser. (See the next section on Installation to setup running the Sentry II Server as a Windows service; and see Sentry II Server Help for more information about the other Server Views when running as a foreground/desktop application.). This intranet, web-based technology provides you with the ultimate flexibility, security, and control when using Sentry II. Your access to the ‘Console’ is also secure; you define authorized users with appropriate rights, and with Sentry II’s Active Directory integration, you can specify an Active Directory Group so that any User who is a member of the Group is considered an authorized User. If you choose, Sentry II will authenticate your LoginName/Password with Active Directory so you can use your standard Windows login for Sentry II’s console. Sentry II 8.0 User’s Guide p. 13 Version 8.0.12 July 2006 Accessing Sentry II with a Remote ‘Console’ You can access the Sentry II Server remotely from any computer that has Microsoft's Internet Explorer and TCP/IP connectivity. This remote access provides full access to Sentry II's features, such as graphs, monitoring, alerts, reports and administration. Connect to the Sentry II Server's built in web server just like you would connect to any web site. In IE’s URL address line, put the IP address of the Sentry II Server machine or its Domain name, and use port 81. For example, http://n.n.n.n:81 or, http://Sentry IIMachineName:81 The first time you do this from another computer, Sentry II will download and register the appropriate secure and signed ActiveX components from the Sentry II Server installation directory (see “...\Sentry II\Controls folder). For subsequent access to the Sentry II Server from this computer, all components are stored locally, eliminating the need to download them again. Sentry II uses ports 81 and 82 by default but these can be reconfigured to avoid port conflicts with other applications. See the Properties description in the Sentry II Server Control Center section later in this document on how to change the port assignments; or run the ‘Sentry II Server Config File’ utility Problems in successfully connecting to the Sentry II Server from another machine using Internet Explorer are usually related to 1) Proxy Server settings in IE; or 2) Firewall restrictions. It is also possible there is a port conflict with Sentry II’s default ports 81 & 82, and some other application using the same ports. Sentry II Licensing Sentry II is licensed based on the number of servers, workstations, and devices you are monitoring at unique IP addresses. All of Sentry II’s available monitoring features can be configured for a single server or device at a unique IP address, and this only counts as one license. It is also permitted to add multiple server, workstation, and device entries, such that the total number of uniquely named entries exceeds your license count. This is permitted so long as the total number of unique IP addresses for these entries, plus Sentry II Agents where there is more than one Agent registered per unique IP address, does not exceed your maximum license count. You can, for example, have more than one Agent entered and registered at the same IP address, but each additional Agent beyond the first at an IP address counts toward the license. (More than one Agent at the same IP address occurs when the monitored servers and workstations are “behind” a NAT device, a shared Cable Modem or DSL WAN router that presents a single IP address to the world). This feature of the licensing is actually quite useful. For example, if you want to perform several different HTTP checks to your web server at a particular IP address, you can add multiple server entries, each with a different name but with the same IP address. Configure the IP Service HTTP parameters for each entry according to the type of check you want to perform; then go to Configure Watches/Alerts to configure a watch on each, with their own special schedule & action parameters. There is no cost for the Sentry II Server component itself, only for the number of servers/devices, at unique IP addresses as described above, that it is monitoring. There is also no cost for the number of IE based local and remote Sentry II consoles you have running at any one time. Sentry II 8.0 User’s Guide p. 14 Version 8.0.12 July 2006 Installation Instructions This section includes the steps for upgrading your current Sentry II version to the newest version, as well as the steps for installing the: Sentry II Server Using Microsoft SQL Server (Optional) Sentry II Agent (Optional) Uninstalling Sentry II Agent Upgrade Your Current Sentry II to the Latest There is a single, simple Upgrade if your current Sentry II version is 6.0.00 or greater. Contact Support if you are using an earlier Sentry II version. Only if your current Sentry II version is 6.0.00 or greater, then: Run “Sentry II_FullSetup.exe”, from the folder where you downloaded and saved, to start the installation program for the new version, and follow the on-screen install directions. Choose the same directory to install the new version over the current version; your current configuration and database information are preserved. Your upgrade is now complete! At the prompt at the end of Setup about restarting the Sentry II Server service (if you were previously running the Sentry II Server as a service), choose OK, and your Sentry II Server service is restarted and back up and running with the new version. Installing the Sentry II Server The Setup program will install the Sentry II Server and Agent applications on the computer you want to be designated as the Server computer. ⇒ Exit all programs. ⇒ To install Sentry II, simply run the Setup_Sentry II.exe program from the CD, or Sentry II_FullSetup.exe from your download folder where saved. Note: If your system does not meet Sentry II requirements, it will notify you of each aspect throughout installation. ⇒ You will see the Sentry II Welcome Screen. Click Next. ⇒ Now you are brought to the License Agreement. Click Yes if you agree to the terms of the agreement. Click No to exit Sentry II setup. ⇒ The Read Me file will be displayed (it is also accessible prior to installation). Read through the notes and click Next to continue. Sentry II 8.0 User’s Guide p. 15 Version 8.0.12 July 2006 ⇒ Sentry II will provide a default directory for installation, which is C:\Program Files\Sentry II. If you wish to change this directory, click Browse to choose a different folder. Choose Next to continue. ⇒ Sentry II will determine whether you have enough free disk space to install the program. If you do not, then you must choose another drive or create enough space for the program. ⇒ Sentry II will ask to create the Program folder for you. Click Yes. ⇒ The next screen provides you with some various configuration and startup options. The options are as follows: -Add Server shortcut to the desktop -Add Sentry II Console shortcut to the desktop By default, both options are checked. Select the options you wish to have, and choose Next. ⇒ Sentry II will display a summary page so that you can review your installation options and settings. Take a moment to read through them. You can change any of the settings by clicking on the Back button and returning to the appropriate dialog to make changes. Click Next to return to the summary page. Once you have determined your settings, click Next. Sentry II will copy the necessary program files to your system. ⇒ If a “Media Error” is reported at this point, the most likely reason is that the Sentry II Server or Agent is still running, or an IE instance with a Sentry II access is active. Insure the Server, Agent, and any local IE Sentry II displays are stopped. ⇒ When Sentry II has finished installing all the necessary files, you will be brought to a screen to perform Electronic Registration. Click Finish when done. ⇒ After Sentry II has finished, it may ask you if you wish to restart your computer. Restart the computer, and you can now begin to use the product. ⇒ Start the Sentry II Server by double-clicking the spider-web icon called Sentry II Server on the desktop, and run the Sentry II Server as a foreground/desktop application. (See the next section for details on how to configure the Sentry II Server to run as a Windows service). When the Sentry II Server completes loading and starting up, select the Quick Start option from the Introduction screen by clicking on the “check-list” icon shown above. Sentry II Server as a Windows Service After you run the Sentry II Server the first time as a foreground/desktop application, you can select the Sentry II Server menu item Service, and then Settings to enable the Sentry II Server service. Sentry II 8.0 User’s Guide p. 16 Version 8.0.12 July 2006 If the Sentry II Server Service is created successfully, you exit the Sentry II Server component, running as a foreground/desktop application, and the Server Service will automatically restart the Server component under its control and without the 'console' interface. Thereafter, when you log-out, or reboot the machine and on restart, the ‘Sentry II Server Service’ runs, and in turn, it runs the Server component. Control the Server Service You stop and start the Sentry II Server component via the 'Sentry II Server Service’ using the Windows Services applet. You access the Sentry II Server component by double-click on the 'Sentry II Console' icon to start the 'console' interface. Service Logon Property By default, the ‘Sentry II Server Service’ runs under the ‘Local System Account’. Hence, there may be scenarios when you may need to set the Sentry II Server Service 'Logon' Property to 'Administrator'. For example, if you are using a remote SQL Server for Sentry II’s database, you will need to set the ‘Logon’ Property to an Administrator or equivalent. You will also likely need to set the ‘Logon’ property if you want to use Sentry II’s Active Directory integration. Sentry II Server Self-Monitoring When the Sentry II Server component is running under the auspices of the Sentry II Server Service, the Service monitors the Server component process called RPMCCS.EXE to make sure it is running. The Service also expects to receive timely ‘keep-alive’/’heart-beat’ signals from the Server component process. If the Service does not receive the timely ‘keep-alive’/’heart-beat’ signals indicating the Server component process is not functioning correctly, or if the Server component process RPMCCS.EXE is not running at all, the Service terminates the Server component process and then restarts it. Optional Microsoft SQL Server Installation Steps The first time the Sentry II Server is run it will attempt to open its database. If the database names have not yet been defined through the ODBC Data Sources (located on the Control Panel or in Administrative Tools), a dialog will appear. If SQL Server is installed on the same computer as the Sentry II Server, you will be presented with 3 options. Otherwise you are presented with two. If you are going to use the default Access or SQL database locally, reply to the prompts accordingly and Sentry II will configure itself to use Access or SQL automatically. If you choose to use Microsoft SQL Server as the remote Sentry II database several additional steps are required. Sentry II 8.0 User’s Guide p. 17 Version 8.0.12 July 2006 For detailed installation steps of configuring Sentry II for use of a remote SQL database, see Appendix B. Sentry II Agent Installation Steps Install the Sentry II Agent on those Microsoft Windows NT / 2000 / XP / 2003 based server and workstation computers in your network when you want CustomWatch, ProcessWatch, WinServicesWatch, EventLogWatch, FileWatch and/or Windows CounterWatch monitoring. The Sentry II Agent installs and runs as a service. The Sentry II Agent is not required for using the ServerWatch, SYSLOGWatch, SNMP CounterWatch, or SNMP Trap Watch features (see Configure Servers/Agents & Devices and Configure Watches/Alerts). You can optionally designate and use one or more deployed Sentry II Agents as Syslog and SNMP Trap & Query collector/monitoring servers for monitoring your remote infrastructure devices. This is transparently integrated into all the standard Sentry II Watches, Displays, and Reports after you make the appropriate Agent designations and Device assignments in Configure Servers/Agents & Devices. The Agent requires port 82 by default and uses port 82 outbound to initial a secure TCP connection to the Sentry II Server. All transmissions between the Agent and Sentry II Server are sent encrypted, and if necessary compressed over this TCP connection. Global Agent Management for Automatic Push Agent Installation The recommended method for installing, or updating, the Sentry II Agent service on your Windows NT / 2000 / XP / 2003 servers and workstations is to use the 'One-Button' Push feature for installation. This feature is available in Configure Servers/Agents & Devices from a single screen, called Manage Agents, where you mange all your Agents centrally. You can view installed Agent versions, view servers and/or workstations in all your Windows Domains and Workgroups that are not currently configured in Sentry II, and you can select one or more NT / 2000 / XP / 2003 servers/workstations for a batch install/update with a single click. (See the Configure Servers/Agents & Devices for managing the servers, workstation, and network devices that you want to monitor). This 'One-Button' click to push the Sentry II Agent files down to selected NT / 2000 / XP / 2003 servers/workstations, installs or updates the Sentry II Agent service and starts the service, all without requiring a server reboot. This feature does require that you have Administrative Share rights to the server where you want to install the Sentry II Agent. Use the Logon feature available on Manage Agents to specify your Administrator logon credentials, or configure and save them in the Configure Domain Information function. On subsequent updates of connected Agents, no share rights or Logon credentials are required since the Sentry II Server signals the selected connected Agents to download the updated files and update them selves. See Configure Servers/Agents & Devices -> Manage Agents for more information on using this preferred approach for installing and managing your Sentry II Agents. Alternative Automatic Pull Agent Installation If due to geographic limitations or other security restrictions, you cannot use the ‘Push’ method to install the Agent the first time; an alternative for the Agent installation is to pull the Agent down Sentry II 8.0 User’s Guide p. 18 Version 8.0.12 July 2006 from the Sentry II Server. Follow these two steps, if you have Internet Explorer on your server or workstation, which automate most of the steps for "pulling" the required Agent files to the server: ⇒ At your server or workstation, run Internet Explorer version 5 or higher and connect to the Sentry II Server computer using the following URL: http://nn.nn.nn.nn:81/InstallAgent.asp where nn.nn.nn.nn is the IP address of the Sentry II Server computer. If you currently use a remote control program such as CoSession, pcAnywhere, or Terminal Server, you can use it to connect to the target server to run IE and connect back to the Sentry II Server. ⇒ When you connect to the above URL on the Sentry II Server, it checks to make sure the machine name and IP Address is unique in Sentry II, and if a duplicate named entry already exists at a different IP Address, you are prompted to enter a unique name to be used for this server/workstation. Once the unique name is verified, you will be prompted to confirm the download of the Sentry II Agent software. Press the OK button, and the Sentry II Agent software will be downloaded and installed. The Agent is installed and runs as a service. After the installation, it will load the Sentry II Agent and automatically register your server to the Sentry II Server database. Sentry II can now do CustomWatch, ProcessWatch, WinServicesWatch, FileWatch, CounterWatch and EventLogWatch monitoring of your NT / 2000 / XP / 2003 servers and workstations. Alternative Manual Agent Installation If you cannot use the Push or Pull Agent installation options, you can manually install the Sentry II Agent. Follow these steps: ⇒ Copy the Sentry II Agent, RpmAgent.exe, the Sentry II AgentService.exe and AgentEvents.dll, and Sentry II User Alert support, Sentry IIAlert.exe, from the Bin folder of the Sentry II Server install directory to "\WINNT\SYSTEM32" (or \PROGRAM FILES\Sentry II) folder on the server or workstation you want to monitor. If you currently use a remote control program such as CoSession, pcAnywhere, or Terminal Server, you can use it to connect to your server and remotely perform these steps. ⇒ Next run: AgentService.exe –i arg1 82 arg2 arg3 to install the Agent as a service. Arg1 is the Sentry II Server IP address (e.g. 192.168.1.100) so the Agent knows where to connect; 82 is the default port that the Sentry II Server listens for Agents; arg2 is the fully qualified path name for the RpmAgent.exe (e.g. C:\WINNT\SYSTEM32\RpmAgent.exe); and arg3, which is optional, and if specified, is the name that the Agent uses for this server/workstation when it connects and registers with the Sentry II Server. ⇒ For example, AgentService.exe –i 192.168.1.100 82 c:\winnt\system32\RpmAgent.exe ⇒ When this completes then run "AgentService.exe -s" to start the Sentry II Agent Service. There is no need to reboot the server. Sentry II 8.0 User’s Guide p. 19 Version 8.0.12 July 2006 The Sentry II Agent will automatically attempt connection to the Sentry II Server after about a 30 second delay. Once the Sentry II Agent connects, it will automatically register. Automatic Agent Registration Once the Sentry II Agent connects to the Sentry II Server the first time, it will automatically register itself in the Sentry II database, using its predefined computer name. Its available counters and services for monitoring are also uploaded and revealed to the Sentry II Server If you have previously used the Configure Servers/Agents & Devices to add this server or workstation to the Sentry II Server database, under a different name, you will have duplicate entries, and will have to use Configure Servers/Agents & Devices to manually resolve this. You can inhibit Automatic Agent Registration with a setting in Configure Security. Uninstalling the Sentry II Agent The Sentry II Agent is uninstalled when you ‘Delete’ the corresponding server/workstation entry in Configure Servers/Agents & Devices at the Sentry II Server. As part of the delete processing, the Sentry II Server sends a message to the Agent to uninstall itself. Alternatively, for example if the Agent was not connected when deleting the server entry, there are two options for manually uninstalling the Agent: Manual Uninstall Option 1 ⇒ At your server or workstation, run the “RpmAgent.exe” with the following command-line argument: /UnregServer For example: RpmAgent.exe /UnregServer ⇒ Then, run the “AgentService.exe”, normally it is stored in the \WINNT\SYSTEM32 (or \PROGRAM FILES\Sentry II) folder, with the following command-line argument: -u For example: AgentService.exe –u ⇒ Next, delete the “RpmAgent.exe”, “AgentService.exe”, “AgentEvents.dll”.and “Sentry IIAlert.exe” from the folder where you copied them originally. Manual Uninstall Option 2 ⇒ At your server or workstation, run Internet Explorer and connect to the Sentry II Server computer using the following URL: http://nn.nn.nn.nn:81/UninstallAgent.asp where nn.nn.nn.nn is the IP address of the Sentry II Server computer. If you currently use a remote control program such as CoSession2000, pcAnywhere, or Terminal Server, you can use it to connect to your server to run IE and connect to the Sentry II Server. ⇒ When you connect to the above URL on the Sentry II Server, you may be prompted to confirm the download of required Sentry II software. Press the OK button and the Sentry II Agent software will be uninstalled. Sentry II 8.0 User’s Guide p. 20 Version 8.0.12 July 2006 ⇒ It may be necessary to restart in order to complete the deletion of all Agent files. Sentry II 8.0 User’s Guide p. 21 Version 8.0.12 July 2006 Feature Overview Access all functions of Sentry II in one of two ways, (1) by clicking on the down-arrow button in the upper-right-hand corner to display a drop-down menu of functions, or (2) from the "Microsoft Outlook" style menu on the left. Sentry II Menus Drop-down Menu The first item in the drop down, "Open in New Window", defines whether the selected function is opened in a separate window. Click it to toggle the state. (You may need to change your IE setting “Reuse Windows for launching shortcuts” under the “Tools-> Internet Options->Advanced” and uncheck this setting). Using the mouse, highlight the desired function, and click to choose it. It will open in the same window or a new window based on the state of "Open in New Window". Sentry II 8.0 User’s Guide p. 22 Version 8.0.12 July 2006 "Outlook" Style Menu Click the "Configure", "Monitor", “Display”, "Report", “Archive” or "Utilities" tab to scroll the associated functions into view. The Sentry II “Outlook” menu is always available, so you can select another function or tab at any time. Configure From the "Configure" tab menu, you can select functions to: • Discover and Define the Servers, Workstations, & Devices in your network that you will be monitoring, and manage the install/update of the Sentry II Agent on your NT/2000/XP/2003 servers & workstations. • Create and Edit the Watches & Alerts that you use to monitor and action select Windows Services, Processes, Event Log events, watched Files, SNMP & Windows Performance Counters, Custom Watches, SNMP Traps, SYSLOG messages, and IP Services that you decide are critical. • Define Groups to organize these Servers/Devices into meaningful groupings. • Define your Domains and Workgroups, and optionally User logon credentials • Define SNMP Trap definitions for SNMPWatch and/or parse MIBs for SNMP Trap information. • Enable Security by defining your authorized Administrators and Analysts. Sentry II 8.0 User’s Guide p. 23 Version 8.0.12 July 2006 Monitor From the "Monitor" tab menu, you can select functions to: • Use the System Monitor to view the status of deployed Sentry II Agents on your servers/workstations as well as other parameters such as system uptime, number of processes, number of threads, percent Registry quota in use. • Use MemoryWatch Monitor to view and monitor the memory utilization of all Windows servers/workstations with the Sentry II Agent • Use HDDWatch Monitor to view and monitor the Hard Disk Drives/Logical Disk Drives of all Windows servers/workstations with the Sentry II Agent • Use RegistryWatch Monitoring to view and selected Registry entries for all Windows servers/workstations with the Sentry II Agent • Use CounterWatch Graphs to graphically display one or more charts of dynamic and/or historic monitoring activity of your Microsoft Windows servers and workstations & SNMP servers and network devices • Manage CounterWatch monitoring that you are manually controlling from the Tree view of all your available Windows servers and workstations & SNMP servers and network devices • Schedule CounterWatch monitoring of your Windows servers and workstations & SNMP servers and network devices using your custom templates of the selected counters you are interested in monitoring Sentry II 8.0 User’s Guide p. 24 Version 8.0.12 July 2006 Display From the "Display" tab menu, you can select functions to: • Cycle through the various Sentry II status displays on this ‘Display’ menu and the previous ‘Monitor’ menu. You select which displays and what the cycle time is. • Watch current Network Status by Group or by Server/Device; click to view outstanding alerts per server/device. • Watch current ServerWatch activity and status, and optionally specify the status display of selected Servers. • Watch current EventLogWatch activity, and optionally define filters to watch for only selected Events. . • Watch current SYSLOGWatch activity, and optionally define filters to watch for only selected SYSLOG messages. • Watch current SNMPTrap activity, and optionally define filters to watch for only selected SNMP Traps . • Watch current Alert activity, and optionally define filters to watch for only selected Alerts. Sentry II 8.0 User’s Guide p. 25 Version 8.0.12 July 2006 Report From the "Report" tab menu, you can select functions to: • Create and maintain the set of CounterWatch Reports you use to analyze the operation and performance of your Windows server and workstation & SNMP servers and network devices • Schedule reports to run periodically and automatically with complete flexibility in specifying selected servers/devices, and time frame. • Run reports and Analyze the data from all the monitoring activity, and server watch activity, then View, and/or print, the Report results. Sentry II 8.0 User’s Guide p. 26 Version 8.0.12 July 2006 Archive From the "Archive" tab menu, you can select functions to: • View Event Logs of your Windows NT/2000/XP/2003 servers and workstations that you have Archived, or on the actual servers/workstations; or view events in the database captured via your EventLog Watches; Print, Email, or Export your list of events that match your specified filter(s). • View SYSLOG messages captured from your servers and infrastructure devices that you have Archived; or view SYSLOG messages in the database captured via your SYSLOG Watches; Print, Email, or Export your list of SYSLOG messages that match your specified filter(s). Sentry II 8.0 User’s Guide p. 27 Version 8.0.12 July 2006 Utilities From the "Utilities" tab menu, you can select functions to: • Easily define Maintenance periods when you want to disable monitoring and alerting for select servers/devices for a one time period or for repeat periods. • Use Net Tools for a Trace Route, DNS Lookup, SNMP Query View or PING. • View the dynamic Sentry II Server log to watch the Sentry II Server activity. • Database Maintenance, such as purging old information and compacting to reclaim space. • Return to the Introduction page. Introduction Options The Introduction page offers a Quick Start option and tips on navigating Sentry II and getting help: Sentry II 8.0 User’s Guide p. 28 Version 8.0.12 July 2006 • Click the “QuickStart” or the “Complete Checklist” alternative for an overview of steps to get up and running with Sentry II quickly and easily. • Click the "Question Mark" button for Help on any Sentry II feature. • Click the “Down Arrow” button for a drop-down menu of Sentry II functions. Online Help This User’s Guide is also available from the Sentry II ‘console’ interface. To obtain context-sensitive help, simply click on the question-mark button in the upper right-hand corner of the Sentry II screen. The context-sensitive help is displayed in a separate display area. For example: Sentry II 8.0 User’s Guide p. 29 Version 8.0.12 July 2006 What Next After Installation Start the Sentry II Server, by double-clicking ‘web’ the icon on the desktop, or by going to: “Start->Program Files->Sentry II->Server.” After the Sentry II Server starts, select the Quick Start option from the Introduction screen by clicking on the “check-list” icon shown at left. Follow the three steps, using the active links, to set up ServerWatch of the servers, workstations, and network devices you want to monitor. After you complete Quick Start, choose the “complete checklist” option and follow the steps there, using the active links, to get up and running with all of Sentry II’s features. These steps are summarized below: I. Configure Your Servers, Workstations, and Network Devices You Want to Monitor • Select Configure Servers/Agents & Devices , New, then Discovery to find and add your servers/workstations, and network/infrastructure devices you want to monitor with ServerWatch, SYSLOGWatch or SNMPTrapWatch. • Optionally, in Configure Servers/Agents & Devices , install the Sentry II Agent on your Microsoft Windows servers and workstations that you want to monitor with EventLogWatch, ProcessWatch, CustomWatch, FileWatch, WinServicesWatch and CounterWatch. • Optionally, select Configure Groups , New feature to define groups for organizing your servers, workstation and network devices. Then go back to Configure Servers/Agents & Devices, Lookup, and then Edit each server/device you want to reassign to a new Group. • Optionally, select Configure Security to define one or more authorized users with a login and password and various access and usage rights. • to define one or more SNMP Trap Optionally, select Configure SNMP Trap Definitions IDs used by Configure Watches/Alerts when defining SNMP Trap Watches. • Optionally, select Configure Domain Information to define your Windows Domain, Workgroups and Standalones, and optionally the Logon credentials for each. • Select Configure Watches/Alerts , New to define your File Watch, ProcessWatch, CustomWatch, WinServicesWatch, CounterWatch, EventLogWatch, ServerWatch, SYSLOGWatch and SNMPTrapWatch monitoring. Specify optional alert actions to be taken when monitored SNMP Traps are received, SYSLOG messages are received, Event Log events occur, Servers are not available and/or when Windows and SNMP Counters exceed your defined thresholds. Sentry II 8.0 User’s Guide p. 30 Version 8.0.12 July 2006 II. Monitor Your Servers, Workstations and Network Devices • Select Network Status Display to display the status of your server & network devices and by extension the Groups that they are members of. You can optionally ‘drill-down’ and display the outstanding alerts for any server/device within a specified status interval. • Select AlertWatch Display to display all alerts as they occur; optionally use the Configure Filter to specify only specific alert types that you want displayed as they occur. • Select ServerWatch Display to display the real-time status of your IP Services you are monitoring; optionally use the Configure Filter to choose only specific servers/devices and/or IP Services to display their real-time status. • Select EventLogWatch Display to display all watched for Events as they occur; optionally use the Configure Filter to specify only specific watched for Event types that you want displayed as they occur. • Select SNMPTrapWatch Display to display all watched for SNMP Traps as they occur; optionally use the Configure Filter to specify only specific watched for Trap types that you want displayed as they occur. • Select SYSLOGWatch Display to display all watched for SYSLOG messages as they occur; optionally use the Configure Filter to specify only specific watched for SYSLOG types that you want displayed as they occur... For your Windows computers with the Sentry II Agent installed: • to view and monitor the memory utilization of all Select MemoryWatch Monitoring Windows servers/workstations with the Sentry II Agent. • Select HDDWatch Monitoring to view and monitor the Hard Disk Drives/Logical Disk Drives of all Windows servers/workstations with the Sentry II Agent. • Select RegistryWatch Monitoring to view and monitor selected Registry entries of all Windows servers/workstations with the Sentry II Agent. • Select CounterWatch Graphs to create, save/recall, and view dynamic, historic or realtime charts of your monitored CounterWatch counters. • Select Schedule CounterWatch Monitoring , using your predefined reports (see Create CounterWatch Reports), and specify the start date/time and duration to monitor and accumulate CounterWatch performance data. • Select Manage CounterWatch Monitoring , to see your current active CounterWatch counters, or to manually select CounterWatch counters for monitoring. Sentry II 8.0 User’s Guide p. 31 Version 8.0.12 July 2006 III. Analyze & Report Your Monitoring Data • For your Windows servers/workstations with the Sentry II Agent installed, and for your SNMP servers/devices, select Create CounterWatch Reports to create specific CounterWatch reports, from among the built in collection-set templates or your custom created collection-set templates. Use Schedule CounterWatch Monitoring to monitor and gather data for the selected counters, from the specified servers/workstations/devices in the report. • Then select Run/Analyze & View Reports , after the performance data gathering has completed, to analyze, view and/or print the results of the CounterWatch performance monitoring for your defined reports. • Select Schedule Periodic Reports and schedule any of the Sentry II reports to run automatically and periodically with complete flexibility in specifying servers/devices and time frames to report on. • For your servers/devices that are monitored with ServerWatch, select Run/Analyze & View Reports , Service Availability & Performance to generate reports of the availability and response performance for one or more of the servers/devices you are monitoring. Specify the historical interval to analyze, then view and/or print the results. • For a report of failures on any or all of the servers, workstations, and devices you are monitoring with any of Sentry II’s monitoring components, select Run/Analyze & View Reports , Alert Notifications. Specify the historical interval to analyze, then view and/or print the results. • Select Event Log View/Archive & Report to display all, or selected, information from your Windows NT / 2000 / XP / 2003 server and workstation actual or Archived Event Logs; or display monitored events from the database captured via EventLogWatch. IV. Miscellaneous Sentry II Operation Utilities • Select Net Toolbox to perform a Trace Route, do a DNS Lookup, query and view an SNMP device, or do a one-shot PING. • Select Database Maintenance to purge records and compact the database. Periodically, it is recommended that you purge and compact the Sentry II Server database to prevent it from getting too large. The database file is saved in the Database folder of the Sentry II install directory. • Select Sentry II Server Log to view the log data from the Sentry II Server, and to enable Logging to Disk, which is very useful when troubleshooting Sentry II Server activity. Sentry II 8.0 User’s Guide p. 32 Version 8.0.12 July 2006 Performance Tips This section provides tips on optimizing Sentry II’s performance. Internet Explorer Console Set IE to look in its local cache first before downloading images. In Internet Explorer, go to ‘Tools->Internet Options->Settings->Check for newer versions of stored pages’ and select ‘Automatically’, and then OK to apply. This will have a big impact in improving the page updating. Default Access Database If you are using the default Access as Sentry II’s database, go to your ‘Data Sources (ODBC)’ utility in Windows, usually found in the Control Panel or the Administrative Tools. In the ‘System DSN’ find the ‘BreakoutRPM’ DSN, click Configure and then Advanced. Under the Options find MaxBufferSize and click it to change its value to 8192. Next, find Threads and click it to change its value to 12. Click OK to save. Once every 3 to 4 weeks, you should do a Compact & Repair operation on your Sentry II database file,”…\Sentry II\Database\RPM.mdb”. First, you have to stop the Sentry II Server service. Use the Windows Services utility from Administrative Tools to do this. Now would be a good time to make a copy of the database file and keep a backup in a separate folder. Next, go to your ‘Data Sources (ODBC)’ utility in Windows, usually found in the Control Panel or the Administrative Tools. In the ‘System DSN’ find the ‘BreakoutRPM’ DSN, click Configure, and then click Repair. Exit when done. This will reclaim space from deleted records and keep your database file lean and optimal. If you are monitoring more than 25 servers/devices (and less if you are doing heavy monitoring), you should consider using SQL Server for the Sentry II database. SQL Server Database Be sure to define a ‘Maintenance Plan’ for your Sentry II SQL Server database. Using SQL Server Enterprise Manager, under Management, go to Database Maintenance, and define a new Maintenance Plan. Using the Database Maintenance Plan Wizard, select the Sentry II database, then enable Reorganize data and index pages, and Reorganize pages with original amount of free space and change the Schedule to run this optimization at least once per week. Pick a time of day when you are not Auto-Purging the database (Sentry II’s default is 12AM for AutoPurge), and when you are not running your Scheduled Periodic Reports. Next, enable Check database integrity and Include indexes. Do NOT check ‘Attempt to repair any minor problems’ as this cannot be done while Sentry II is running and will cause this part of the Maintenance Plan to fail. Schedule this to run 30 minutes after you run the optimization above. Choose to Backup the database here if you are not doing it as part of another plan. Sentry II 8.0 User’s Guide p. 33 Version 8.0.12 July 2006 Hardware Platform The better the hardware platform, the better your Sentry II Server will perform. Today, for under $600, from vendors such as Dell and HP, you can buy a 2.5GHz Pentium IV or better, with Hyper-Threading technology, 512 to 1024 MB Ram and an 80GB hard drive. If you are monitoring 50 or more server/devices, and are not running the Sentry II Server on such a platform, you should invest the several hundred dollars and do so. Sentry II 8.0 User’s Guide p. 34 Version 8.0.12 July 2006 Frequently Asked Questions This section provides answers to some very frequently asked questions about how to do things in Sentry II. Here is a list of the FAQs currently available. Refer to the subsequent pages to find the answer to the FAQ: What are the basic steps to get up and running with Sentry II? I want to monitor Processor, Disk and Memory Performance and Free Disk Space on my Windows servers. Also, I want to monitor performance and operation of my SNMP enabled network devices. How can I do this? I want to View and Report on monitored Counter data that I have captured to the Sentry II database. How can I do this? I want to have selected Sentry II reports run every morning automatically and then have the report output Emailed to two colleagues and myself. How can I do this? I want to send Email alert notifications to my cell phone and I want to customize the Email text sent. How can I do this? I want to send “NET Send” alert notifications to my workstation for certain type of alert conditions. How can I do this? I want to monitor for selected SYSLOG messages. How can I do this? I want to monitor for selected SNMP Trap messages. How can I do this? Are there any special characters that Sentry II reserves and cannot be used in the various input fields? What tools are available, such as logging, to assist in trouble-shooting Sentry II? Sentry II 8.0 User’s Guide p. 35 Version 8.0.12 July 2006 Q. What are the basic steps to get up and running with Sentry II? 1) Go to Configure Servers/Agent & Devices on the Configure menu tab. Here you add those servers and devices in your network that you want to monitor with Sentry II. You can add entries one at a time using the New function, or you can have Sentry II discover your servers/devices across a specified IP address range, or your servers/workstations in your Windows Domains & Workgroups, using the Discover function. Configure the IP Services, such as SNMP, HTTP, SMTP, and POP3 that you want to monitor on your various servers/devices. If these are SNMP enabled servers/devices, provide their associated MIBs, if any, to Sentry II for parsing, then select the various SNMP Objects you want to make available for monitoring. Once you have entered the servers/devices you want to monitor, use the Manage Agents function to display the Global Agent Management screen to easily install the Sentry II Agent on your Windows NT/2000/XP/2003 servers & workstations where you want to monitor their Event Logs, Processes, Services, Performance Counters, and Files. 2) Once you have all your servers/devices entered and configured, go to Configure Watches/Alerts to define the various watch, alert notifications and action parameters on your servers & devices. Here you define and choose the watch parameters for all the various Sentry II monitoring components: ServerWatch, SNMP & Windows CounterWatch, EventLogWatch, ProcessWatch, WinServicesWatch, FileWatch, and SNMP Trap Watch. Use the New button to define a new watch; select the watch type you want to define from the pop-up, and then specify the parameters for that particular watch type. 3) Use the Quick Start feature to have Sentry II guide you through these two key functions for using Sentry II. Q. I want to monitor Processor, Disk and Memory Performance, and Free Disk Space on my Windows servers. Also, I want to monitor performance and operation of my SNMP enabled network devices. How can I do this? There are several ways to accomplish this. There are two monitoring displays available for viewing status of Memory and Logical Drive information of all your Windows servers/workstations that have the Sentry II Agent installed. When these displays are opened they are updated once every few minutes, and you can see at a glance the status of Memory and Logical Disk Drives. (See MemoryWatch Monitoring and HDDWatch Monitoring on the Monitoring menu.) In addition, there is a Watch that Sentry II automatically creates called ‘ServerWatch-AGENT Check’ for all installed Sentry II Agents. This Watch, by default, monitors Logical Drive and Memory page File free space at the 20% threshold level. Find and edit this Watch to define an alert notification and/or to modify the threshold levels. To set up alerts when performance exceeds specified thresholds, or to develop baselines and trends, you use Sentry II’s CounterWatch monitoring. For Windows CounterWatch monitoring, it requires the Sentry II Agent service be installed on your Windows NT / 2000 / XP / 2003 servers. See Configure Servers/Agents & Devices for the details on accomplishing this. For your SNMP enabled devices, Objects/Counters to be monitored are derived from MIBs. Sentry II includes the basic MIBs, but if your server/device has specialized MIBs, you make these available to Sentry II to parse and to derive the available Objects/Counters. Sentry II 8.0 User’s Guide p. 36 Version 8.0.12 July 2006 There are basically three ways you can monitor specific counters and accumulate monitored values to Sentry II’s database from which you can then run reports. These apply to both SNMP and Windows CounterWatch monitoring. 1) If you want to monitor specific counters by watching for them to exceed your defined thresholds, and then be alerted when your threshold values are exceeded, go to Configure Watches/Alerts and create a new CounterWatch for each of the counters that you want to monitor this way. Sentry II watches your selected counters by determining their value at the default sample rate, and saves the value each time in the database. These values are then available for reporting and graphing. 2) Go to Manage CounterWatch Monitoring and in the Tree view of all your servers and devices, expand to the Objects (Memory, Processor, Disk, TCP, UDP, IP, etc), and then their associated counters to see what is available for monitoring. You can select counters to be monitored by setting the checkbox associated with the counter. See CounterWatch Monitoring for more details on the features available here for monitoring this way. 3) You can create templates of counters you want to monitor, and then associate these templates with one or more servers/devices you want to monitor. This association of template and servers is called a report. Go to Configure CounterWatch Reports for details on creating counter templates, and reports. Once you have created reports, you can then schedule these for monitoring and accumulating monitored data to the database by going to Schedule CounterWatch Monitoring. Regardless of which of these three methods above you use for capturing and accumulating monitored counter data to the database, you can run reports and/or graphs of this monitored data. See View/Analyze & Run Reports on the Reports menu tab, and CounterWatch Graphs on the Monitor menu tab for details on these operations. Q. I want to View and Report on monitored Counter data that I have captured to the Sentry II database. How can I do this? Review the previous FAQ above about How to Monitor Processor, Disk, Memory Performance, Free Disk Space and SNMP Counters. Once you have captured monitored data in any of the three ways outlined in this FAQ above, there are also three ways you can view and/or report on this data as outlined here in this FAQ: 1) In CounterWatch Graphs, press the New button to create a new Chart/Graph. Next, add Counters to be graphed to a chart by selecting the Counter in the Tree view, by clicking on its name, then pressing the Add button; or drag & drop the Counter onto the Chart. Once Counters have been added to Charts, the charts can be named & saved. Then the charts can be opened at any later time and specifying a start date/time to begin a view of the Counter values from that start date/time forward, as long as the Counter values are in the database from monitoring by one of the available methods. 2) Right-click on the Counter in the Tree view in Manage CounterWatchMonitoring or CounterWatchGraphs and select 'Summary' to see a summary of the Counter values. 3) You can run a report of Counter data in the database, regardless of which of the methods used to capture the Counter data, but you do require a Report be created first in Create CounterWatch Reports with a template of the counters to be reported on. Then in Run/Analyze & View Reports, you use this Report by selecting the New button. This pops- Sentry II 8.0 User’s Guide p. 37 Version 8.0.12 July 2006 up a dialogue box where you select from among your Reports, and you "schedule" an 'instance' of it for past-time, namely the past period you want to report on. This creates a report "instance" in Run/Analyze & View Reports that is immediately in the "Ready" state so the counter data in the database can be analyzed and the Report generated. You can schedule a CounterWatch report to run periodically and automatically in Schedule Periodic Reports. As long as monitored data exists in the database for the period being reported on, you schedule a report to run periodically and analyze the specified previous period, and optionally Email the report results to one or more recipients. In Schedule CounterWatch Monitoring, recall that it creates a report "instance" that runs starting at current time or sometime in the future to capture data and only when it is done capturing is this "instance" then "Ready" to be analyzed. (In Schedule CounterWatch Monitoring, on the Status tab, there is an option to Stop an "instance' that is currently in the monitoring state, or to change its stop date/time). Just as in Schedule CounterWatch Monitoring where you can schedule many 'instances' of the same report to run at different times in the future, using the New button feature in Run/Analyze & View Reports, you can create as many different 'instances' of a Report with different past time-frames, that are 'Ready' to be analyzed. One way to use this, for example, is let's say you create a Report in Create CounterWatch Reports with a set of Counters you want to monitor on a group of servers and network devices. In Schedule CounterWatch Monitoring, you "schedule" an 'instance' of this Report to run for the next month, so that for the next month you are monitoring the Counters in the Report's template. However, once a day you can go to Run/Analyze & View Reports, select New button, then create an 'instance' of the Report with a schedule of the previous 24 hours that is immediately 'Ready" so you can analyze and create a report on these monitored counters for the previous 24 hours. Q. I want to have selected Sentry II reports run every morning automatically and then have the report output Emailed to two colleagues and myself. How can I do this? On the Reports tab, select Schedule Periodic Report. Here you can select an ‘Alert Notifications’, ‘IP Services Performance and Availability’, the ‘Logical Drive Utilization’, ‘Memory Utilization’, or any of your created CounterWatch reports, and schedule an instance that will run periodically and automatically. You specify when it runs the first time, how frequently subsequently, what previous time period is included in the report, which servers/devices, and optionally, who the Email recipients should be for the report output. There is an option to ‘Exclude Time Periods’ consisting of time-ofday, and day-of-week, so that you can create reports with results that match the time-frames you care about, for example, the time periods you are responsible for as part of your Service Level Agreements (SLA). You can create as many different report instances, as you like, with different parameters. Once you schedule a report, you easily manage the queue of all your scheduled reports where you can delete those you no longer want, or edit schedule parameters to change them for those already queued. Q. I want to send Email alert notifications to my cell phone and I want to customize the Email text sent. How can I do this? Sentry II 8.0 User’s Guide p. 38 Version 8.0.12 July 2006 In Configure Watches/Alerts, press the New button to create a new watch/alert, or select an existing watch/alert, then press the Edit button. Go to the Action tab, then Email tab to define the Email alert notification parameters for this specific watch/alert. 1) Check the Email Notify checkbox to enable sending Email, and specify one or more Email Addresses separated by a comma or semi-colon. Edit the default Email Subject to be what you want. 2) Click the button to the right of the Email Subject field to pop-up a text edit box where you specify the Email text you want to send. This overrides the default Email text that would be sent otherwise. 3) Custom Email text supports six ‘macros’ that are substituted with the appropriate data for a particular alert when it occurs. These ‘macros’ are: &N which is replaced by the name of the server/device causing the alert; &A which is replaced by the IP Address of the server/device causing the alert; &W which is replaced by the name of the Watch/Alert you have defined here; &S which is replaced by the Status message associated with this failure causing the alert; &D which is replaced by the date, and &T which is replaced by the time of the alert. For a CounterWatch alert, &V is also a supported macro, and is replaced by the Counter value that exceeded the threshold and caused an alert. Q. I want to send “NET Send” alert notifications to my workstation for certain type of alert conditions. How can I do this? In Configure Watches/Alerts, press the New button to create a new watch/alert, or select an existing watch/alert, then press the Edit button. Go to the Action tab, then Program tab to define the ‘NET Send’ alert notification parameters for this specific watch/alert. In the ‘Program Name’ field, enter ‘Net’ (without the quotes); in the ‘Program Args’ field, enter ‘send WorkstationName “Sentry II Alert Notification: &N &A &D &T &S &W” ‘ (without the single quotes; the double quotes are around the message text sent). In this example, substitute ‘WorkstationName’ with the machine name of your workstation where you want the alert message sent. This example also shows the optional use of the special macros that Sentry II supports. The macros are in the body of the ‘NET Send’ text, and at run-time are replaced respectively with the server/device name causing the alert condition (&N), its IP Address (&A), the date (&D), the time (&T), the specific status for the alert type (&S), and the Watch/Alert name causing the alert (&W). The macros are supported by Sentry II in the ‘Program Args’ field, and can be used when invoking any batch, command, or program executable file. Use of the macros is optional and you can choose to use some or all. Q. I want to monitor for selected SYSLOG messages. How can I do this? When the Sentry II Server starts-up, either the service or the foreground application, it starts listening on the default SYSLOG UDP port 514. There are no special steps necessary to have this occur. Be aware that if you already have a program running as a service, or as an application, that has previously reserved port 514 to listen for SYSLOG messages, Sentry II will fail when it attempts to issue its listen. Prior to starting the Sentry II Server, you can run the Sentry II Server Config File Utility from “Start->Programs->Sentry II” and either change the SYSLOG listen port to something other than 514, or disable SYSLOG listening altogether. When you run the Server Config File Sentry II 8.0 User’s Guide p. 39 Version 8.0.12 July 2006 Utility, close the ‘Unnamed1’ entry and open the ‘Default.btc’ entry from your “…\Sentry II\Bin” folder. Make any changes and save. The Sentry II Server Log displays the status of its ‘Listening’ for Syslog, once per minute, as part of the Sentry II Server uptime message. A status of 1 implies that Sentry II is successfully listening for Syslog. To have Sentry II process, and log, any received SYSLOG messages; you must define one or more SYSLOGWatch Watch/Alerts in Configure Watches/Alerts. Go to Configure Watches/Alerts, press the New button to create a new watch/alert, and select “SyslogWatch for SYSLOG Messages”. Here you specify which SYSLOG Messages you want Sentry II to watch for, from which servers/devices, and what actions to take, if any, when these watched for messages are received. All “watched’ for messages are logged to the Sentry II database. Refer to the section on Configure Watches/Alerts for more information on setting the various parameters. Finally, be sure the servers and devices that generate SYSLOG messages are configured to send them to the Sentry II Server’s machine IP address. The Sentry II Server Log found on the Utilities menu, always displays an entry when any SYSLOG message is received so you should refer here to see if Sentry II is seeing any SYSLOG messages. For those received SYSLOG messages that match your Watch/Alert criteria, you can view these in the SYSLOGWatch Display found on the Display menu. You can generate a report, either one time, or automatically and periodically, by running or scheduling the “Alert Notifications” report and specifying the appropriate parameters. Q. I want to monitor for selected SNMP Trap messages. How can I do this? When the Sentry II Server starts-up, either the service or the foreground application, it starts listening on the default SNMP Trap port. The Sentry II Server requires and uses the Windows SNMP Service. Insure the Windows SNMP service is loaded and running. The Sentry II Server Log displays the status of its ‘Listening’ for SNMP Traps, once per minute, as part of the Sentry II Server uptime message. A status of 1 implies that Sentry II is successfully listening for Traps. Windows defines various default port assignments for its different services in a text file found at “C:\WINNT\SYSTEM32\DRIVERS\ETC\Services”. Check this file if not successfully seeing Traps to make sure Windows is configured correctly for the SNMP Trap port. To have Sentry II process, and log, any received SNMP Trap messages; you must define one or more SNMPWatch Watch/Alerts in Configure Watches/Alerts. You may want to first go to Configure SNMP Trap Definitions. Here you define the Trap types you will want to set watches on. If you have the associated MIBs from the servers/devices that will be generating Traps, copy these MIBs to the “…\Sentry II\MIBs” folder, and in Configure SNMP Trap Definitions, press the “Process MIBs” button and Sentry II will extract all the defined Traps. And add them to the available list. Next, go to Configure Watches/Alerts, press the New button to create a new watch/alert, and select “SNMPWatch for SNMP Traps”. Here you specify which SNMP Traps you want Sentry II to watch for, from which servers/devices, and what actions to take, if any, when these watched for Traps are received. All “watched’ for Traps are logged to the Sentry II database. Refer to the section on Configure Watches/Alerts for more information on setting the various parameters. Insure the servers and devices that generate SNMP Traps are configured to send them to the Sentry II Server’s machine IP address. The Sentry II Server Log found on the Utilities menu, always displays an entry when any SNMP Trap is received so you should refer here to see if Sentry II is seeing any SNMP Traps. For those received SNMP Traps that match your Watch/Alert criteria, you Sentry II 8.0 User’s Guide p. 40 Version 8.0.12 July 2006 can view these in the SNMPTrapWatch Display found on the Display menu. You can generate a report, either one time, or automatically and periodically, by running or scheduling the “Alert Notifications” report and specifying the appropriate parameters. Finally, Sentry II can send an SNMP Trap as an option for an alert notification. You can use this, and the ‘Test SNMP Trap’ option, in Configure Watches/Alert, and have Sentry II send Traps to itself. This will test all the requirements. Q. Are there any special characters that Sentry II reserves and cannot be used in the various input fields? Sentry II reserves and uses the tilde character ‘~’ as part of its protocol for sending and receiving various parameters to and from the Sentry II Server and the client ‘console’ interface. If you experience problems with parameter data verify that no tilde characters are involved as part of the names, descriptions, passwords, etc, of the parameters involved. Please contact Breakout Support if you encounter this problem and cannot work around it. Q. What tools are available, such as logging, to assist in trouble-shooting Sentry II? The Sentry II has the ability to log activity to disk at both the Sentry II Server and at the Agent. To enable disk logging at the Sentry II Server, go to the Utilities menu, and select Sentry II Server Log. Then click the Log to Disk checkbox to enable it. This is a global setting that enables the Sentry II Server log to disk, and can be enabled or disabled from any Sentry II IE Console. The disk log text file is called Sentry IIServer.log and is found in the “…\Sentry II\Bin” folder. To enable disk logging at the Agent, you set a Registry setting. Run Regedit and go to “HKEY_LOCAL_MACHINE\SOFTWARE\Breakout Technologies\Sentry II\Agent” and then set the name DiskLogging to ON to enable or OFF to disable. The disk log text file is called Sentry IIAgent.log and is found in the “…\Sentry II” folder, or the “…\System32” folder. Sentry II 8.0 User’s Guide p. 41 Version 8.0.12 July 2006 Configure Servers/Agents & Devices Use Configure Servers/Agents & Devices to define the servers, workstations, routers/hubs, firewalls, switches, printers and other SNMP & SYSLOG compliant devices on your network that you want to monitor. You add parameters for new servers/devices or modify the parameters for existing servers/devices already defined. With Configure Servers/Agents & Devices, you can: • Configure select IP Service (HTTP, SMTP, POP, FTP, DNS, TELNET, L_NOTES, SQL, ORACLE and SNMP) parameters such as ports, timeouts and retries for your servers, workstation, and devices to be monitored. (You set Watches/Alerts parameters for monitoring these using Configure Watches/Alerts). • Add servers/devices easily by automatically discovering IP Services on your servers/devices in your Windows Domains & Workgroups, and/or over a range of IP addresses. Optionally, Import server/device parameters with a comma-delimited list. You can also add servers/devices manually. • Install and/or Update the Sentry II Agent service remotely on your NT/2000/XP/2003 servers and workstations. • Organize the servers/devices into select Groups (See also Configure Groups). Sentry II 8.0 User’s Guide p. 42 Version 8.0.12 July 2006 • Easily and automatically track the Hardware Configuration details of your Windows servers/workstations where you have installed the Sentry II Agent and View & Print this information. The Agent automatically derives the hardware configuration details using WMI (Windows Management Instrumentation), and uploads it to the Sentry II Server when the Agent connects. The data is saved in the Sentry II Server database. • Configure SNMP for your relevant infrastructure devices. • Designate one or more Agents to act as remote, distributed Syslog and SNMP Trap & Query collectors/monitors and then assign the appropriate devices to these Agents. Licensing Note Sentry II is licensed based on the number of servers, workstations, and devices you are monitoring at unique IP addresses. All of Sentry II’s available monitoring features can be configured for a single server at a unique IP address, and this only counts as one license. It is also permitted to add multiple server, workstation, and device entries, such that the total number of uniquely named entries exceeds your license count. This is permitted so long as the total number of unique IP addresses for these entries, plus Sentry II Agents where there is more than one Agent registered per unique IP address, does not exceed your maximum license count. You can, for example, have more than one Agent entered and registered at the same IP address, but each additional Agent beyond the first at an IP address counts toward the license. (More than one Agent at the same IP address occurs when the monitored servers and workstations are “behind” a NAT, a shared Cable Modem or DSL WAN router that presents a single IP address to the world). This feature of the licensing is actually quite useful. For example, if you want to perform several different HTTP checks to your web server at a particular IP address, you can add multiple server/device entries, each with a different name but with the same IP address. Then configure the IP Service HTTP parameters for each entry according to the type of check you want to perform. Then go to Configure Watches/Alerts to configure a watch on each, with their own special schedule & action parameters. Or, on multiple entries, at the same IP address, configure the IP Service PING parameters for each entry with a different monitoring schedule, alert criteria, and associated alert actions. View Mode In this mode, select a server/device from the Server/Device Name drop down list box to edit or delete. If you choose edit by pressing the Edit button, you are then presented with fields to be modified for the selected server/device (See Update Mode below). If you choose delete by pressing the Delete button, you are prompted to confirm the delete of the selected server/device. New / Edit Update Mode When you press the New button you are brought to the Update Mode. Or you can also access the Update mode by pressing the Edit button for a selected server/device. In this mode, you define new server/device parameters or modify the existing server/device parameters. Save the new or modified parameters by pressing the Save button. After pressing the Save button, the View Mode is the default mode. Pressing the Cancel button also takes you back to View Mode. Sentry II 8.0 User’s Guide p. 43 Version 8.0.12 July 2006 Server/Device Name Field • Select the appropriate name to Edit an existing server/device, or enter the desired name when defining a New server/device (See Edit and New Buttons below). Server/Device Lookup Button • Just to the right of the Server/Device Name Field, click the Server/Device Lookup Button to lookup one or more servers/devices, specifically by name, or by wild-card, or by Group. IP Address Field • The IP address in the 'dotted quad' format of 'n.n.n.n' (for example: 205.207.92.150) for this server/device. IP Address Lookup Button • Just to the right of the IP Address Field, click the IP Address Lookup Button to lookup an IP address based on domain name. The field is primed with the name from the Server/device Name Field. Sentry II 8.0 User’s Guide p. 44 Version 8.0.12 July 2006 Description Field • An optional description for the server/device defined in the Server/Device Name field. Verbose Description Notes Button • Click the button to the right of the Description field and pop-up a free-form text box where you can enter optional verbose notes description for the server/device defined in the Server/Device Name field. • These verbose notes are displayed in the pop-up tool-tip window when hovering with the mouse over the server/device name in various Sentry II displays. Member of Sentry II Primary Group Field • Select from among the available Primary Group names to assign a new or existing server/device to the appropriate Group. • See Configure Groups for the option to assign multiple servers/devices to a selected Primary Group Select Secondary Group Assignments • Click the button to the right of the Primary Group filed to pop-up a display of available Secondary Groups. • Select one or more Secondary Group names to assign a new or existing server/device to the selected Secondary Group(s). Secondary Group assignment automatically applies any Watches/Alerts and CounterWatch Reports assigned to the Secondary Groups (See Configure Groups.) Member of Windows Domain/Workgroup Field • This field defines the name of the Domain, Workgroup, or Standalone that a Windows server or workstation belongs, or is blank for non-Windows devices. (See Configure Domain Information for defining your Windows Domain and Workgroup information and optional logon credentials). • This field must be set for a server to display in the Manage Agents screen. If you enter servers/workstations manually or Import them, make sure this field is defined to something if you want to install the Sentry II Agent via Manage Agents. • Member information is set automatically when the Sentry II Agent, on Windows servers and workstations, connects to the Sentry II Server. Have Agent Act as an Optional Remote Distributing Monitoring Server/Collector for: • These checkboxes apply to Windows Agents and give you the option to designate the selected Agent as a Syslog collector/monitoring server and/or an SNMP Trap & Query monitoring server. Sentry II 8.0 User’s Guide p. 45 Version 8.0.12 July 2006 • Click the configure button to the right of the checkboxes to pop-up a display of your available non-Windows infrastructure devices and servers. You choose and assign appropriate infrastructure devices and non-Windows servers that you want to be monitored by the selected Agent. • In the pop-up display, if you hover with the mouse over a device/server name the pop-up ‘tool tip’ displays the current Syslog & SNMP assignments, if any. The default Syslog and SNMP monitoring collector/sever is the Sentry II Server. • There are no other actions necessary to utilize the remote, distributed Syslog and SNMP monitoring. You use the standard Watches as always to define your Syslog and SNMP Trap & Query monitoring rules. • The SNMP Trap & Query monitoring results are forwarded encrypted to the Sentry II Server by the Agent for logging to the database and for any alert notification processing; • The Syslog messages are forwarded encrypted to the Sentry II Server for Server by the Agent for logging to the database and for any alert notification processing depending on the Sentry II 8.0 User’s Guide p. 46 Version 8.0.12 July 2006 settings in the Syslog Watch(es) defined for the devices; if the ‘Archive Only’ checkbox is checked in the Watch, then Syslog messages are not forwarded but stored to a flat text file in the defined archive folder in the Watch; if the ‘Archive Never’ is checked, then all Syslog messages are forwarded encrypted to the Sentry II Server for processing; if neither checkbox is checked, Syslog messages are archived locally to a flat text file in the defined archive folder in the Watch and also forwarded to the Sentry II Server for processing. Use Optional selected Agent Act as a Remote Distributing Monitoring Server/Collector for: • Here on a per device basis you can assign its Syslog and/or SNMP Trap & Query monitoring to the designated Agent servers/collectors available. You can also make these assignments via the pop-up configuration via the Agent entry described immediately above. Current Selected Server/Device Buttons These following buttons apply to the current selected server/device: Edit Button • Press the Edit button to modify an existing server/device in the Sentry II database. Select a Group name; fill in the optional Description and IP Address fields. • Choose the IP Services tab and select the IP Services you want and define their associated parameters. • Press the Verify button to validate your services selections. • Choose the Windows tab and define the optional Port fields. • Choose the SNMP tab to enable SNMP CounterWatch monitoring feature and to define the SNMP Objects, from your provided MIBs, that will be available for this server/device for SNMP CounterWatch monitoring. • Press the Save button to save the parameters. Duplicate Button • Starts the processing of a New server/device entry by starting with all the parameters of the selected server/device being duplicated. • Press the Save to complete the New processing. Delete Button Sentry II 8.0 User’s Guide p. 47 Version 8.0.12 July 2006 • Press the Delete button to remove a server/device from the Sentry II database. You are prompted to confirm the delete. Save Button • Press the Save button to save new or edited parameters for a server/device. Cancel Button • Press the Cancel button to abandon any new or edited parameters and return to the Lookup and New Mode. Properties Button • Press the Properties button (see details below) to view the IP Services, Windows, and SNMP Properties for the selected server/device. Eligible Watches Button • Press the Eligible Watches button (see details below) to view all eligible Watches/Alerts that the displayed server/device is currently defined as a member of or is eligible to be a member of. Assign Watches Button • Press the Assign Watches button (see details below) to abandon any new or edited parameters and return to the Lookup and New Mode. H/W Asset Details Button • Press the H/W Asset Details button (see details below) for a pop-up display of the hardware asset configuration details for the currently selected Windows server/workstation. Eligible Watches You can easily add your servers/devices to existing Watches/Alerts using this feature. Eligible Watches Button • Press the Eligible Watches button to view all eligible Watches/Alerts that the displayed server/device is currently defined in or is eligible to be defined in. • Optionally, select or unselect to add or remove the currently selected server/device from/to the eligible Watches/Alerts. Sentry II 8.0 User’s Guide p. 48 Version 8.0.12 July 2006 Assign Watches You can easily propagate Watches/Alerts from the selected server/device to one or more other selected servers/devices to existing Watches/Alerts using this feature. Sentry II 8.0 User’s Guide p. 49 Version 8.0.12 July 2006 Assign Watches Button • Press the Assign Watches button to view the displayed servers/devices that you can select and then assign the existing Watches/Alerts from the current selected server/device. Track Hardware Asset/Configuration Details You can easily and automatically track the Hardware Asset/Configuration details of your Windows servers/workstations where you have installed the Sentry II Agent and View & Print this information. The Agent automatically derives the hardware configuration details using WMI (Windows Management Instrumentation), and uploads it to the Sentry II Server when the Agent connects. The data is saved in the Sentry II Server database. H/W Asset Details Button • Press this button for a pop-up display of the hardware configuration details for the currently selected Windows server/workstation. • Click the Print button to print the details. • Click OK to close the display. Properties Click the Properties button to view the IP Services, Windows, and SNMP Properties for the selected server/device. IP Services Tab The IP Services Tab displays the optional, selected IP Services and associated parameters for the currently selected server/device. These optional IP Services (PING, HTTP, SMTP, POP, FTP, DNS, TELNET, L_NOTES, SQL, ORACLE, SNMP and USER) do not require the Sentry II Agent on the server/device being monitored, and this server/device can be running any OS. Sentry II 8.0 User’s Guide p. 50 Version 8.0.12 July 2006 IP Service Drop-down • Choose a specific service from the IP Services drop-down list and click the associated checkbox to select this IP Service for this server/device. You can select any number of IP Services or none at all. Enable Checkbox • Check this checkbox to enable this IP Service. Use Configure Watches/Alerts to set a Watch on the IP Service. • The parameters defined here below, including those that are specific to a particular IP Service, are used when you activate a Watch/Alert on these. Secure Checkbox • Check this checkbox to indicate that a secure (SSL, etc) protocol check should be made. Port Field • Defines the Port number for the selected IP Service. Timeout Field • Defines the Timeout for waiting for a positive response from the selected IP Service. Sentry II 8.0 User’s Guide p. 51 Version 8.0.12 July 2006 Retries Field • Defines the number of retries to obtain a positive response from the selected IP Service. Look for Field • Optional, for the HTTP service, defines a string to be looked for and checked on the default web page or alternate specified page (See Page Name Field below). If the Look for string is not found, the HTTP check fails. • If you precede the HTTP Look For string parameter with the characters ‘%!’ (without quotes), then it is treated as an ‘Exclude’ directive meaning, the HTTP check is successful only if the Look For string is not found. • Optional, for the HTTP service, you can specify multiple "Look For" entries, each separated by a semi-colon, to correspond with multiple 'Page Names' (see below). • Optional, for the SNMP service, defines a string that will be looked for in the response to the SNMP Query. If not found, the SNMP check will be treated as a failure. If this field is left blank, any valid response is accepted as successful. The Query response is actually a combination of fields separated by commas. When specifying the "Look For" substring, do not define it to be more than any one field from the response. It cannot extend beyond one field. • The SNMP check supports several directives for its Look For string parameter. All without quotes, ‘%1’ is treated as ‘Exclude’, ‘%=’ as an exact match, ‘%<’ is treated as the Look For being ‘less than’ the received value, and ‘%>’ is treated as the Look For being ‘greater than’ the received value. Page Name Field • Optional, for the HTTP service, defines an alternate page to the default page, to check. Page has to exist for the HTTP check to succeed. • Optional, for the HTTP service, use a percent followed by a URL and Sentry II will make the HTTP connect attempt using the URL instead of the IP address. For example, ’%www.breakoutsoft.com’ (without the quotes). This is often useful to check redirected URLs. In this case, Sentry II detects the redirection and verifies the redirected page. • Optional, for the HTTP service, you can specify multiple Page Names, each separated by a semi-colon, and the HTTP check of each page must be successful for the check to be successful. OID(s) Field • Optional, for the SNMP service, defines one ore more OIDs, separated by a semi-colon, that are queried when you activate a Watch/Alert. The default OIDs queried, if you leave this field blank, are those for server/device name, description, uptime, etc. Sentry II 8.0 User’s Guide p. 52 Version 8.0.12 July 2006 Resolve Name Field • For the DNS service, defines the name used to determine if there is a DNS server to resolve it. Request Field • For the USER and L_NOTES services, defines the optional request message sent to determine if the service is available. Carriage-return and line-feed characters can be sent by using '<CR>' and '<LF>', respectively. Response Field • For the USER and L_NOTES services, defines the optional response message to be received to indicate the service is available. The specified Response is treated as a partial substring, that is, if found anywhere in the received response, the response is considered positive. Server Name Field • For the SQL service, defines the name of the Microsoft SQL Server to be checked. • For the ORACLE service, not used. Database Field • For the SQL service, defines the optional database name to open on the check. If left blank, the default database is opened. (See Appendix C for SQL requirements). • For the ORACLE service, defines the required Oracle database SQL*Net alias name or the database instance SID. (See Appendix C for ORACLE requirements). User Name Field • For the SQL service, defines the optional User login name used during the check if login is required. The default User Name is "sa". • For the ORACLE service, defines the required User login name used during the check. Password Field • For the SQL service, defines the optional User password used during the check if login is required. The password is displayed as "*" characters. • For the ORACLE service, defines the required User password used during the check. The password is displayed as "*" characters. Sentry II 8.0 User’s Guide p. 53 Version 8.0.12 July 2006 Read Community Field • For the SNMP service, defines the required Read Community name. The default is "public". Verify Button • Press the Verify button to check the IP Services you have selected for this server/device. The Server Verify Status display is shown. This display is similar to the Server Discovery Status display described above. The Show All checkbox, Stop button, and Close button function as described above in the Server Discovery Status Display • Note that the Verify is executed from the client side, not from the Server. Therefore, to most closely verify the operation that will be carried out by the Server, you should use Verify with a client that is executing on the Sentry II Server. Windows Tab The Windows Tab displays the Sentry II Agent associated parameters for this NT / 2000 / XP / 2003 server/workstation. In addition to ServerWatch IP Service monitoring, if appropriate, by installing the Sentry II Agent, on Microsoft Windows based servers/workstations, EventLogWatch, ProcessWatch, CustomWatch, Windows CounterWatch, WinServicesWatch, and FileWatch monitoring features are available. Install Agent / Update Agent Button • See the Global Agent Management below where you can manage the install/update process of your entire NT / 2000 / XP / 2003 servers/workstations from a single screen. • If defining a new NT / 2000 / XP / 2003 server/workstation, or if viewing or editing an existing server/workstation that does not currently have the Sentry II Agent installed, the button text will be "Install Agent". If viewing or editing an existing server/workstation that does currently have the Sentry II Agent installed, the button text will be "Update Agent". • Press this button to Install or Update the Sentry II Agent on the selected NT / 2000/ XP / 2003 server/workstation. Sentry II 8.0 User’s Guide p. 54 Version 8.0.12 July 2006 • If the Agent is not currently connected, you are prompted for the folder and drive share where the Sentry II Agent files will be installed on the selected server/device. Administrative share rights are required on this selected server/workstation to use this install/update function. • Connected Agents are sent a message to initiate the download of the updated Agent files, and to update themselves, and therefore no special share rights or security rights are required, and the current folder for the Agent files is used. • If you get an “Access denied” error when attempting to use this feature and the Sentry II Server is running as a service, you will need to define an ‘Administrator’ Logon for the Sentry II Server service property. See the Sentry II Server as a Windows Service above. It is also possible that your local security settings on the server/workstation that you are attempting to install the Agent blocks this type of operation. • If you get an “RPC Not available” error message when attempting to use this feature, make sure the machine name and path you specify when prompted by the Agent Install/Update is correct. Logon Button • Press this button to specify your Administrator equivalent User Name and Password credentials so the Agent service can be remotely installed. Agent Version Field • This is a read-only field that defines the Agent version that is installed on this server/workstation. OS Version Field • This is a read-only field that defines the operating system version for this server/workstation. This field is defined automatically by the Sentry II Agent the first time it runs on the selected server/workstation. SNMP Tab The SNMP Tab is used to enable or disable the SNMP CounterWatch monitoring feature for the selected server/device. You also specify which Objects (and associated Counters) from your provided MIBs are available for this server/device. Sentry II 8.0 User’s Guide p. 55 Version 8.0.12 July 2006 Enable SNMP Checkbox • Set this checkbox to enable the SNMP CounterWatch monitoring feature for this server/device. • See Configure Watches/Alerts, and 'New->CounterWatch for SNMP and Windows Counters', as well as the other CounterWatch features such as CounterWatch Graphs, Manage CounterWatch Monitoring, Create CounterWatch Reports, Schedule CounterWatch Monitoring and Run/Analyze & View Reports for using the SNMP CounterWatch monitoring feature. MIB Objects Add/Remove Button • Press this button to select from among the list of SNMP Objects (and their associated Counters), derived from your provided MIBs that are available for CounterWatch monitoring for this server/device. • Copy your provided MIBs to the "...\Sentry II\MIBs" folder where they are accessed by Sentry II. Reprocess Button • Press this button to reprocess the MIBs in your "...\Sentry II\MIBs" folder if you have added or deleted any since entering ‘Configure Servers/Agents & Devices’. The MIBs are always processed automatically the first time you access the SNMP Tab on any particular entry to ‘Configure Servers/Agents & Devices’ but if you add or remove any to fix parsing errors, for example, press the Reprocess button to parse the MIBs again. Read Community Field • Defines the required Read Community name. The default is "public". Global Configuration Buttons These following buttons invoke Global Configuration options when clicked, and do not apply to the current selected server/device: Sentry II 8.0 User’s Guide p. 56 Version 8.0.12 July 2006 New Button • Press the New button to add a new server/device to Sentry II's database. Select a Group name; fill in the optional Description and IP Address fields. Manage Agents Button • Press the Manage Agents button (see details below) to view the Global Agent Management screen. See Manage Agents above. Discovery Button • Press the Discovery button (see details below) to run a Discovery of the servers/workstations and devices in your network. See Discovery above. Manage SNMP Button • Press the Manage SNMP button (see details below) to view the Manage SNMP screen. See Manage SNMP above. Import Button • Press the Import button (see details below) to open the Import Text box display where you can specify a comma-delimited list of servers/devices to add. Manage Agents Press the Manage Agents button to bring up the display screen for this function. With the Global Agent Management you can see all your servers/devices in one view; see which ones currently have the Agent installed, what Domain or Workgroup they belong, what the version number of the installed Agent is, and if the Agent is currently connected. • This displays all servers/workstations & devices in the Sentry II database, along with the current version of the installed Agent, if any, on the corresponding entry. Optionally, set the Discovery checkbox to show all servers (optionally workstations, as well) in all or specific domains and workgroups that are not currently in the Sentry II database. These are displayed in bold text to highlight them. Press the Filter button to specify what you want displayed. The default is all Servers in all your defined domains and workgroups. When you Discover, only servers/workstations that are ‘visible’ through ‘browsing’ will be found. .If the Version for a particular entry is blank, then no Agent is currently installed. If the Version is “Unknown”, there is a legacy Agent version installed prior to the Agent having the feature to report its version. • If the Domain display for an entry is in Red, the displayed domain name from the server discovery that Manage Agents does, is different than the domain assignment configured for the server. Hover with the mouse over the domain name and the tool tip shows the name of the domain configured. If the Domain display for an entry is in Orange, the displayed domain name is the configured domain name for this entry in the database. However the server was not found during the server discovery that Manage Agents does. Hover with the mouse over the domain name and the tool tip shows the name of the domain configured. Sentry II 8.0 User’s Guide p. 57 Version 8.0.12 July 2006 • The status column will display if the Agent is currently connected. Select the checkbox next to the NT / 2000 / XP / 2003 servers/workstations in the display that you want to install or update to the latest Sentry II Agent. The latest Sentry II version is displayed on the status line. • Click the column header to sort accordingly; click again to reverse sort. • Connected Agents are sent a message to initiate the download of the updated Agent files, and to update themselves, and therefore no special share rights or security rights are required. • Agents that are not connected or servers/workstations that do not have the Agent use the ‘Push’ method. • The remote Agent 'Push' requires Administrative share rights to copy the Agent files down, and sufficiently strong security rights, such as Administrator or Domain Administrator, to remotely install and start the Agent service. Press the Logon button to specify/verify User Name & Password credentials for the various domains, workgroups, and standalones for the servers and workstations where you want to install or update Agents. For User Name, you can specify ‘DomainName\UserName’. • The path displayed is the default path to install or update the Agent files. It does not necessarily represent where the Agent files are currently residing if you previously installed the Agent to a different folder. • Click the path name to pop-up a box to edit the folder name where you want to install the Agent files for a particular server/workstation. You are prompted for the folder and drive share where the Sentry II Agent files will be installed on the selected server/device. Administrative share rights are required on this selected server/workstation to use this install/update function. If you Sentry II 8.0 User’s Guide p. 58 Version 8.0.12 July 2006 check the ‘Set As Default for All’ checkbox, the path you enter (not including the machine name) is propagated as the default path for all entries in the display. • Use the Select All or Unselect All buttons to choose the servers/workstation you want to install or update. • Press the Install/Update Agents button to install or update the Sentry II Agent on the selected servers/workstations. As the install/update process proceeds, the current entry being installed/updated is highlighted. Those that are successful, display this image in the Status column; unsuccessful display . Hover with the mouse over these images, particularly , and a tool tip displays the reason for the failure. • If you get an “Access denied” failure error, most likely the supplied credentials either do not exist in the target server’s local security account, if it’s a member of a workgroup, or the credentials are not member of Administrators. • If you get an “unknown username and/or bad password” failure error, most likely the supplied credentials either do not exist in the Sentry II server’s local security account, if the target server is a member of a workgroup, or the credentials do not exist in the Domain security database. • If you get a “Required privilege not held by user” failure error, most likely the Sentry II Server service is not running under the ‘Local System’ account, or the Sentry II Server is running as a foreground application. In either case, you need to make the ‘User Right Assignment’ called “Act as part of the operating system” to the User name or Group you are using as the Sentry II Server service logon, if running as a service, or your logon, if running as a foreground application. • If you get an “RPC Not available” failure error message, make sure the machine name and path you specify when prompted by the Agent Install/Update is correct. It’s possible the target server is not currently running or connected to the network, or it is a W98/ME desktop. • Click the 'Refresh' button to refresh the display. Checking or unchecking the Discover checkbox also refreshes the display automatically. You may need to wait several minutes to allow the installed/updated Agents to connect to the Sentry II Server and register its updated information. • Click the 'Close' button to exit the display. Discovery Processing Use the Discovery feature to add new servers/devices to your Sentry II database. With Discovery, Sentry II will check your Windows Domains & Workgroups, and/or over a specified IP address range, for your selected SNMP, HTTP, SMTP, POP, FTP, DNS and TELNET IP services & servers. Or, choose PING or a custom TCP request/response, called USER, to find and validate your servers. Sentry II supports any OS, and does not require its Agent, for these server types. Sentry II 8.0 User’s Guide p. 59 Version 8.0.12 July 2006 Specify Discovery Options and Parameters Dialogue Box Press the Discovery button to pop-up the Specify Discovery Options and Parameters dialogue box. (For Microsoft Windows NT / 2000 / XP / 2003 based OS servers and desktops, you can use Sentry II's Agent for additional, comprehensive, counter/performance monitoring, analysis, and alerting with CounterWatch, EventLogWatch, ProcessWatch, WinServicesWatch and FileWatch). Select the Discovery method to use. Use the Filter button to pop-up a filter specification and choose to find servers, and optionally workstations, in your Windows Domains & Workgroups. In addition to, or instead, choose to find servers/devices via an IP address scan. Specify the IP address range to search. Next, click the appropriate check boxes to select some or all server services (PING, HTTP, FTP, SMTP, POP, DNS, TELNE, SNMP, and USER) to validate and/or search for in your Windows Domains/Workgroups and/or over your specified IP address range. Modify the associated Port if necessary; press the Reset Defaults to restore the default port numbers. Also modify the time-out (T/O) wait for a response to a value other than the default 1 second if on a slow network, or if it appears false "unavailables" are occurring for devices you know should be found. The Do Name Lookup of Found Servers/Devices via DNS checkbox is used to control whether a lookup is done of each IP address for its Domain name, during the discovery. Check the Name Lookup, and a Domain name lookup is done for each IP address; uncheck it, and no lookup is done, and the IP address is used as the default server/device name. Bypassing the Domain name lookup will speed up the discovery process. Discovery of ORACLE databases and Lotus NOTES servers is currently not supported. (See Appendix-C for configuring the Sentry II Server to communicate to your ORACLE servers.) For SNMP, you must specify the Read Community name; the default name is Public. Sentry II 8.0 User’s Guide p. 60 Version 8.0.12 July 2006 For DNS, you must specify a name to resolve in the Resolve Name field, for example, www.breakoutsoft.com. For USER (a custom TCP check), you can optionally specify a custom request to be sent and expected response to be received, in the Request and Response fields, respectively. Modify the USER Port if necessary. You can embed carriage-return and line-feed characters in your custom request and/or expected response by using the '<CR>' for carriage-return and '<LF>' for line-feed. The expected Response is treated as a partial substring of the response received, that is, if the actual response received contains the specified Response anywhere within, the response is considered successful. Check the appropriate Secure Checkbox for HTTP, FTP, SMTP, POP3, and/or TELNET to check using the secure (SSL, etc) protocol for these IP Services. Once you have made all your specifications and selections, press the OK button to begin the discovery, or press the Cancel button to exit discovery. Server Discovery Status Display The Server Discovery Status is displayed when you press the OK button. It displays the results of the discovery process. Each line entry in the display is the result of the check of one of the selected services for a found Windows servers/workstation or for an IP address in the specified IP address range. In addition to status, each line shows the Type and Reason for the status. If a Domain name exists, and is found in the lookup, the part of the name up to the first "dot" becomes the default server name, with the Domain name as the tool tip when you hover with the mouse over the name. If there is no Domain name, or no lookup is done, the IP address is the default name. • This image indicates the server/device service is available, along with the IP address displayed in green. • This image indicates the server/device service is unavailable, along with the IP address displayed in red. Sentry II 8.0 User’s Guide p. 61 Version 8.0.12 July 2006 Show All Checkbox The Show All checkbox is used to control the discovery results display. Check the Show All, and results of every discovery are shown; uncheck it, and only the successful discoveries are shown. Stop Button Press the Stop button to prematurely terminate the discovery process before it has worked through the complete specified IP address range. Select All / Unselect All Buttons The Select All / Unselect All buttons provide a quick method to set the checkbox for each visible discovery result to select it for adding to the Sentry II database, or to uncheck the checkbox for each visible discovery result to unselect it and bypass adding it. Click the individual checkboxes with the mouse, to select or unselect an entry, one at a time. Add Button The Add button is enabled when at least one discovery result entry is checked. Press the Add button to begin the process of adding those checked servers/services to the Sentry II database. If servers/devices are checked that Sentry II finds are already in its database, they are ignored. Use the Edit function (see below) to modify existing entries. Pressing the Add button displays the Confirm Server Add Option dialogue box. The Confirm Server Add Option dialogue box displays the number of servers/devices selected for adding, and provides a checkbox to choose the handling when adding. The default mode is CHECKED, which allows you to edit each server/device entry before it is added; when UNCHECKED, the addition proceeds for each server/device until complete. The associated Domain name is used as the default name for the server/device adds. If you choose to add each server/device without editing, you can always go back later and edit the server/device entry. Press the OK button to proceed with the adding process, or press the Cancel button to return to the Server Discovery Status display. Print Button Press the Print button to print the Server Discovery Status display. Close Button Press the Close button to exit the Server Discovery Status display. Manage SNMP Press the Manage SNMP button to bring up the display screen for this function. From this Global SNMP Management screen you can: 1) Enable basic SNMP “interface” monitoring of routers, switches, hubs and other selected communication devices for with a click on a single checkbox. 2) Set basic SNMP configuration parameters such as ‘Read Community’ string. Sentry II 8.0 User’s Guide p. 62 Version 8.0.12 July 2006 3) Add and/or Remove SNMP Objects to one or more servers/devices. These Objects, used to control monitoring, are parsed from the default MIBs included with Sentry II and the MIBs you provide from your ‘managed’ devices. • Optionally, click the Configure the 'Interface' Object, and Discover & Add Ports for Key Counters checkbox to enable the basic SNMP “interface” monitoring of the selected devices for SNMP counters such as Bytes and Packets sent & received per second, Byes & Packets errors, etc. All the interface ports on the selected devices are discovered, a default CounterWatch Report object is created, and the monitoring is enabled. • Optionally, click the Select SNMP Objects to Add checkbox to enable the Add button; then click the Add button to display the list of available SNMP Objects that Sentry II has parsed from the MIBs found in the “…\Sentry II\MIBs” folder. Next, click the checkbox of one or more SNMP Objects to Add. • Click the Reprocess MIBs button if you have copied MIBs into the “…\Sentry II\MIBs” folder AFTER entering Configure Servers/Agents & Device. • Optionally, click the Select SNMP Objects to Remove checkbox to enable the Remove button; then click the Remove button to display the list of available SNMP Objects that Sentry II has parsed from the MIBs found in the “…\Sentry II\MIBs” folder. Next, click the checkbox of one or more SNMP Objects to Remove. • Optionally, click the Set Read Community checkbox and then define the Read Community string, and/or click the Set Monitoring Rate and specify how frequently you want the SNMP monitoring to query counters. Sentry II 8.0 User’s Guide p. 63 Version 8.0.12 July 2006 • Finally, in the Groups: Servers/Devices Tree expand one or more Groups and select one or more servers/devices where the SNMP Object Add and/or Remove, and optional Read Community string, are to be applied. • Click the Apply button to apply the changes to the selected servers/devices. The SNMP Object Add and Remove operation takes place in the background where the database is updated with the SNMP Objects available for monitoring for the selected servers/devices. • Once the Add/Remove completes, the SNMP Objects and their associated counters and variables are available for monitoring in the ‘Monitored Objects’ Tree view in CounterWatch Graphs and Manage CounterWatch Monitoring, in Configure Watches/Alerts, and in Create CounterWatch Reports->Manage Custom Templates. However, one additional step may be necessary for those SNMP Objects, which include ‘ports’ or ‘instances’ such as the ‘interfaces’ SNMP Object used to monitor routers, for example. These ‘ports’ or ‘instances’ are discovered and added by you on a per counter basis in the ‘Monitored Objects’ Tree view in CounterWatch Graphs and Manage CounterWatch Monitoring. Refer to CounterWatch Graphs and Manage CounterWatch Monitoring for this additional step to complete the SNMP configuration. Import Use the Import function to easily add a group of servers/devices to Sentry II for monitoring. Sentry II 8.0 User’s Guide p. 64 Version 8.0.12 July 2006 Import Button • Press the Import button to display the Import input text box. • Enter, or Copy & Paste, a comma-delimited list for importing and batch adding new Servers/Devices • The format is one entry per line of: Server/Device Name, IP Address, Description, Group Name, Server Domain/Workgroup • Import Groups first (See Configure Groups) if assigning Groups on the import Right-click text box for editing options; only Server/Device Name and IP Address required • Click the OK button to import the specified servers/devices to the Sentry II database Sentry II 8.0 User’s Guide p. 65 Version 8.0.12 July 2006 Configure Groups Use Configure Groups to add a new Group or modify the name and/or description of an existing Group. Use Groups to organize your Servers/Devices into meaningful collections that make it easier to manage your network. Group Name Field • Defines the name of a group used to organize Servers/Devices on your network. • Select the appropriate name to Edit an existing group or enter the desired name when defining a New group (See Edit and New Buttons Below). Group Description Field • An optional description for the group defined in the Group Name field. Group Type Field • Select the type of Group being defined. A server/device is assigned to only one Primary Group, but can be assigned to one or more Secondary Groups. • Primary Groups are special and used to ‘Group’ servers/devices in the various ‘console’ displays, reports, Watches/Alerts, and so on. Sentry II 8.0 User’s Guide p. 66 Version 8.0.12 July 2006 • Watches/Alerts and CounterWatch Reports can be assigned to both Primary and Secondary Groups, and servers/devices assigned to these Groups are also then automatically assigned the associated Watches/Alerts and CounterWatch Reports. Default Secondary Checkbox • Select this option to designate a Secondary Group as a ‘Default’ Secondary Group which means any new server/device added in Configure Servers/Agents & Devices is automatically added to the designated ‘Default’ Secondary Groups. Assigned Servers/Devices Field • A list box of all the Servers/Devices currently assigned to the selected group. Assigned Watches/Alerts Field • A list box of all the Watches/Alerts currently assigned to the selected group. Assigned Reports Field • A list box of all the CounterWatch Reports currently assigned to the selected group. Servers/Devices Button • Press the Servers/Devices button to add or remove the select servers/devices as members in the currently selected Group. • Unselecting a server/device to remove it from a Primary Group is not permitted since every server/device must belong to one Primary Group. However, you can reassign servers/devices to a different Primary Group by selecting those servers/devices and assigning as members to a different selected Primary Group. • Servers/devices assigned to the currently selected Primary or Secondary Group also are automatically assigned the Watches/Alerts and CounterWatch Reports assigned to the selected Group. • Unselecting servers/devices to remove them as members of a Secondary Group will cause the unselected servers/devices to be removed from the Watches/Alerts and the CounterWatch Reports assigned to the selected Group. Watches/Alerts Button • Press the Watches/Alerts button and select one ore more Watches/Alerts to assign them to the currently selected Group. Watches/Alerts assigned to either a Primary or Secondary Group are then automatically assigned to all servers/devices that are members of the selected Group. • Unselecting Watches/Alerts to remove from a Group will cause the member servers/devices in that Group to be removed from the unselected Watches/Alerts. Counter Reports Button Sentry II 8.0 User’s Guide p. 67 Version 8.0.12 July 2006 • Press the Counter Reports button and select one ore more CounterWatch Reports to assign them to the currently selected Group. CounterWatch Reports assigned to either a Primary or Secondary Group are then automatically assigned to all servers/devices that are members of the selected Group. • Unselecting CounterWatch Reports to remove from a Group will cause the member servers/devices in that Group to be removed from the unselected CounterWatch Reports. New Button • Press the New button to add a new group to the Sentry II database. Fill in the Group Name and optional Description fields, and then press the Save button. Edit Button • Select an existing group from the Group Name drop down field. Press the Edit button to modify the Group Name or Description fields for an existing group. Delete Button • Select an existing group from the Group Name drop down field. Press the Delete button to remove a group from the Sentry II database. You are prompted to confirm the delete. In addition, before performing a group delete, you will be notified that all servers/devices in the group will also be deleted, and asked to confirm the delete. Import Button • Press the Import button to open the Import Text box display where you can specify a comma-delimited list of Groups to add. Save Button • Press the Save button to save new or edited parameters for a group. Cancel Button • Press the Cancel button to abandon any new or edited parameters. Sentry II 8.0 User’s Guide p. 68 Version 8.0.12 July 2006 Configure Security Use Configure Security to enable or disable secure access to the Sentry II Analysis and Administration features, and to define the authorized Analysts and Administrators. When Security is enabled (See Global Security Settings below) only authorized Analysts or Administrators may gain access. When you attempt to access the Sentry II server through your IE browser or Sentry II's embedded browser, you are presented with a prompt requesting Login and Password. Once the appropriate login/password are supplied, you will gain access to the Server features that have been enabled (Administration, Analysis or both). User/Group Name Field • Defines the Login name of an authorized user (Analyst or Administrator) to be supplied when access to the Sentry II Server is attempted. • Optionally specify an Active Directory Group name and then any user who is a member of the Group is authorized. An Active Directory Group is indicated by an open/close parenthesis after the Group name. Sentry II 8.0 User’s Guide p. 69 Version 8.0.12 July 2006 • Select New to define a new user, or choose the appropriate name to Edit an existing user. (See Edit and New Buttons below). Description Field • Provide an optional description for each authorized user. Verify via Active Directory Checkbox • Set this checkbox when defining a New User or Edit of an existing User to indicate that you want the User to be authenticated via Active Directory • The Password and Verify Password fields are disabled since the authentication is done against the credentials defined in Active Directory. • Sentry II does not store your password, and your login User name and password are only used in an authentication call to Active Directory. • Setting this checkbox also enables the button to the right of the User Name field where you can click to pop-up a Windows and view your Active Directory information where you can select a User or a Group for the User Name. If you select a Group, then you can login with any User Name that is a member of that Group. • The Group name is indicated by the including of a parenthesis pair as part of the name; for example, ‘Administrator()’ is the ‘Administrator’ Group. Password Field • Defines the authorized user Password to be supplied when access to the Sentry II Server is attempted. Verify Password Field • Same as Password field and used to verify that you have entered the Password as intended. Allow Administration Checkbox • When checked, the selected user is granted access to Sentry II's Administration features located on the Configure, Reports and Utilities tabs. They are: o Configure tab: Security, Groups, and, Servers/Agents &Devices, Watches/Alerts, SNMP Definitions, Domain Information o Reports tab: Create CounterWatch Reports o Utilities tab: Sentry II Server Log, Net Tools and Database Maintenance • Full Rights radio button provides full Administration rights. • Limited Rights radio button provides full Administration rights EXCEPT no access to Configure Servers/Agent & Devices and no access to Configure Security, and in assigning ownership for Reports or Graphs, can only assign them to All users or their own logon Name. Sentry II 8.0 User’s Guide p. 70 Version 8.0.12 July 2006 Allow Analysis Checkbox • When checked, the selected user is allowed access to Sentry II's Analysis features located on the Monitor, Display and Reports tabs. They are: o Monitor tab: CounterWatch Graphs, Schedule CounterWatch Monitoring and Manage CounterWatch Monitoring o Display tab: Alert Watch Display, Server Watch Display, EventLogWatch Display, SYSLOGWatch Display, and SNMPTrapWatch Display o Reports tab: Schedule Periodic Reports, Run/Analyze & View, and Event Log Viewer • Full Rights radio button provides full Analyst rights to view, edit, and create Graphs, Reports, and start/stop Monitoring. • View Only radio button provides restricted Analyst rights to view only on Graphs, Reports, and not permitted to schedule reports, or start/stop monitoring. Allow Server/Device Maintenance Checkbox • When checked, the selected user is allowed to define and enable Server/Device maintenance plans that disable monitoring and alerting.. Allow Agent Install Download Checkbox • When checked, the selected user is allowed to initiate an Agent download installation via the InstallAgent.asp page. Restrict Access to Only These Groups Checkbox • When checked, the defined User is only allowed to view and work with the Groups specified here. Groups and servers/devices assigned to those Groups not specified here are not visible in any Sentry II function. • Click the Add/Remove button to select the Groups this User is allowed to view and work with. New Button • Press the New button to add a new authorized user (Analyst or Administrator) to the Sentry II database. Fill in all fields (and optional Description field); then press the Save button. Sentry II 8.0 User’s Guide p. 71 Version 8.0.12 July 2006 Edit Button • Select an existing user from the User Name drop down field, and then press the Edit button to modify the User Name, Password, Verify Password, or Description fields. Delete Button • Select an existing user from the User Name drop down field, and then press the Delete button to remove the user as an authorized Sentry II Analyst or Administrator. You are prompted to confirm the delete. Save Button • Press the Save button to save the new or edited parameters for an authorized Sentry II Analyst or Administrator. Cancel Button • Press the Cancel button to abandon any new or edited parameters. Active Directory View for Selecting User or Group When in New or Edit mode, and the Verify via Active Directory checkbox is checked, the button with the ellipse dots to the right of the User/Group Name field is enabled and clicking this opens the Active Directory View so that you can select a User or Group name. Sentry II 8.0 User’s Guide p. 72 Version 8.0.12 July 2006 Here you can navigate your Active Directory structure to find a User or Group to select or you can click the Find button to pop-up the Find View. Click the checkbox to select a User or Group; click the plus icon to expand a Group or a “Container” to see the members. Hover with the mouse over a User or Group and view its ‘Account Name’, ‘Object Class’ and ‘Distinguished Name’ in the pop-up tool tip. To use the Find function, click a “Container” name to select it and then click Find and you will have the option to search the selected Container, or the whole Domain. You can also specify a wild-carded name, to find just the Users and Groups that match your wildcard. The Find Name field automatically appends an asterisk to the end of the name you specify. Click OK to use the selected User or Group name. Only one name is allowed here, and it will be the last name checked. Click Cancel to return to the Tree view. Global Security Settings This section lets you enable or disable Sentry II's security settings on a global basis. You also determine whether or not to allow Sentry II Agents to automatically register a user server or desktop server/device. Sentry II 8.0 User’s Guide p. 73 Version 8.0.12 July 2006 Enable Security Checkbox • Enable Security (checked): Users will be prompted for Login and Password when attempting to access the Sentry II Server. Authorized users will gain access to previously determined Server features (See Allow Administration Checkbox and Allow Analysis Checkbox). • Disable Security (unchecked - default setting): All users have full access to Sentry II's Server features. Enable Automatic Agent Registration Checkbox • When checked (the default setting), Sentry II Agents can automatically register user server or workstation computers to the Sentry II Server database. • When unchecked, you must manually set up the server or desktop computers that you wish to monitor (See Configure Server/Agents & Devices). Apply Button • Press the Apply button to save changed Global Security settings. Session Logon Report When Security is enabled, an entry is logged to the Sentry II database for every user who logs in to use the Sentry II ‘Console’ and start a ‘Session’ with the Sentry II Server. There is a Report available in Run/Analyze & View Reports called the Session Log that you can run that lists all the ‘Sessions’ with the User login name and the date/time the ‘Session’ was started. User Security Report There is a Report available in Run/Analyze & View Reports called the User Security that you can run that lists all the defined User names and their security settings. Sentry II 8.0 User’s Guide p. 74 Version 8.0.12 July 2006 Configure SNMP Trap Definitions Use Configure SNMP Trap Definitions to add new SNMP Trap OIDs or modify the name, description and/or OID of existing SNMP Trap OIDs for Sentry II's SNMPWatch feature. SNMP Trap OIDs define those SNMP Traps that Sentry II can watch for and generate an alert if received. Use this to also parse MIBs and extract the SNMP Trap OID information and automatically add to the available definitions. You must configure your Windows server/workstation where the Sentry II Server runs with the Microsoft SNMP service. For Windows 2000 / XP, go to Network and Dial-up Connections and select Advanced from the menu bar. On the Advanced menu, choose Windows Optional Networking Components Wizard, then Management and Monitoring Tools. Click the checkbox to add Simple Network Management Protocol, and click the OK button. For Windows NT, go to Control Panel, Network, and then select the Services tab. If the SNMP Service is not already installed, choose and Add the SNMP Service. Once the SNMP Service is available in the Services tab, select the SNMP Properties and check the configuration. Under the Traps tab, insure the Community name matches the community of the SNMP devices you are monitoring. Under the Security tab, check “Accept SNMP Traps from Any Host”. Process MIBs Button • Press the Process MIBs button to analyze all the '.mib' files stored in the "...\Sentry II\Mibs" folder. The '.mib' files found here will have the Trap OIDs automatically discovered and placed in the Trap OID list (See Configure Watches/Alerts, New, 'SNMPWatch for SNMP Traps'). • The '.mib' files can be processed any number of times as duplicate Trap OIDs are looked for and prevented. Sentry II 8.0 User’s Guide p. 75 Version 8.0.12 July 2006 • An error in any one '.mib' file will prevent the processing of any them. Refer to the error message in the pop-up message box. Usual errors are 'unknown identifiers'. Look for a case sensitive mismatch on the definition of the Object Type, and the later use of it in the Mib. If the Object name is used but not identified in the Mib, you may be missing the base Mib from the vendor where the Object Type identifiers are defined. • If unable to correct the problem with the Mib, remove it from the "...\Sentry II\Mibs" folder (or rename it to something other than '.mib', for example, '.mi_') and run Process MIBs again to process the other Mibs in the folder. After you correct the problem with the Mib, place it back in the "...\Sentry II\Mibs" folder and rerun Process MIBs. SNMP Trap Name Field • Defines the name of an SNMP Trap that will be available in Configure Watches/Alerts that you can choose to watch for and if received, generate an optional alert. • Select the appropriate name to Edit an existing SNMP Trap or enter the desired name when defining a New SNMP Trap (See Edit and New Buttons Below). Description Field • An optional description for the SNMP Trap defined in the SNMP Trap Name field. OID Field • Defines the Originating ID for an SNMP Trap that Sentry II can watch and monitor for receiving. • Custom OIDs can be defined using a wild-card '*' as the last character which will match any Trap OID received that includes the Custom OID as a base. For example: Custom OID = "1.3.1.6*” would match on received Trap OIDs "1.3.1.6.5.1.3.5" and "1.3.1.6.5.1.2.4" and so on since they contain "1.3.1.6" as a base. • OIDs may be specified with the 'Exclude' directive by preceding the OID with the characters '%!' (without quotes). This is particularly useful when using a wild card. Using the wild card in one definition and then excludes in one or more other definitions, you can set up to process all Traps except those excluded. New Button • Press the New button to add a new SNMP Trap to the Sentry II database. Fill in the SNMP Trap Name, optional Description, and OID fields, and then press the Save button. Edit Button • Select an existing group from the SNMP Trap Name drop down field. Press the Edit button to modify the SNMP Trap Name, Description, or OID fields for an existing group. Sentry II 8.0 User’s Guide p. 76 Version 8.0.12 July 2006 Delete Button • Select an existing SNMP Trap from the SNMP Trap Name drop down field. Press the Delete button to remove an SNMP Trap from the Sentry II database. You are prompted to confirm the delete. Save Button • Press the Save button to save new or edited parameters for an SNMP Trap. Cancel Button • Press the Cancel button to abandon any new or edited parameters. Sentry II 8.0 User’s Guide p. 77 Version 8.0.12 July 2006 Configure Domain Information Use Configure Domain Information to define your Windows Domains, Workgroups, and Standalones, and optionally the User Name and Password credentials, for use in managing your Sentry II Agents. Domain Name Field • Defines the Domain, Workgroup, or Standalone name in your network. • Select the appropriate name to Edit an existing Domain entry, or enter the desired name when defining a New Domain. (See Edit and New Buttons below). Type Field • Defines whether the named entry is a Domain, Workgroup, or Standalone. Description Field • An optional description for the selected Domain. User Name Field • Optional User Name credential, with Administrator rights, for the named Domain. • In Manage Agents in Configure Servers/Agents & Devices, you can specify the Logon credentials, at that time, for use in doing the Agent Install and Update operations. Password Field • Optional Password credential, associated with the User Name above, for the named Domain. • In Manage Agents in Configure Servers/Agents & Devices, you can specify the Logon credentials, at that time, for use in doing the Agent Install and Update operations. Sentry II 8.0 User’s Guide p. 78 Version 8.0.12 July 2006 Verify Password Field • Verify the optional Password entered in the Password field. New Button • Press the New button to add a new Domain, Workgroup, or Standalone to the Sentry II database. Fill in Domain Name, Type, optional Description, optional User Name and Password fields, then press the Save button. Edit Button • Select an existing Domain from the Domain Name drop down field, and then press the Edit button to modify the Domain Name, Type, Description, User Name or Password fields. Press the Save button to save the changes. Delete Button • Select an existing Domain from the Domain Name drop down field, and then press the Delete button to remove it from the Sentry II database. You are prompted to confirm the delete. Save Button • Press the Save button to save new or edited parameters for a Domain, Workgroup, or Standalone. Cancel Button • Press the Cancel button to abandon any new or edited parameters. Sentry II 8.0 User’s Guide p. 79 Version 8.0.12 July 2006 Configure Watches/Alerts Configure Watches/Alerts is the primary function for specifying all the different type of monitoring you want to do, along with any associated rules for each “monitor”. Sentry II uses the term “Watch”. Use Configure Watches/Alerts to specify Watch and Alert parameters for: • IP Services (ServerWatch) watch and alerting; • SNMP & Windows Performance Counters (CounterWatch) watch and alerting; • SNMP Traps (SNMPWatch) watch and alerting • SYSLOG Messages (SYSLOGWatch) watch and alerting; • Windows Processes (ProcessWatch) watch and alerting; • Windows Services (WinServicesWatch) watch and alerting; • Windows Files (FileWatch) watch and alerting; • Windows Event Logs (EventLogWatch) watch and alerting; • Custom Windows monitoring (CustomWatch) watch and alerting Defined watches and alerts are applied to one or more servers/devices you specify. You define the IP Service watch checking frequency, or Windows Processes, Windows Files, Windows Services, Windows Event Log, SNMP Trap and SYSLOG watch parameters, or the CounterWatch threshold Sentry II 8.0 User’s Guide p. 80 Version 8.0.12 July 2006 and duration for alert conditions; you define minimal notification intervals for alert conditions; and, you define additional actions, such as send an Email, dial a Pager or Beeper, restart a stopped Windows service, execute a program, or send a Trap or Syslog notification, that should be taken when the alert condition occurs. The SNMP Trap and SYSLOG, Windows Service, File, Process and Event Log alert events, IP Service watch events and all SNMP & Windows CounterWatch alert events are always logged to the Sentry II Server database for reporting and later analysis. Use AlertWatch Display to view the alerts you have defined as they occur in real-time. Use ServerWatch Display to view the real-time current status of your monitored servers with IP Services. Use EventLogWatch Display to view the watched Events you have defined as they occur in realtime; use SNMPTrapWatch Display to view the watched SNMP Traps you have defined as they occur in real-time; use SYSLOGWatch Display to view the watched SYSLOG messages you have defined as they occur in real-time. All these separate display functions are found on the Display menu tab. Review Mode The Review Mode is the default view and is used to view the parameters for various watches and alerts. In this view, you can choose to add new watches and alerts, edit existing watches and alerts, or delete watches and alerts. New / Edit Update Mode To enter Edit and Update Mode, press the New or Edit buttons. In these modes, you can modify parameters for existing watches and alerts or define parameters for new watches and alerts. Watch/Alert Name Field • In Review Mode, you can select an existing watch or alert from the drop down list and view its parameters, and then Edit or Delete it (See Edit and Delete Buttons below). • In Edit and Update Mode, modify an existing watch/alert name or enter the desired name when defining a New watch or alert. Description Field • An optional description for the watch or alert defined in the Watch/Alert Name field. Verbose Description Notes Button • Click the button to the right of the Description field and pop-up a free-form text box where you can enter optional verbose notes description for the server/device defined in the Server/Device Name field. • These verbose notes are displayed in the pop-up tool-tip window when hovering with the mouse over the server/device name in various Sentry II displays. Sentry II 8.0 User’s Guide p. 81 Version 8.0.12 July 2006 Severity Field • This field works in conjunction with the Network Status Display. The Severity field specifies how the particular Watch/Alert affects the status display. A Severity of 'Normal' has no effect and is ignored; a Severity of 'Caution' would cause the status display Yellow icon; a Severity of 'Critical' would cause the status display Red icon. Suspend Watch/Alert Checkbox • Click the checkbox to suspend the particular Watch from checking and alerting. • This is not available for CounterWatch type Watches. Watch Templates Button • Click the Watch Templates button and select a Select a Watch Template and click the OK button and begin to create a New Watch. • Start with the Template's parameters; and make any desired changes, if necessary. Usually you only need to select the servers/devices and any alert Action(s) desired. Watch Report Button • Click the Watch Report button and select one or more servers/devices from the pop-up, and display a report on all the Watch/Alerts, and associated details, that are defined for each selected server/device. Sentry II 8.0 User’s Guide p. 82 Version 8.0.12 July 2006 • Optionally click the Print button to print the report. Watch/Alert Type Views This view is the default tab view and depends on the Alert Type. If the Alert Type is WinServicesWatch, the SERVICES tab is displayed; if the Alert Type is EventLogWatch, the EVENTLog tab is displayed; if the Alert Type is ProcessWatch, the PROCESS tab is displayed; if the Alert Type is SNMPTrapWatch, the SNMPTrap tab is displayed; if the Alert Type is SYSLOGWatch, the SYSLOG tab is displayed; if the Alert Type is ServerWatch for IP Services, the IP Service tab is displayed; if the Alert Type is CounterWatch, the COUNTER tab is displayed; if the Alert Type is FileWatch, the FILE tab is displayed; if the Alert Type is CustomWatch, the CUSTOM tab is displayed; otherwise, if the Alert Type is User, the USER tab is displayed. IP Service Tab Choose the ServerWatch for IP Services View by selecting the IP Service tab. In this view, if Review Mode, you view the parameters for IP Service Type and Selections for the applicable servers/devices, for your various Watches/Alerts. In Edit and Update Mode (See New and Edit Buttons below), you can modify these same parameters. IP Service Field In Review Mode, defines the IP Service name for this Watch/Alert. In Edit and Update Mode, this field is hidden and the IP Service is selected from the tree displayed in the Selection(s) field (see below). Reboot Check Checkbox • AGENT Only; Select this to enable the reboot/restart monitor check and alert when server Up Time is less than the previous check;. HW/Config Check Checkbox Sentry II 8.0 User’s Guide p. 83 Version 8.0.12 July 2006 • AGENT Only; Select this to enable the HW/Configuration monitor check and alert when any difference is detected. Exclude Objects Field • AGENT Only; Optionally specify one or more WMI Hardware/Configuration Object names to exclude from ‘HW/Config Check’. • Refer to the various Object Names in the ‘H/W Asset Details’ in ‘Configuration>Servers/Agents & Devices’; for example, “Printer; CDROMDrive; NetworkAdapter” without the quotes. Object name check is NOT case sensitive. Registry Check Checkbox • AGENT Only; Select this to enable the Registry monitor check and alert when any difference is detected. • Specify which Registry keys and Values to monitor and how frequently in the Registry Monitor Display. Memory % Field • AGENT Only; Specify the percentage threshold for the virtual memory Page File and alert if the free space drops below this threshold. Logical Drive % Field • AGENT Only; Specify the percentage threshold for the Logical Drives and alert if the free space drops below this threshold. Sentry II 8.0 User’s Guide p. 84 Version 8.0.12 July 2006 Exclude Drives Field • AGENT Only; Optionally specify Logical Drive letters to exclude these drives from the threshold check. Selection(s) Field • The Review Mode displays the applicable server/device Names and Descriptions for the selected watch / alert. • Hover with the mouse over the named computers to see the respective description, if available. • Server/device Selection(s) in red text indicate a suspended watch / alert. • The Edit and Update Modes display a tree view of all available IP Service types from the Sentry II database. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any service by clicking the '+' to view the service's associated computers. • Collapse expanded services by clicking the '-'. • Define the watch / alert by selecting one or more servers/devices associated with an IP Service. • Computers already assigned previously to an IP Services watch / alert use this icon instead of a checkbox. IP Services servers/devices can only be assigned to one alert. • Attempting to select servers/devices associated with an IP Service when you already have selected servers/devices for another IP Service will cause a prompt for you to choose which IP Service and computer(s) to keep. Only one IP Service, with one or more servers/devices, can be defined for each watch / alert. Sentry II 8.0 User’s Guide p. 85 Version 8.0.12 July 2006 PROCESS Tab Choose the ProcessWatch View by selecting the PROCESS tab. In this view, if Review Mode, you view the parameters for Process Name and Process Path, options Restarting or Terminating a monitored process, and optional CPU and Memory utilization Thresholds. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. Process Name Field • Defines the name of the Process to be monitored. • The asterisk (‘*’) Wild Card character is supported, and when specified, all processes are monitored against the specified CPU or memory thresholds. You can for example specify ‘act.exe*’ as the Process Name, and this will give you the option to terminate the process if it exceeds your specified thresholds. • A Process can be monitored to be running or not running; and depending on your choice, either optionally restarted, terminated, or just notified with an Email, or a Pager, or other Action. • A Process can also be optionally monitored for CPU and Memory utilization thresholds. Use the asterisk wild-card, for example specify ‘act.exe*’ as the Process Name, and this will give you the option to terminate the process if it exceeds your specified thresholds. • In New or Edit mode, click the "..." button to see a list of the current running processes on a selected server; if you select one of the displayed processes, then the Process Path filed is also updated. • The Sentry II Agent checks processes every one (1) minute. Sentry II 8.0 User’s Guide p. 86 Version 8.0.12 July 2006 Process Path Field • Required only if the Restart option is selected. • Defines the "fully qualified path" name for the Process being monitored. The path includes the driver letter but does NOT include the machine name. For example, "C:\Program Files\MyProcesses\Process.exe" is a correct specification. Should Be 'Running' & 'Not Running' Radio Buttons • Choose the condition for the specified Process to be monitored Notify Only Checkbox • Select this if you do not want the Sentry II Agent to attempt to restart or terminate the monitored Process. Delay Field • Optionally, specify a delay (duration) value in minutes that the Process is detected as running (or not running) before the alert condition exists. 'Restart' & 'Terminate' Radio Buttons • If Notify Only is not checked, then either one or the other of these radio buttons is selected, depending on whether the process is being monitored for running or not running. Instance Count Field • Optional parameter, if specified it defines the minimum number of instances for a process that should be running; if the number of instances of the specified process running is less than this then an alert condition exists. • If the Not Running option is selected, then this count defines a 'ceiling' such that if the instance count of the specified process is equal to or greater than this count, then an alert condition exists; if the Terminate option is selected then instances of the specified process will be terminated until the number of instances is less than this count. Exclude From Wild Card Field • Applicable only if the Wild Card '*' is specified for the Process Name. • Optional parameter, if specified it defines one or more processes, separated by a semi-colon, that are excluded from the process check. Threshold Fields • Click the button to view the optional Threshold parameters to monitor the CPU and Memory utilization of a running Process. Duration Field Sentry II 8.0 User’s Guide p. 87 Version 8.0.12 July 2006 • Optional parameter, if specified it defines the duration in minutes that any of the thresholds specified must be exceeded for an alert condition to exist. CPU (%) Field • Optional parameter, if specified it defines the maximum average CPU utilization of the monitored Process over the monitored interval which by default is 1 minute. This can be extended by use of the Duration parameter. If the computed average percentage exceeds this parameter, then a Watch/Alert Action is executed. • For example, if the CPU (%) field is set to 50, then if the average CPU utilization for the specified process (or any process if using the Wild Card '*') exceeds 50% for the default 1 minute interval (or 'n' continuous minutes if the Duration is set 'n'), then an alert condition exists. Memory(kb) Field • Optional parameter, if specified it defines the maximum Memory utilization in Kilobytes (KB) of the monitored Process. If the current utilization by this Process exceeds this parameter, then a Watch/Alert Action is executed. • This is the Task Manager 'Mem Usage' value for a process. PageFile Field • Optional parameter, if specified it defines the maximum Page File (or Virtual Memory) utilization in Kilobytes (KB) of the monitored Process. If the current utilization by this Process exceeds this parameter, then a Watch/Alert Action is executed. • This is the Task Manager 'VM Size' value for a process PPool Field • Optional parameter, if specified it defines the maximum Paged Pool utilization in Kilobytes (KB) of the monitored Process. If the current utilization by this Process exceeds this parameter, then a Watch/Alert Action is executed. • This is the Task Manager 'Paged Pool' value for a process. Sentry II 8.0 User’s Guide p. 88 Version 8.0.12 July 2006 NPPool Field • Optional parameter, if specified it defines the maximum Non Paged Pool' utilization in Kilobytes (KB) of the monitored Process. If the current utilization by this Process exceeds this parameter, then a Watch/Alert Action is executed. • This is the Task Manager 'NP Pool' value for a process. Selection(s) Field • The Review Mode displays the applicable Server/Workstation Names and Descriptions for the selected Watch/Alert. • The Edit and Update Modes display a tree view of all server/workstations that have the required Sentry II Agent installed. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Group by clicking the '+' to view the Group's associated servers/computers with the Sentry II Agent installed. • Collapse expanded Groups by clicking the '-'. • One or more servers/workstations must be selected. SERVICE Tab Choose the WinServicesWatch View by selecting the SERVICE tab. In this view, if Review Mode, you view the parameters for Windows Services and Selections for the applicable servers/workstations, for your various watches and alerts. In Edit and Update Mode (See New and Edit Buttons below), you can modify these same parameters. Sentry II 8.0 User’s Guide p. 89 Version 8.0.12 July 2006 Display Services By Radio Button • In Edit and Update Mode, choose how you want to display servers/computers and associated Windows Services, either ordered by Services or by Servers/Computers. Attempt Service Restart Checkbox • When checked, the monitored Windows Service will be restarted when Sentry II detects it has Stopped. Delay Field • Optionally, specify a delay (duration) value in minutes that the Service is detected as Stopped before the alert condition exists. Selection(s) Field • The Review Mode displays the applicable Server/device Names and Descriptions, along with their selected Windows services, for the selected watch / alert. • Hover with the mouse over the named servers/computers to see the respective description, if available. • Server/device Selection(s) in red text indicate a suspended watch / alert. • The Edit and Update Modes display a tree view of all available Windows Services displayed by server/device or by service, based on the radio button selection. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Window Service to see its associated servers/computers, or expand any Server/device to see its associated Windows services, by clicking the '+'. • Collapse expanded services or server/devices by clicking the '-'. • One or more servers/workstations must be selected. EVENTLog Tab Choose the EventLogWatch View by selecting the EventLog tab. In this view, if Review Mode, you view the parameters for Event Log Name, Type, Source, Event ID, User Name, Description ( Message)and Selections for the applicable servers/workstations. In Edit and Update Mode (See New and Edit Buttons below), you can modify these same parameters. Log Name Field • In Review Mode, defines the Event Log name for this watch/alert. In Edit and Update Mode, this field is a drop-down with the names of the six Event Logs that can be watched; Sentry II 8.0 User’s Guide p. 90 Version 8.0.12 July 2006 Application, Security, System, Directory Service, DNS Service, and File Replication Service. Type Field • In Review Mode, defines the Event Log type for this watch/alert. In Edit and Update Mode, this field is a drop-down with the names of the five Event Log types that can be watched; Error, Warning, Information, Audit Success, and Audit Failure; as well as the default "empty" selection. • The "empty" selection is interpreted one of two ways. If there are other optional parameters defined (see following), then the Event Log Type is ignored, as are other “empty” parameters, when looking for a parameter match for an eligible alert. If there are NOT any other optional parameters defined, then the "empty" Type is interpreted to mean "all" types, and every event for the given Event Log will cause an alert. Source Field • Optional text field defining the Source as a parameter to determine the specific Event Log event to be watched for. The defined string is treated as an exact match. However, you can use the asterisk wild-card so that the specified string is treated as a sub-string when checking for a match with a Source parameter. You can specify multiple Source parameters by separating with a comma. Parameter is NOT case sensitive. Sentry II 8.0 User’s Guide p. 91 Version 8.0.12 July 2006 Event ID Field • Optional numeric field defining the Event ID as a parameter to determine the specific Event Log event to be watched for. You can specify multiple Event IDs, separated by a comma, and/or a range of Event IDs separated by a dash. For example, "1-100,150-200,250-275". User/Group Name Field • Optional text field defining the User Name as a parameter to determine the specific Event Log event to be watched for. You can specify multiple User Name parameters by separating with a comma. Parameter is NOT case sensitive. • You can also enter an Active Directory Group Name so that any User that is a member of the Group would be considered a Match. You can specify multiple Group Name parameters by separating with a comma. You also mix User and Group names. • The Group name is indicated by the including of a parenthesis pair as part of the name; for example, ‘Administrator()’ is the ‘Administrator’ Group. • Click the button to the right of this field to pop-up a display Windows and view your Active Directory information where you can select one or more Users and/or Groups. Refer to the Configure Security section for a description of the Active Directory View and Find function. Description Field • Optional text field defining an Event Description as a parameter to determine the specific Event Log event to be watched for. The defined string is treated as a sub-string when checking for a match against the Event Description. • You can specify multiple Description parameters by separating with a comma. Parameter is NOT case sensitive. • Use &T in a substring specification to represent a Tab character. AND Params Checkbox • By default, the above parameter fields, when defined, will cause an Event Log alert if any of the parameter fields match (Boolean "Or" check). This Optional checkbox, when checked, requires all the defined parameter fields above to match (Boolean "And" check). Exclude Checkbox • By default, when an Event matches (is included in) the criteria defined by the various parameter fields above, an alert condition occurs. This Optional checkbox, when checked, EXCLUDES any Event matching the criteria defined by the various parameter fields above, and no alert condition occurs. Sentry II 8.0 User’s Guide p. 92 Version 8.0.12 July 2006 All Except Checkbox • By default, when an Event matches (is included in) the criteria defined by the various parameter fields above, an alert condition occurs. This Optional checkbox, when checked, reverses the logic so that all Events NOT matching the criteria defined by the various parameter fields above, an alert condition occurs. Not Received in X Minutes Checkbox • Use this feature to monitor for the absence of an occurrence of one or more events matching the Watch parameters within the specified time-frame in minutes. Precedence Field • Specifies how this Watch/Alert is handled if the received Event Log event satisfies the criteria of multiple Watches/Alerts. A higher-precedence (1 is higher than 2, etc.) trumps Watches/Alerts with a lower precedence. Selection(s) Field • The Review Mode displays the applicable Server/device Names and Descriptions for the selected watch / alert. • Hover with the mouse over the named servers/computers to see the respective description, if available. • Server/device Selection(s) in red text indicate a suspended watch / alert. • The Edit and Update Modes display a tree view of all Groups (see Configure Groups) and eligible servers/computers running Windows NT or 2000 and the Sentry II Agent. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Group by clicking the '+' to view the Group's associated eligible computers. • Collapse expanded Groups by clicking the '-'. • One or more servers/workstations must be selected. FILE Tab Choose the FileWatch View by selecting the FILE tab. In this view, if Review Mode, you view the parameters for File Path Name, Size Change, Date/Time Change, Search String, Maximum Size, and Selections for applicable servers/workstations. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. Sentry II 8.0 User’s Guide p. 93 Version 8.0.12 July 2006 File Path Name Field • Defines the "fully qualified path" name for the file to be checked in this watch/alert. The path includes the driver letter but does NOT include the machine name. For example, "C:\MyApplication\MyLogFiles\Log.txt" is a correct specification. • This parameter fully supports wild-cards for defining a Watch on a group of files matching the specification; this parameter also accepts a directory/folder name as a specification to monitor the entire folder for the specified conditions. • If none of the other optional parameters below are defined then Sentry II watches for the creation and existence of the specified file(s). If the ‘NOT Check’ checkbox is checked, Sentry II watches for the deletion of the file(s). • Files are checked every one (1) minute by the Sentry II Agent, which is required on the selected servers/workstations. Size Change Checkbox • Optional parameter, if checked, the file's current size is determined, and any subsequent change to that size results in an alert condition. D/T Change Checkbox • Optional parameter, if checked, the file's current last-modified date/time is determined, and any subsequent change to that last-modified date/time results in an alert condition. Search String Field • Optional parameter, if specified, the file is scanned for this sub-string, and if found, results in an alert condition. The file scanning is optimized so that only new data added to the file is scanned on each check. Maximum Size(KB) Field Sentry II 8.0 User’s Guide p. 94 Version 8.0.12 July 2006 • Optional parameter, if specified, the file size in kilobytes (KB) is checked against this parameter and if it exceeds it, results in an alert condition. File Count Threshold Field • Optional parameter, if specified, the count of the files in the specified directory, or if the count of files matching the specified wild-carded file name, exceed the specified threshold, results in an alert condition. NOT Check Checkbox • Specifies, when set, that all the defined parameters are tested in the NOT condition. • The simple example is the specified file does not exist (perhaps it has been deleted). • For the Size Change, D/T Change, Maximum Size, and Search String parameters, if specified imply, the NOT of the parameter. For example, the Size and/or D/T have NOT changed, the File is less than the specified Maximum Size, or the File does NOT contain the specified Search String. Duration Minutes Field • Optional parameter, if specified, defines the Duration in Minutes that the File conditions must exist in the 'matched' (that is, the Alert state) before the Alert notification is actually triggered. AND Params Checkbox • Specifies, when set, that a match must occur on all of the parameter fields above that have been specified (Boolean AND); otherwise, if not set, a match can occur on any of the parameter fields above that have been specified (Boolean OR). File Audit and Optional WHO Information • FileWatch alert information on Files/Folders being monitored for changes and deletions will contain WHAT, WHEN, and WHERE by default. You can optionally have the WHO information included if you enable Windows Auditing on the File/Folder being monitored. • To enable File or Folder Auditing, perform the following steps: (1) Run the ‘Local Security Policy’ tool found in ‘Administrative Tools’ (2) Under ‘Security Settings->Local Policies->Audit Policy’, enable ‘Audit object access’ for Success and Failure (3) Next, right-click on the File or Folder name in Windows Explorer, and select ‘Properties’ (4) Next, on ‘Properties’, click ‘Security’, then ‘Advanced’, then ‘Auditing’, then ‘Add’ (5) Select ‘Everyone’ and then check all the Access option checkboxes for success and failure • Repeat steps (1) and (2) for each server/workstation as appropriate, or use a ‘Global Policy Setting’. Sentry II 8.0 User’s Guide p. 95 Version 8.0.12 July 2006 • Repeat steps (3) through (5) for each File and/or Folder where you want to capture the WHO information. Selection(s) Field • The Review Mode displays the applicable Server/device Names and Descriptions for the selected alert. • The Edit and Update Modes display a tree view of all server/devices that have the required Sentry II Agent installed. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Group by clicking the '+' to view the Group's associated servers/computers with the Sentry II Agent installed. • Collapse expanded Groups by clicking the '-'. • One or more servers/workstations must be selected. COUNTER Tab Choose the CounterWatch View by selecting the COUNTER tab. In this view, if Review Mode, you view the parameters for Threshold, Duration, and Selections for Object/Counter and applicable computers, for your various alerts. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. Counter Field • In Review Mode, defines the counter name for this watch/alert. In Edit and Update Mode, this field is hidden and the Counter is selected from the tree displayed in the Selection(s) field (see below). Object Field • In Review Mode, defines the object name for this watch/alert. In Edit and Update Mode, this field is hidden and the Counter is selected from the tree displayed in the Selection(s) field (see below). Sentry II 8.0 User’s Guide p. 96 Version 8.0.12 July 2006 Threshold Field • Defines the value for the counter selected. If this value is exceeded, either over or under (See Over checkbox) for the specified duration (See Duration parameter), the alert condition will be met. • The value is dependent on the counter and can represent percentage or quantity. Over Checkbox • Works in conjunction with the Threshold parameter and the Duration parameter. • When checked, the counter value must be over the Threshold value for the specified Duration for the alert condition to be met. • When unchecked, the counter value must be under the Threshold value for the specified Duration for the alert condition to be met. Duration Field • Works in conjunction with the Threshold and the Over checkbox parameters. • Define how long, in seconds, that the counter value must exceed the Threshold value, either over or under based on the Over checkbox setting, for the alert condition to be true. Selection(s) Field • The Review Mode displays the applicable Server/device Names and Descriptions for the selected alert. Sentry II 8.0 User’s Guide p. 97 Version 8.0.12 July 2006 • The Edit and Update Modes display a tree view of all available objects from the Sentry II database. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. Expand any object by clicking the '+' to view the object's associated counters. • Expand any counter by clicking the '+' to view the counter's associated computers. • Collapse expanded objects or counters by clicking the '-'. • Define the alert by selecting one or more computers associated with a single counter. • Attempting to select servers/workstations associated with a counter when you already have selected servers/workstations for another counter will cause a prompt for you to choose which counter and servers/workstations to keep. Only one counter, with one or more servers/workstations, can be defined for each alert. CUSTOM Tab Choose the CustomWatch View by selecting the CUSTOM tab. Sentry II’s CustomWatch monitors your Windows servers/workstations by executing any Windows program, command, script, or batch file executable that you provide. It runs the executable periodically on the monitored server/workstation according to a schedule that you specify. You can optionally specify a comparison of the executable’s Exit Code to an exit code you specify, and generate an alert notification if the comparison fails. You can optionally specify an Executable Time-Out value and Sentry II will terminate the executable if it does not complete on its own before the time-out expires. You can optionally specify Logon credentials and Sentry II will start the executable under the user context of these credentials; and the specification for the executable, and for the optional commandline options, support Environment Variable substitution when bracketed with the percent character; for example, %SystemRoot%. Sentry II 8.0 User’s Guide p. 98 Version 8.0.12 July 2006 Use the powerful CustomWatch to create your own custom monitors but also use CustomWatch as a central Windows Job Scheduler, and easily manage the scheduled execution of all your jobs across all your servers and workstations from the central Sentry II Server. In this view, if Review Mode, you view the parameters for Program Name, Command-line Options, Execute Time-out, Exit Code, and optional User Name & Password. You also specify the servers/workstations where the CustomWatch should execute. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. Program Name Field • Defines the fully qualified path name to the executable on the target server/workstation. For example, C:\Program Files\CustomWatch\Custom.exe • Supports Environment Variable substitution when bracketed with the percent character; for example, %SystemRoot%. Command-line Options Checkbox • Optionally, specify the command-line options that are past to the executable. • Supports Environment Variable substitution when bracketed with the percent character; for example, %SystemRoot%. Execute Time-out Field • Optionally, specify a time-out value in seconds that Sentry II Agent will use to terminate the executable if it has not ended execution on its own prior to the time-out. Exit Code Field Sentry II 8.0 User’s Guide p. 99 Version 8.0.12 July 2006 • Optionally, define an exit code and a comparison that the Sentry II Agent will make against the executable’s exit code, and generate an alert if the comparison fails. Optional User Name Field • Optionally, define a User Name that the Sentry II Agent will use to run the executable in this User’s security context. Password Field • Password for the User Name that the Sentry II Agent will use to run the executable in this User’s security context. Selection(s) Field • The Review Mode displays the applicable Server/Workstation Names and Descriptions for the selected CustomWatch. • The Edit and Update Modes display a tree view of all servers/workstations that have the required Sentry II Agent installed. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Group by clicking the '+' to view the Group's associated servers/workstations with the Sentry II Agent installed. • Collapse expanded Groups by clicking the '-'. • One or more servers/workstations must be selected. SNMPTrap Tab Choose the SNMPTrapWatch View by selecting the SNMPTrap tab. In this view, if Review Mode, you view the parameters for Trap OID(s) and Selections for the applicable servers/devices for your various Watches. In Edit and Update Mode (See New and Edit Buttons below), you can modify these same parameters. Trap OID(s) Drop-down • In Review Mode, defines the Trap OID(s) for this watch/alert. In Edit and Update Mode, clicking the Add/Remove button immediately to the right can modify this drop-down list. • Clicking the Add/Remove button displays a pop-up box with all available Trap OIDs. Check or uncheck the associated checkbox to include or exclude the OID from this watch/alert. • Click the Custom button to define a new SNMP Trap OID, and optionally add it to the SNMP Trap OID Definitions. (See Configure SNMP Definitions to administer all the available SNMP Trap OID Definitions, parsing MIBs to extract Trap information, and for descriptions of some available options for defining OIDs such as wild cards, and exclusions.) Sentry II 8.0 User’s Guide p. 100 Version 8.0.12 July 2006 Selection(s) Field • The Review Mode displays the applicable Server/device Names and Descriptions for the selected watch / alert. • Hover with the mouse over the named computers to see the respective description, if available. • Server/device Selection(s) in red text indicate a suspended watch / alert. • The Edit and Update Modes display a tree view of all available Groups and associated Server/devices from the Sentry II database. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Group by clicking the '+' to view the Group's associated servers/computers. • Collapse expanded Group by clicking the '-'. • Define the watch / alert by selecting one or more server/devices. SYSLOG Tab Choose the SYSLOGWatch View by selecting the SYSLOG tab. In this view, if Review Mode, you view the parameters for Facility codes, Severity codes, Tag search string, Content search string, Precedence, AND Check Field and Selections for applicable servers/devices. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. Anatomy of a Syslog Message Sentry II 8.0 User’s Guide p. 101 Version 8.0.12 July 2006 • Syslog message format calls for each message to start with a ‘Message’ code (also called a ‘Priority’ code) in angled-brackets. For example, “<23>Jan 11 16:06:10…” • In this example “<23>Jan 11 16:06:10…”, ‘23’ is the ‘Message Code’, and from this you can also derive the ‘Facility’ and ‘Severity’ codes as follows: ‘Message Code’ divided by 8, with the Quotient equal to the ‘Facility’ code and the Remainder equal to the ‘Severity’ code. • In the example “<23>Jan 11 16:06:10…”, 23/8 equals a Quotient of 2 and a Remainder of 7, so the Facility code is 2 which is ‘Mail System’, and the Severity code is 7 which is ‘Debug’. • In the pop-up selection checkbox list for Facility and Severity codes, accessed by clicking the associated button with the three dots, the codes are zero-relative. Message Code(s) Field • Defines the eligible Message codes to watch for in received SYSLOG messages. Is optional as long as at least one Facility code, or a Severity code, or Match All is specified. Sentry II 8.0 User’s Guide p. 102 Version 8.0.12 July 2006 Facility Field • Defines the eligible Facility codes to watch for in received SYSLOG messages. Is optional as long as at least one Message Code, or a Severity code, or Match All is specified. • See Anatomy of a Syslog Message above for how one determines the Facility code. Severity Field • Defines the eligible Severity codes to watch for in received SYSLOG messages. Is optional as long as at least one Message Code, or a Facility code, or Match All is specified. • See Anatomy of a Syslog Message above for how one determines the Severity code. Tag Field • Optional parameter, if specified, the Tag field in the received SYSLOG message is scanned for this string, and if found, results in a match condition. Match All Checkbox • Set this checkbox to easily define this Watch as matching all received SYSLOG messages. Is optional as long as at least one Message Code, or a Severity code, or Facility code is specified. Content Field • Optional parameter, if specified, the Content portion of the received SYSLOG message is scanned for this string, and if found, results in a match condition. Precedence Field • Specifies how this Watch/Alert is handled if the received SYSLOG message satisfies the criteria of multiple Watches/Alerts. A higher-precedence (1 is higher than 2, etc.) trumps Watches/Alerts with a lower precedence. AND Params Checkbox • Specifies, when set, that a match must occur on all of the parameter fields above that have been specified (Boolean AND); otherwise, if not set, a match can occur on any of the parameter fields above that have been specified (Boolean OR). Archive Only Checkbox • Use this option for high-volume collection, if there are no alert 'Actions' Specified. By default, any SYSLOG Message matching the Watch is both written to an Archive file and written to the Database. With this 'Archive Only' option, you increase Performance by writing to the Archive file only, and by-passing the Database. See 'Syslog View/Archive & Report' on the 'Report' Menu. Archive Never Checkbox Sentry II 8.0 User’s Guide p. 103 Version 8.0.12 July 2006 • Use this option to skip the write to the Archive file when you do not have high-volume collection requirements and/or if you don't require saving SYSLOG messages for long term. Messages are only written to the Database. Specify an alternate Archive folder for this Watch versus the default folder '...\\Sentry II\\SyslogArchive' Archive Path Field • Optionally specify an the path to an alternate Archive folder for the SYSLOG messages that match this Watch versus the default folder '...\Sentry II\SyslogArchive'. Format is Drive:\.... or UNC path, for example, \\MachineName\c$\SyslogAlternate; Drive can be a mapped drive. The Sentry II Server component needs to have access rights to the specified folder. Selection(s) Field • The Review Mode displays the applicable Server/Device Names and Descriptions for the selected alert. • The Edit and Update Modes display a tree view of all servers/devices defined to Sentry II. • Press the Expand button to view the Selection(s) display or Tree View display in an expanded pop-up. • Expand any Group by clicking the '+' to view the Group's associated servers/devices. • Collapse expanded Groups by clicking the '-'. • One or more servers/devices must be selected. USER Tab Choose the User View by selecting the USER tab. There are no parameters to define or edit in the User View. See User Alert below for more information. Schedule View Choose the Schedule View by selecting the Schedule tab. Sentry II 8.0 User’s Guide p. 104 Version 8.0.12 July 2006 If Review Mode, you view the parameters for your various watches / alerts such as Every Time, Minimal Notification Interval, Server Check Frequency if a Services alert type. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. Alert Every Time Checkbox • Defines whether an alert is generated every time the conditions are met, or only after the Minimal Notification Interval time specification elapses. • When checked the alert is generated every time the conditions are met. • Applies to all Watch/Alert types except User, • When unchecked, the alert is only generated if the alert conditions are met, and the Minimal Notification Interval is exceeded since the last alert for this type. Minimal Notification Interval Field • Defines the minimal interval that must elapse between events for this alert before another alert will be generated. The Every Time checkbox must be unchecked. • For ServerWatch IP Services, this also defines the minimum elapsed time since a service is first detected as down or failed before an alert is generated. • When in Edit and Update Mode, this is a "point & click" field; click the field to display the interval choices. You specify this value in seconds, minutes, or hours. • Applicable to all watch/alert types except User. However, each alert occurrence for any watch/alert type is considered unique based on the details. For example, an EventLog watch/alert can be defined that can encompass any Event type from any server/workstation. For purposes of the Minimal Interval determination, an EventLog alert is considered the same based on being the same Event Type and ID, from the same server/workstation; a WinServices alert is considered the same based on being the same service from the same server/workstation; a FileWatch is considered the same based on being the same file name from the same server/workstation; an SNMP Trap is considered the same based on being Sentry II 8.0 User’s Guide p. 105 Version 8.0.12 July 2006 the same Trap type from the same server/device; and a SYSLOG is considered the same based on being the same SYSLOG Message type received from the same server/device. Service Check Frequency, Every Field • Applicable only to IP Service alert types. • Defines the frequency with which the service specified for this watch/alert is checked. An alert condition occurs when the watch check fails. Maximum Alert Notifications Field • Applicable only to ServerWatch IP Service, CounterWatch, ProcessWatch, WinServicesWatch and CustomWatch alert types. • Defines the maximum number of times you want to be notified during a continuous failure situation. o A value of 0 means no maximum defined so you will continue to be notified according to your Every Time and Minimal Notification Interval settings. o A non-zero value means that after you have been notified the number of times defined in the Maximum Alert Notifications, and according to your Every Time and Minimal Notification Interval settings, you will not be notified again. Notify On Restore Checkbox • Applicable only to CounterWatch, ProcessWatch, WinServicesWatch and CustomWatch watch/alert types. • Defines whether a 'Restore' alert is generated if you have previously been alerted due to a failure for one of the applicable watch/alert types. • There is always a Notify on Restore for a ServerWatch for IP Service. Watch/Alert Dependency Field • Applicable only to IP Service alert types. • Optional association to another existing ServerWatch watch/alert ("Primary") that this watch/alert is "dependent". If any server/device defined in the "Primary" watch/alert is down/unavailable, then alert notifications and actions for this "dependent" watch/alert are suppressed on any of its check failures. • This provides a means where you can minimize alert notifications and actions on server/device failures if these servers/devices are guaranteed to fail their checks if one or more servers/devices in the "Primary" watch/alert are down and unavailable. Suppress Monitoring Field • Applicable only to ServerWatch IP Service, CounterWatch, ProcessWatch, WinServicesWatch and CustomWatch alert types. Sentry II 8.0 User’s Guide p. 106 Version 8.0.12 July 2006 • Specify one or two time periods when you want the monitoring for this watch/alert to be suppressed. • Specify by day-of-the week, start and end, and time, in HH:MM, start and end. • Choose specifications by clicking either field, and then selecting the appropriate parameters from the drop-downs. Run Program Every Field • Applicable only to CustomWatch alert types. • Define how frequently the CustomWatch executable should run. Start At Date/Time Field • Applicable only to CustomWatch alert types. • Defines the starting point for the executable. The Sentry II Agent attempts to always run the executable at a periodic rate that is an even increment from the Start Date/Time plus the Run Program Every rate. When Any Single Event/Trap/Message Occurs Field • Applicable only to EventLogWatch, SNMPTrapWatch, and SYSLOGWatch alert types. • Acts as an additional filter so that an alert condition exists only after a specific event, trap, or message occurs the defined amount of times within the specified time frame. • Each event, trap, or message that matches the Watch criteria is treated discretely when counting. For example, an event with ID 500 is counted separately from ID 501, even though both match the Watch. However, if the Combine All checkbox is checked, then matching events, traps, or messages are not treated discretely and are combined together when counting. Actions View Choose the Actions View by selecting the Actions tab. If Review Mode, you view the parameters for the various alert notification actions available, for your alerts. In Edit and Update Mode (See New and Edit Buttons below), you may modify these same parameters. There are six possible alert notification actions that can be taken. When an alert occurs, choose one or more of these notification actions to be carried out: • Send an Email to one or more Email addresses; • Dial an Alpha Pager or PCS Phone and send an alpha-numeric text string up to 220 characters Sentry II 8.0 User’s Guide p. 107 Version 8.0.12 July 2006 • Dial a Beeper and send a numeric text string; • Execute any program, script, batch on the Sentry II Server computer, passing an optional argument string. Optionally, execute a program, script, batch on the failing server/workstation. • Send an SNMP Trap message to another management console or Trap server. • Send a SYSLOG message to another management console or SYSLOG server. • You select the appropriate action tab to navigate to each of the six alert notification setup screens contained within the Actions tab view. Email Email Notify Checkbox • Defines whether an Email is sent when an alert condition exists for the Watch. • When checked and alert conditions are met, an Email is sent to the Email address specified in the Email Address field. Multiple Email addresses may be specified, separated by a comma. The subject line is specified in the Email Subject field. • When unchecked, no action is taken to send an Email. • To send email, the Global SMTP Server (See below) must be defined. Email Address Field • Defines the address where an alert Email is sent when an alert condition exists for the Watch. The Email Notify checkbox must be checked. • Multiple Email addresses can be defined and must be separated by a comma. Sentry II 8.0 User’s Guide p. 108 Version 8.0.12 July 2006 • You can also define and use "Email Group" names in the Email address field. Email Group names represent one ore more Email addresses. See Email Group Button below. • You can use the &G or &N macro as part of an Email Address, and these are substituted with the name of the Group (&G) the alerting server/device belongs to or the name of the alerting server/device itself (&N), respectively. Use in conjunction with Email Groups where you define an Email Group to represent each server/device Group, and then have an alert Email notification only go to addresses in the Email Group you have defined to handle servers/devices in the associated Group. Email Subject Field • Defines the Email subject line if an Email is sent on an alert condition. • The Email Subject field supports "macro substitution" based on ten different macro parameters. The parameters are case sensitive and must be upper case. These parameters are: &D for Date, &T for Time, &N for Name of the server/device causing the alert condition, &G for the Name of the Group that the server/device belongs, &A for IP Address of the server/device causing the alert condition, &W for the Watch/Alert ‘Name’ responsible for the alert, &R for the Watch/Alert ‘Description’ text, &L for the Watch/Alert ‘Severity’ level, &S for Status message or code associated with the alert, &O for the Server/Device Notes, &E for the Watch/Alert Notes, &V for the CounterWatch value that exceeded a threshold in this type alert. Email Group Button • Press the Email Groups button Sentry II 8.0 User’s Guide to select and or manage your Email Groups. p. 109 Version 8.0.12 July 2006 • From the Select and Manage Email Groups pop-up, select an Email Group name to add to the Email Address field by pressing the Select button • Press the Manage button for the Create and Manage Email Groups pop-up. From this screen you can create new Email Groups; edit existing Email Groups by adding, editing or deleting to the list of associated Email addresses; or delete existing Email Groups • Use the Duplicate button to clone an Email Group with all the associated addresses where you the can Edit it give it a new name. • Press the Report button to pop-up a report display of all your Email Groups, and from there, select Print to print the report. • When you select Add Address or Edit Address, the pop-up includes a drop-down ‘Pick List’ that displays all previously entered Email addresses so you can pick and reuse addresses when you have them defined in more than one Email Group. Customize Email Text Button • Press the Customize Text button default text provided by Sentry II Sentry II 8.0 User’s Guide to define custom Email text to be used in place of the p. 110 Version 8.0.12 July 2006 • The Custom Email Text supports the same "macro substitution", based on six different macro parameters, as the Email Subject field. See the Email Subject field description above for the definition of the macros supported. • When custom Email text is defined, there is this check mark Email Text button to indicate this to the right of the Customize SMTP Server Parameters for all Email Button • Press the SMTP Parameters for all Email button to define the global SMTP parameters, which apply to all Email. This pops-up the Edit Global SMTP Server and Originating Email Addresses (See below) dialogue box. SMTP Servers, Such as Exchange Server, and Possible Settings You May Need to Make • If you are using a local Microsoft Exchange Server (or other SMTP Email Server), and you are specifying Email recipients, who are external to your Exchange Server, you may need to set some Exchange properties to allow rerouting of the "incoming" Email from Sentry II to the external recipients. • On the "Routing" tab in MS Exchange Manager, under “Internet Mail”, you may need to select the radio button to "Reroute incoming SMTP mail". • In order to lock down rerouting to only authorized "Hosts and Clients", go to the "Routing Restrictions" properties, and check the checkbox for rerouting only for "Hosts and Clients that successfully authenticate". If you do this, define a Login and Password in Exchange for Sentry II's use, and then use these as the parameters for setting the Global SMTP Authentication here in Sentry II. Edit Global SMTP Server(s) & From Addresses, and Authentication Parameters Dialogue Box • Press the configuration button to pop-up this dialogue box. Specify the SMTP server address for where Emails should be sent for transmission. This can be an IP address or a domain name. This is a global setting and applies to all alerts, not just to the alert being defined here. The default port for the SMTP server is 25. To override this default port, Sentry II 8.0 User’s Guide p. 111 Version 8.0.12 July 2006 append a colon character followed by the override port number. For example, to use port 26 versus the default port 25, "192.168.1.100:26" or "mail:26". • Specify multiple SMTP server addresses, separated by a semi-colon, as alternates. The first SMTP server address specified is treated as the primary, and all Email alerts will be sent to this server first. If sending an Email is unsuccessful, then the second SMTP server address specified is tried as an alternate, and so on. • Specify your originating Email address. This field is optional as not all SMTP servers require it. The format is: [email protected]. This is a global setting and applies to all alerts, not just to the alert being defined here. • Check the associated checkbox and specify your SMTP authentication Login and Password parameters. These fields are optional as not all SMTP servers require it. This is a global setting and applies to all alerts, not just to the alert being defined here. The Login and Password parameters are used for all of the SMTP servers defined. • Press the OK button, and the SMTP Server address you specify is checked as a valid SMTP server. Press the Cancel button to exit the dialogue box and leave the settings unchanged. . Test Email Button • Press this button to test your Email specifications. Using the information you have defined, a test Email is sent. Status messages will indicate whether there was correct information and the Email(s) were successfully sent to the SMTP Server. If everything is correct, you should receive the test Email(s) at the destination address(es). • You can view details of the Test Email in the Sentry II Server Log display. Program Run Program Checkbox Sentry II 8.0 User’s Guide p. 112 Version 8.0.12 July 2006 • Defines whether to run a program when an SNMP Trap, Event Log, IP or Win Services watch fails; the alert meets the conditions specified in the Counter View or File Check; or a User Alert is received. • When checked, and alert conditions have been met, the program, batch, or command file name specified in the Program Name field is executed either on the Sentry II Server, or the alerting server. See the At Field radio buttons below. • When unchecked, no action is taken to run programs. • In order to run the specified program at the Monitored computer or to Restart the Monitored computer, the Monitored computer must be a Windows NT or 2000 computer and it must have the Sentry II Agent running. At Field • Radio buttons provide the choice to run the specified program, batch, or command file, either at the Sentry II Server, at the Monitored computer, or to Restart the Monitored computer. The Run Program checkbox must be checked. Also Run Program On a 'Restore' Notification • When checked and if the alert notification is due to a service up or a ’Notify On Restore’ option, then the program is executed. It is up to the user to insure that the executed program takes the appropriate action for a failure or for a restore. Also, the Run Program checkbox must be checked. Program Name Field • Defines the name of a program, batch, or command file to be run when a Sentry II watch fails; the alert meets the conditions specified in the Counter View; or a User Alert is received. The Run Program checkbox must be checked. Sentry II 8.0 User’s Guide p. 113 Version 8.0.12 July 2006 • NOTE. See the Frequently Asked Questions section earlier in this manual for an example of using the ‘Program’ action to use ‘Net send’ to send an alert notification to a workstation. Program Args Field • Defines an 'Argument' string passed to the program, batch, or command file named in the Program Name field when executed. The 'Argument' string text supports "macro substitution" based on six different macro parameters. The parameters are case sensitive and must be upper case. These parameters are: &D for Date, &T for Time, &N for Name of the server/device causing the alert condition, &G for the Name of the Group that the server/device belongs, &A for IP Address of the server/device causing the alert condition, &W for the Watch/Alert ‘Name’ responsible for the alert, &R for the Watch/Alert ‘Description’ text, &L for the Watch/Alert ‘Severity’ level, &S for Status message or code associated with the alert, &O for the Server/Device Notes, &E for the Watch/Alert Notes, &V for the CounterWatch value that exceeded a threshold in this type alert. Test Program Button • Press this button to test your Program specifications including macro substitution on the Program Args. If run program on the “Monitored server/device” or “Restart monitored server/device” is selected, the test only process the Program Args macros, if any, and returns a message. Sentry II 8.0 User’s Guide p. 114 Version 8.0.12 July 2006 Pager/PCS Alpha Pager/PCS Checkbox • Defines whether to dial an Alpha Pager or PCS Phone when an SNMP Trap, Event Log, IP or Win Services watch fails or the alert meets the conditions specified in the Counter View or File Check; or a User Alert is received. • When checked, and alert conditions have been met, the Alpha Pager/PCS Phone is dialed and the specified alphanumeric text is sent. • When unchecked, no action is taken. Access Number Field • Defines the Access Number of the Alpha Pager/PCS service provider. Usually this is an '800' or '888' toll free number. • Define multiple Access Numbers, separated by a semi-colon, to send the Page to more than one. PIN/Pager Number Field • Defines the PIN number for your Alpha Pager or the number for your PCS Phone. Sentry II supplies this number after connecting to the Alpha Pager/PCS service provider. • Multiple PIN/Pager Numbers supported, to call multiple Pagers, if PIN/Pager Numbers separated by a semi-colon. A single Access Number above can be combined with multiple PIN/Pager numbers, in which case, the same Access Number is called for each PIN/Pager number. Sentry II 8.0 User’s Guide p. 115 Version 8.0.12 July 2006 Password Field • This is an optional password field that is supplied if required by the Alpha Pager service provider. A password is usually not required in the USA. Text-To-Send Field • Defines the alphanumeric text that you want sent to your Alpha Pager or PCS Phone. There is a maximum of 220 characters. The Text-To-Send field supports "macro substitution" based on six different macro parameters. The parameters are case sensitive and must be upper case. These parameters are: &D for Date, &T for Time, &N for Name of the server/device causing the alert condition, &G for the Name of the Group that the server/device belongs, &A for IP Address of the server/device causing the alert condition, &W for the Watch/Alert ‘Name’ responsible for the alert, &R for the Watch/Alert ‘Description’ text, &L for the Watch/Alert ‘Severity’ level, &S for Status message or code associated with the alert, &O for the Server/Device Notes, &E for the Watch/Alert Notes, &V for the CounterWatch value that exceeded a threshold in this type alert. Global Pager Port Field • Defines the port on the Sentry II Server computer where the modem is attached, which is used for dialing out to the Alpha. By default, the general TAPI device is chosen. If necessary, you can specify a specific TAPI device or COM port from the drop-down select box. This is a global setting and applies to all alerts, not just to the alert being defined here. Test Pager Button • Press this button to test your Alpha Pager/PCS specifications. Using the information you have defined, a test call is made and the alphanumeric text is sent. Status messages will indicate whether there was correct information and the dial-out was successful. If everything is correct, you should receive the alphanumeric text on your specified Alpha Pager or PCS Phone. Beeper Beeper Checkbox • Defines whether to dial a Beeper when an SNMP Trap, Event Log, IP or Win Services watch fails or the alert meets the conditions specified in the Counter View or File Check; or a User Alert is received. Sentry II 8.0 User’s Guide p. 116 Version 8.0.12 July 2006 • When checked and alert conditions have been met, the Beeper is dialed and the specified numeric text is sent. • When unchecked, no action is taken. Beeper Number Field • Defines the phone number for your Beeper. Numeric Text-To-Send Field • Defines the numeric text that you want sent to your Beeper. There is a maximum of 64 characters. Global Beeper Delay Field • Defines the delay, in seconds that Sentry II waits after dialing your beeper number before sending the numeric text data specified. This is a global setting and applies to all alerts, not just to the alert being defined here. • Also verify that the Global Pager/Beeper Port field, located on the previous setup screen for the Alpha Pager/PCS, is set correctly. Test Beeper Button • Press this button to test your Beeper specifications. Using the information you have defined, a test call is made and the numeric text is sent. Status messages will indicate whether there was correct information and the dial-out was successful. If everything is correct, you should receive the numeric text on your specified Beeper. Sentry II 8.0 User’s Guide p. 117 Version 8.0.12 July 2006 SNMPTrap SNMP Trap Notification Checkbox • Defines whether to run a program when an SNMP Trap, Event Log, IP or Win Services watch fails; the alert meets the conditions specified in the Counter View or File Check; or a User Alert is received. Trap Target Address Field • Defines the IP address or machine name where the SNMP Trap alert notification is sent. Enterprise OID Field • Defines the Enterprise OID for this originating Trap, and is used to form the Trap OID. Specific Trap Number Field • Defines the specific Trap number for this Trap alert notification • This is combined with the Enterprise OID to form the complete Trap OID. Community Field • Defines the Community name parameter which the Trap receiver may check before accepting the Trap. Test Program Button • Press this button to test your SNMP Trap Specification specifications. A SNMP Trap is sent using the specified parameters. Sentry II 8.0 User’s Guide p. 118 Version 8.0.12 July 2006 SYSLOG Syslog Notification Checkbox • Defines whether to run a program when an SNMP Trap, Event Log, IP or Win Services watch fails; the alert meets the conditions specified in the Counter View or File Check; or a User Alert is received. Syslog Server Address Field • Defines the IP address or machine name where the SYSLOG alert notification is sent. Syslog Facility Field • Defines the so-called Facility that defines where the Syslog message is originating. • Used in conjunction with the Severity to form the Syslog Message Priority code Syslog Severity Field • Defines the so-called Severity that defines where the severity level of the Syslog message. • Used in conjunction with the Facility to form the Syslog Message Priority code Test Syslog Button • Press this button to test your Syslog specifications. A Syslog message is sent using the specified parameters. Sentry II 8.0 User’s Guide p. 119 Version 8.0.12 July 2006 Buttons New Button • When in Review mode, press the New button to enter the Edit and Update Mode and add a new watch or alert to the Sentry II database. • A Specify New Watch/Alert Type dialogue box pop-up is displayed. Choose the type of watch/alert you are defining: ServerWatch, CounterWatch for Windows Counters, EventLogWatch, ProcessWatch for Windows Processes, WinServicesWatch, CustomWatch with a Windows Executable, FileWatch, CounterWatch for SNMP Counters, SNMPWatch for SNMP Traps, or SYSLOGWatch. • Define the associated parameters for the watch/alert type selected. Then select the Schedule and Action views, define appropriate parameters and then press the Save button to save and return to Review Mode. Edit Button • When in Review Mode, press the Edit button to enter the Edit and Update Mode. In this mode you can modify an existing watch or alert in the Sentry II database. Change the watch or alert parameters in the various fields on the SNMP Trap, Event Log, CUSTOM, SERVICE, PROCESS, FILE or IP Services, Counter or User, Schedule, and Action views, and then press the Save button to save and return to Review Mode. Duplicate Button • Starts the processing of a New watch/ alert entry by starting with all the parameters of the selected watch/ alert being duplicated. You have to specify the servers/devices for this new Watch/Alert. • Press the Save to complete the New processing. Sentry II 8.0 User’s Guide p. 120 Version 8.0.12 July 2006 Delete Button • When in Review Mode, press the Delete button to remove a watch or alert from the Sentry II database. You are prompted to confirm the delete. Save Button • When in the Edit and Update Mode, press the Save button to save new or edited parameters for a watch or alert. You will then be returned to Review Mode. Cancel Button • When in the Edit and Update Mode, press the Cancel button to abandon any new or edited parameters and return to Review Mode. User Alerts The User Alert provides a means for your own program or batch file to notify personnel of an alert condition. Each computer that wishes to use this facility must be running the Sentry II Agent component. A utility program called Sentry IIAlert.exe is installed with each Agent component automatically. This program communicates with this Agent whereby the alert notification is then sent to the Sentry II Server. The Sentry IIAlert.exe requires an input argument that is the name of the User Alert defined by you here in Configure Watches/Alerts. For example, define a User Alert with the name “My Special User Alert”, and specify the particular actions you want to occur when this alert is triggered. Then, on one or more of your Microsoft OS based computers, running the Sentry II Agent, program your application to invoke Sentry IIAlert.exe and passing the argument of “My Special User Alert” when a condition occurs that requires alert notification. C:\windows\system32\Sentry IIAlert.exe “My Special User Alert” Sentry IIAlert.exe accepts an optional second argument, which is passed as part of the Email body text if one of the alert actions includes sending an Email. Sentry II 8.0 User’s Guide p. 121 Version 8.0.12 July 2006 Cycle Multiple Displays Use the Cycle Multiple Displays feature when screen space for displays is at a premium and you want to view multiple displays. You can control which of the Sentry II Displays are shown during each cycle, and how long the cycle pauses on each shown Display. Refer to the specific section on each of the available Displays for the details of how that particular Display functions. Cycle Display Properties Button • Press this button to pop-up the Cycle Display Properties dialogue screen, and here you can select which Displays to show and what the Display Pause is on each. Pause/Resume Cycle Button • Press this button to Pause the Cycle on the currently shown Display. The Pause button changes to a Resume button. • Press the Resume button to restart the Cycle. Sentry II 8.0 User’s Guide p. 122 Version 8.0.12 July 2006 Network Status Display Use the Network Status Display to display the status of your server & network devices, and by extension the Groups that they are members of. On the Groups View, an icon is displayed for each Group representing the combined status of all the servers & devices that make up the Group. If all servers and devices are 'Normal', then the Group icon is 'Normal' Green. If any server or device in the Group has a critical alert outstanding for the Status Interval, which defaults to the previous 2 hours, then the Group icon is 'Critical' Red. Otherwise, if any server or device in the Group has a caution alert outstanding for the status interval, and there are no critical alerts outstanding, then the Group icon is 'Caution' Yellow. You can expand the Group to view the individual status of the servers and devices in the Group. The servers and devices are displayed on the Devices View. On the Devices View you can 'drilldown' to see the outstanding alerts for the Status Interval, by clicking the server or device status icon. This displays the Device Alert Details. On the Device Alert Details Display, you can flag via checkbox and 'Acknowledge' one or more of the outstanding alerts, and the status display is then automatically updated appropriately. Outstanding alerts older than the Status Interval are expired and the status display is updated appropriately. ServerWatch alerts with the 'Server Up' alert, and CounterWatch alerts with the 'Return to Normal' option, will cancel their corresponding alert and the display is then automatically updated appropriately. When you exit the Network Status Display, the current view choice is saved and restored on the next display. This is saved in the local registry and only applies to the Sentry II console on the particular machine. Sentry II 8.0 User’s Guide p. 123 Version 8.0.12 July 2006 Groups View On the Groups View, an icon is displayed for each Group representing the combined status of all the servers & devices that make up the Group. If all servers and devices are 'Normal', then the Group icon is 'Normal' Green. If any server or device in the Group has a critical alert outstanding for the Status Interval, which defaults to the previous 2 hours, than the Group icon is 'Critical' Red. Otherwise, if any server or device in the Group has a caution alert outstanding for the Status Interval, and there are no critical alerts outstanding, then the Group icon is 'Caution' Yellow. Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Audio Alert Checkbox • Enables playing of a WAV file when any status in either the Groups or Devices views changes. • Uses the Windows 'Asterisk' assignment. Refer to "Control Panel->Sounds and Multimedia Properties" for changing the 'Asterisk' WAV assignment. Expand All Button • Press this button to expand all the Groups and show the status of their servers and devices in the Devices View. • Clicking the plus icon next to the Group’s status icon can expand the individual Group. Collapse All Button • Press this button to contract all the Groups and hide the status of their servers and devices in the Devices View. • Clicking the minus icon next to the Group’s status icon can contract the individual Group. Devices View On the Devices View, the status of servers and devices of any expanded Group in the Groups View is displayed. If there are no outstanding alerts in the Status Interval, then the status icon for the server/device is 'Normal' Green. If there is at least one critical alert outstanding for the Status Interval, then the status icon for the server/device is 'Critical' Red. Otherwise, if there is at least one caution alert outstanding for the Status Interval, and there are no critical alerts outstanding, then the server/device icon is 'Caution' Yellow. To view all the current alerts outstanding in the Status Interval, click the status icon for the server/device. This will display the Device Alert Details dialogue box (see below). Status Interval n Hours Selection • Select the number of hours between 1 and 120 (5 days) to define the 'window' of alerts that will affect the status display. • Alerts older than the Status Interval are 'expired' and the status display is updated appropriately. Sentry II 8.0 User’s Guide p. 124 Version 8.0.12 July 2006 • The selected value is saved globally on the Sentry II server and affects going forward all Network Status Displays. Wide Names Checkbox • Optional setting which allocates more space per server/device on the display to handle situations where long names are used for servers/devices. Large Icons Checkbox • Optional setting which displays large icons for the status.. Show Faults at Top Checkbox • Optional setting that positions entries in a fault state at the top of the display in severity order with sort by name in each severity level. Sentry II 8.0 User’s Guide p. 125 Version 8.0.12 July 2006 Device Alert Details Dialogue Box The Device Alert Details dialogue box pops-up when you click the status icon of a server/device on the Devices View tab. This view displays the list of all outstanding, and unacknowledged, caution and critical alerts for the Status Interval. The details of each alert displayed are dependent on the type of alert. Acknowledge Button • Press this button to 'Acknowledge' the selected alerts listed. • 'Acknowledge' of an alert implies you have reviewed and 'actioned' the alert, and it is removed from the list of outstanding alerts for the Status Interval, and the server/device status icon is updated as appropriate. Sentry II 8.0 User’s Guide p. 126 Version 8.0.12 July 2006 • Button is disabled if the user has ‘View Only’ rights. Select All / Unselect All Buttons • Press either of these buttons to select or unselect all the listed alerts to be acknowledged. • Buttons are disabled if the user has ‘View Only’ rights. Close Button • Press this button to close the Device Alert Details dialogue box and return to the Devices View. Print Button • Press this button to print the Device Alert Details display. Sentry II 8.0 User’s Guide p. 127 Version 8.0.12 July 2006 ServerWatch Display Use ServerWatch Display to display the current status of those server IP Services (SNMP, HTTP, SMTP, POP3, FTP, DNS, SQL, ORACLE, TELNET, L_NOTES, PING, and USER) that you are watching. You define those server IP Services to be watched in Configure Watches/Alerts. By default, the status of all active server IP Services being watched is displayed. Select the Configure Filter (see below), to limit the display to only those active server services you are interested in seeing displayed. Server Status Log View The Server Status Log view is the default view. In this view, the most recent status for those server IP Services are displayed that you have specified See Configure Filter below). Press the "Expand" icon to toggle the hide and show of the Menu and Banner panes to increase or decrease the server status log display area. Sentry II 8.0 User’s Guide p. 128 Version 8.0.12 July 2006 Server/Device Name Field • Displays the name of the specific server/computer whose status is displayed. • Hover with the mouse to see a detailed description of the server/computer, and the Alert Group where it is assigned, displayed. • Click the Server/Computer Name column header to sort the display entries by server/computer name. IP Address Field • Displays the IP address of the specific server computer whose status is displayed. • Click the IP Address column header to sort the display entries by IP address. Type Field • Displays the specific IP Service type (PING, HTTP, SMTP, POP, FTP, DNS, SQL, ORACLE, TELNET, L_NOTES, SNMP, and USER) for this server. • Click the Type column header to sort the display entries by service type. Last Field • Displays the time of the most recent status check. • Click the Last column header to sort the display entries by time. • Hover with the mouse to see the complete text of the last response message received for this service. %Up Field • Displays the percentage of uptime dynamically computed based on the total number of ServerWatch checks that were successful divided by the overall total number of ServerWatch checks made. • Hover with the mouse to see a display of the number of up checks and down checks used in the calculation. • Click the %Up column header to sort the display entries by percentage of uptime. Response Time Field • Graphic display of the last response time for this service; green bar indicates service is available and the time of the last response up to a running average; orange bar indicates that part of the last response time greater than the running average; and a red bar indicates the service response failed on the last check. • Hover with the mouse to see a display of the last response time in milliseconds and percentage of the Response Time Scale; the running average response time in milliseconds; and the maximum response time in milliseconds. Sentry II 8.0 User’s Guide p. 129 Version 8.0.12 July 2006 • Click the Response Time column header to view a pop-up to set the Response Time Scale; the default Response Time Scale is 500 milliseconds. Failures At Top Checkbox • When checked, any failed or down server/IP service is displayed at the top of the display in the current sort order. Track Last Checkbox • Enables the highlight of the last line entry updated. Clear Log Button • Press this button to clear the Server Status Log display. • This does not affect the data in the Sentry II Server database. Configure Filter Button • Press this button to enable the Specify Status Log Display Filter (See below) pop-up dialogue box. Print Button • Press this button to print the Server Status Log display. Specify Status Log Display Filter Dialogue Box The Specify Status Log Display Filter dialogue box is enabled when the Configure Filter button is pressed. This dialogue box displays the tree of all services and their associated computers that are currently being watched as previously defined in Configure Watches/Alerts. From this tree of server computers, choose the ones you want to display in the Server Status Log. Service : Server/Computer Tree • All the available IP Services are displayed as nodes in the tree. • Press the + image to expand the service and see its list of associated computers that are being watched; press the - image to contract. • Click the checkbox to check or uncheck the computer for display in the Server Status Log; eligibility for display takes effect as soon as the check/uncheck is made. • When checked and eligible for display in the Server Status Log, the computer icon image is replaced with the status watch image . • Hover with the mouse over the computer icon or watch icon to display the computer description and the Alert Group name where this service watch/alert is defined. • Computer names displayed in red text are currently suspended (See Configure Watches/Alerts) and are not currently being watch. Sentry II 8.0 User’s Guide p. 130 Version 8.0.12 July 2006 Select All / Unselect All Buttons • Press either of these buttons to select or unselect all the computers in the expanded IP Services. Close Button • Press either of these buttons to select or unselect all the computers in the expanded IP Services. Sentry II 8.0 User’s Guide p. 131 Version 8.0.12 July 2006 AlertWatch Display Use AlertWatch Display to display Sentry II alert events for alerts that you have previously defined (See Configure Watches/Alerts). These can be SNMP Trap alerts, Event Log alerts, SYSLOG alerts, Win Services alerts, Windows & SNMP Counter alerts, IP Services alerts, FileWatch alerts, or User alerts. By default, all alert events are displayed. Use Configure Filter and then only those alert events are displayed that have been specified in the Alert Log Filter (See Configure Filter below). Alert Log View The Alert Log view is the default view. In this view, all alert events are displayed that match alerts you have specified in the Alert Log Filter using the Configure Filter. Press the "Expand" icon to toggle the hide and show of the Menu and Banner panes to increase or decrease the event log display area. Server/Device Name Field • Displays the specific server/device for which the alert event occurred. • When you hover with the mouse over the server/device name, a detailed description of the server/device, and the Alert Group where it is assigned, is displayed. Audio Alert Checkbox Sentry II 8.0 User’s Guide p. 132 Version 8.0.12 July 2006 • Enables playing of a WAV file when a new alert is written to the display. • Uses the Windows 'Asterisk' assignment. Refer to "Control Panel->Sounds and Multimedia Properties" for changing the 'Asterisk' WAV assignment. Alert Type Field • Displays the specific SNMP Trap OID, Event Log name & type, IP Service type (PING, HTTP, etc), Win Service name, SYSLOG Tag field, File Check name, Counter name, or "User", of the alert event which occurred. • When you hover with the mouse over the counter name, a detailed description of the counter, and the Object to which it belongs, is displayed. In addition, if the counter name does not fully fit in the width of the field, the full counter name is displayed, along with the description and Object name. Date/Time Stamp Field • Displays the date and time when the alert event occurred. Status Field • Displays the status of the SNMP Trap, IP Service, Win Service, SYSLOG, File Check, Event ID of an Event Log, or value of the Counter, that triggered the alert event. Not applicable for a User alert. • When you hover with the mouse over the value for a Counter alert, the alert Threshold and Duration parameter values are displayed; when you hover over the status for an IP Service alert, the complete status message is displayed; when you hover over the status for a File Check alert, the file size, last modified date/time, and search string is displayed; when you hover over the ID for an Event Log alert, the Source, Category, and Event Description are displayed; when you hover over the status for a SNMP Trap, the Variable Bindings information, the originating server IP address, uptime, and the OID for the Trap are displayed; when you hover over the status for a SYSLOG alert, the Facility & Severity information and complete message text is displayed; and when you hover over the status for a Win Service alert, the complete status message is displayed. Action Taken Field • Displays the actions taken, if any are defined for the alert, as a result of the alert event. • Actions taken may be: No Actions Taken, or if some action was taken, Email Sent, Alpha Pager Called, Beeper Called, Service Restarted and/or Program Run or Computer Rebooted. All actions are dependent upon how the alert has been previously defined (See Configure Watches/Alerts). • When you hover with the mouse over the action, if it is Email Sent, the Email Address to whom the Email was sent, and the Email Subject line are displayed; if it is Alpha Pager Called, the Pager Number and Pager Text are displayed; if it is Beeper Called, the Beeper Number and Beeper Text are displayed; and/or, if it is Program Run the Program Name of the program run and whether it was run at the Sentry II Server or at the Monitored Computer, is displayed. Sentry II 8.0 User’s Guide p. 133 Version 8.0.12 July 2006 View Filter Button • Press this button to enable the Alert Log Filter view below the Alert Log view. • Only those events for alerts defined in the Configure Filter (See below) and displayed in the Alert Log Filter are displayed in the Alert Log. • If no entries are defined in the filter, then all alert events are displayed in the Alert Log. Configure Filter Button • Press this button to enable the Configure Alert Log Filter pop-up dialogue box. • Only those events for alerts defined in the Configure Alert Log Filter (See below) and displayed in the Alert Log Filter are displayed in the Alert Log. • If no entries are defined in the filter, then all alert events are displayed in the Alert Log. Clear Log Button • Press this button to clear the Alert Log display. • This does not affect the alert event data in the Sentry II Server database. Print Button • Press this button to print the Alert Log display. Alert Log Filter View The Alert Log Filter view is enabled when the View Filter button is pressed. This view displays the parameters for alerts that have been defined (See Configure Alert Log Filter View below) as eligible for display in the Alert Log. Alert Group Name Field • Displays the name of the Alert as defined in Configure Watches/Alerts that is eligible for display in the Alert Log. • When you hover with the mouse over the alert group name, the description for it is displayed. Alert Type Field • Displays the Alert Type, EventLog, SNMPTrap, IP Service, Win Service, Process, File Check, Counter, or User plus the specific Event Log name, IP Service type (PING, HTTP, etc), Win Service name, Counter name, or "User", for the alert events to be displayed in the Alert Log. • When you hover with the mouse over the counter name, a detailed description of the counter, and the Object to which it belongs, is displayed. In addition, if the counter name does not fully fit in the width of the field, the full counter name is displayed, along with the description and Object name. Sentry II 8.0 User’s Guide p. 134 Version 8.0.12 July 2006 Delete Entry Button • Select an alert entry in the Alert Log Filter by clicking with the mouse anywhere on the entry line. • Press this button to remove the selected alert entry from the Alert Log Filter and stop displaying any more corresponding events for this alert in the Alert Log. Collapse Button • Press this button to close the Alert Log Filter view. • Press the View Filter button (See above) to reopen the Alert Log Filter view. Configure Alert Log Filter Dialogue Box The Configure Alert Log Filter dialogue box pops-up when the Configure Filter button is pressed. This view displays the list of all possible alerts previously defined (See Configure Watches/Alerts) and their associated parameters. From this comprehensive list of alerts, in the Alert Group Name drop-down list, choose the alerts you want to display in the Alert Log. By default, all alerts are displayed until you configure the filter. Once the filter is configured, then only those alerts are displayed. Alert Group Name List Field • The names of all possible Alerts as defined in Configure Watches/Alerts are displayed in this drop-down list. Selection(s) Field • Displays the Group, if Event Log, Service, or the Counter and its associated Object, and the specific server/devices defined (See Configure Watches/Alerts) for this alert. If this alert is a User alert, just a single checkbox labeled "User Alert" is displayed. • For SNMP Trap, Event Log, IP Service, File Check, Win Service or Counter alerts, you can choose to include alert events for display for some or all of the specific computers for this alert. Click the checkbox preceding the computer name to check it (for inclusion) or uncheck it (for exclusion). • When you hover with the mouse over the computer icon, a description of the computer is displayed. • For a suspended IP Service alert, Win Service alert, File Check alert, SNMP Trap alert, or Event Log alert (See Configure Watches/Alerts for suspending an existing service watch / alert), the computer names are highlighted in red to indicate the watch / alert is currently suspended and no alerts are generated. Close Button • Press this button to close the Configure Alert Log Filter dialogue box. Sentry II 8.0 User’s Guide p. 135 Version 8.0.12 July 2006 • If there are servers/computers checked, they are added (or updated) to the Alert Log Filter and corresponding events for this alert in the Alert Log will be displayed. • Press the Configure Filter button (See above) to reopen the Configure Alert Log Filter dialogue box. Sentry II 8.0 User’s Guide p. 136 Version 8.0.12 July 2006 EventLogWatch Display Use EventLogWatch Display to display watched for EventLog Messages that you have previously defined (See Configure Watches/Alerts). Only those EventLog Messages are displayed that have been specified in the EventLogWatch Display Filter, or if nothing has been specified in the filter then all watched for EventLog Messages received are displayed (See Configure Filter below) EventLogWatch Display View The EventLogWatch Display view is the default view. In this view, all received EventLog Messages are displayed that match EventLog Message Watches you have specified in the EventLogWatch Display Filter using the Configure Filter. Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Log Field • Displays the specific Event Log type with Apl for Application Log, Sec for Security Log, Sys for System Log, Dir for Directory Service Log, Dns for DNS Server Log and Rep for File replication Service Log. Type Field • Displays the specific Event type icon with events, for Information type events, and for Error type events, for Warning type for Security Check type events. Server/Computer Name Field Sentry II 8.0 User’s Guide p. 137 Version 8.0.12 July 2006 • Displays the name of the specific server/workstation computer whose Event log entry is displayed. • Hover with the mouse to see a detailed description of the computer displayed. Source Field • Displays the Source for the event log entry displayed. Date/Time Field • Displays the date and time of the displayed event log entry. Time is in 24-hour, "military" time. Event ID Field • Displays the Event ID for the event log entry displayed. User Name Field • Displays the User Name for the event log entry displayed. Event Description Field • Displays the Event Description, which is a detailed text description for the event log entry displayed. Alert Audio Checkbox • Enables playing of a WAV file when an EventLog Message event is written to the display. • Uses the Windows 'Asterisk' assignment. Refer to "Control Panel->Sounds and Multimedia Properties" for changing the 'Asterisk' WAV assignment. View Filter Button • Press this button to enable the EventLogWatch Display Filter view below the EventLogWatch Display view. • Only those events for alerts defined in the Configure Filter (See below) and displayed in the EventLogWatch Display Filter are displayed in the EventLogWatch Display. • If no entries are defined in the filter, then all received, watched for EventLog Message events are displayed in the EventLogWatch Display. Configure Filter Button • Press this button to enable the Configure EventLogWatch Display Filter pop-up dialogue box. • Only those events for alerts defined in the Configure EventLogWatch Display Filter (See below) and displayed in the EventLogWatch Display Filter are displayed in the EventLogWatch Display Log. Sentry II 8.0 User’s Guide p. 138 Version 8.0.12 July 2006 • If no entries are defined in the filter, then all received, watched for EventLog Message events are displayed in the EventLogWatch Display. Clear Log Button • Press this button to clear the EventLogWatch Display. • This does not affect the EventLog Message event data in the Sentry II Server database. Print Button • Press this button to print the EventLogWatch Display Log display. EventLogWatch Display Filter View The EventLogWatch Display Filter view is enabled when the View Filter button is pressed. This view displays the parameters for watched EventLog Messages that have been defined (See Configure EventLogWatch Display Filter View below) as eligible for display in the EventLogWatch Display. Watch/Alert Name Field • Displays the name of the Watch/Alert as defined in Configure Watches/Alerts that is eligible for display in the EventLogWatch Display. • When you hover with the mouse over the Watch/Alert name, the description for it is displayed. Watch/Alert Type Field • Displays the Alert Type of EventLog. Delete Entry Button • Select an alert entry in the EventLogWatch Display Filter by clicking with the mouse anywhere on the entry line. • Press this button to remove the selected alert entry from the EventLogWatch Display Filter and stop displaying any more corresponding events for this alert in the EventLogWatch Display. Collapse Button • Press this button to close the EventLogWatch Display Filter view. • Press the View Filter button (See above) to reopen the EventLogWatch Display Filter view. Configure EventLogWatch Display Filter Dialogue Box The Configure EventLogWatch Display Filter dialogue box pops-up when the Configure Filter button is pressed. This view displays the list of all possible EventLog Message Watch/Alerts Sentry II 8.0 User’s Guide p. 139 Version 8.0.12 July 2006 previously defined (See Configure Watches/Alerts) and their associated parameters. From this comprehensive list of Watches/Alerts, in the Watch/Alert Name drop-down list, choose the alerts you want to display in the EventLogWatch Display. Watch/Alert Name List Field • The names of all possible Watches/Alerts as defined in Configure Watches/Alerts are displayed in this drop-down list. Selection(s) Field • Displays the EventLog Message and its associated server/devices defined (See Configure Watches/Alerts) for this Watch/Alert. • You can choose to include EventLog Message events for display for some or all of the specific servers/devices for this Watch/Alert. Click the checkbox preceding the server/device name to check it (for inclusion) or uncheck it (for exclusion). • When you hover with the mouse over the server/device icon, a description of the server/device is displayed. • For a suspended EventLog Message Watch/Alert (See Configure Watches/Alerts for suspending an existing Watch/Alert), the server/device names are highlighted in red to indicate the Watch/Alert is currently suspended and no alerts are generated. Show On Open Last n Hours Selection • Select the number of hours between 0 and 24 to search and display previously received EventLog messages when first opening the EventLogWatch Display. • There is a limit on the number of the most recent messages displayed, computed as (N x 25) where ‘N’ is the number of hours specified. • The selected value is saved locally for the next open, and also executes immediately Select All / Unselect All Buttons • Press either of these buttons to select or unselect all the servers/devices in the expanded Selections(s) Field. Close Button • Press this button to close the Configure EventLogWatch Display Filter dialogue box. • If there are servers/devices checked, they are added (or updated) to the EventLogWatch Display Filter and corresponding events for this Watch/Alert in the EventLogWatch Display will be displayed. • Press the Configure Filter button (See above) to reopen the Configure EventLogWatch Display Filter dialogue box. Sentry II 8.0 User’s Guide p. 140 Version 8.0.12 July 2006 SYSLOGWatch Display Use SYSLOGWatch Display to display watched for SYSLOG Messages that you have previously defined (See Configure Watches/Alerts). Only those SYSLOG Messages are displayed that have been specified in the SYSLOGWatch Display Filter, or if nothing has been specified in the filter then all watched for SYSLOG Messages received are displayed (See Configure Filter below). SYSLOGWatch Display View The SYSLOGWatch Display view is the default view. In this view, all received SYSLOG Messages are displayed that match SYSLOG Message Watches you have specified in the SYSLOGWatch Display Filter using the Configure Filter. Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Server/Device Name Field • Displays the specific server/device from which the SYSLOG Message originated. • When you hover with the mouse over the server/device name, a detailed description of the server/device, and the Watch/Alert where it is assigned, is displayed. Tag Field • Displays the specific Tag from the received SYSLOG Message. Sentry II 8.0 User’s Guide p. 141 Version 8.0.12 July 2006 Date/Time Stamp Field • Displays the date and time when the SYSLOG Message was received. Facility/Severity Field • Displays the Facility and Severity information values from the received SYSLOG Message. Message Field • Displays the complete received SYSLOG Message text. Alert Audio Checkbox • Enables playing of a WAV file when a SYSLOG Message event is written to the display. • Uses the Windows 'Asterisk' assignment. Refer to "Control Panel->Sounds and Multimedia Properties" for changing the 'Asterisk' WAV assignment. View Filter Button • Press this button to enable the SYSLOGWatch Display Filter view below the SYSLOGWatch Display view. • Only those events for alerts defined in the Configure Filter (See below) and displayed in the SYSLOGWatch Display Filter are displayed in the SYSLOGWatch Display. • If no entries are defined in the filter, then all received, watched for SYSLOG Message events are displayed in the SYSLOGWatch Display. Configure Filter Button • Press this button to enable the Configure SYSLOGWatch Display Filter pop-up dialogue box. • Only those events for alerts defined in the Configure SYSLOGWatch Display Filter (See below) and displayed in the SYSLOGWatch Display Filter are displayed in the SYSLOGWatch Display Log. • If no entries are defined in the filter, then all received, watched for SYSLOG Message events are displayed in the SYSLOGWatch Display. Clear Log Button • Press this button to clear the SYSLOGWatch Display. • This does not affect the SYSLOG Message event data in the Sentry II Server database. Print Button • Press this button to print the SYSLOGWatch Display Log display. Sentry II 8.0 User’s Guide p. 142 Version 8.0.12 July 2006 SYSLOGWatch Display Filter View The SYSLOGWatch Display Filter view is enabled when the View Filter button is pressed. This view displays the parameters for watched SYSLOG Messages that have been defined (See Configure SYSLOGWatch Display Filter View below) as eligible for display in the SYSLOGWatch Display. Watch/Alert Name Field • Displays the name of the Watch/Alert as defined in Configure Watches/Alerts that is eligible for display in the SYSLOGWatch Display. • When you hover with the mouse over the Watch/Alert name, the description for it is displayed. Watch/Alert Type Field • Displays the Alert Type of SYSLOG. Delete Entry Button • Select an alert entry in the SYSLOGWatch Display Filter by clicking with the mouse anywhere on the entry line. • Press this button to remove the selected alert entry from the SYSLOGWatch Display Filter and stop displaying any more corresponding events for this alert in the SYSLOGWatch Display. Collapse Button • Press this button to close the SYSLOGWatch Display Filter view. • Press the View Filter button (See above) to reopen the SYSLOGWatch Display Filter view. Configure SYSLOGWatch Display Filter Dialogue Box The Configure SYSLOGWatch Display Filter dialogue box pops-up when the Configure Filter button is pressed. This view displays the list of all possible SYSLOG Message Watch/Alerts previously defined (See Configure Watches/Alerts) and their associated parameters. From this comprehensive list of Watches/Alerts, in the Watch/Alert Name drop-down list, choose the alerts you want to display in the SYSLOGWatch Display. Watch/Alert Name List Field • The names of all possible Watches/Alerts as defined in Configure Watches/Alerts are displayed in this drop-down list. Sentry II 8.0 User’s Guide p. 143 Version 8.0.12 July 2006 Selection(s) Field • Displays the SYSLOG Message and its associated server/devices defined (See Configure Watches/Alerts) for this Watch/Alert. • You can choose to include SYSLOG Message events for display for some or all of the specific servers/devices for this Watch/Alert. Click the checkbox preceding the server/device name to check it (for inclusion) or uncheck it (for exclusion). • When you hover with the mouse over the server/device icon, a description of the server/device is displayed. • For a suspended SYSLOG Message Watch/Alert (See Configure Watches/Alerts for suspending an existing Watch/Alert), the server/device names are highlighted in red to indicate the Watch/Alert is currently suspended and no alerts are generated. Show On Open Last n Hours Selection • Select the number of hours between 0 and 24 to search and display previously received SYSLOG messages when first opening the SYSLOGWatch Display. • There is a limit on the number of the most recent messages displayed, computed as (N x 25) where ‘N’ is the number of hours specified. • The selected value is saved locally for the next open, and also executes immediately Select All / Unselect All Buttons • Press either of these buttons to select or unselect all the servers/devices in the expanded Selections(s) Field. Close Button • Press this button to close the Configure SYSLOGWatch Display Filter dialogue box. • If there are servers/devices checked, they are added (or updated) to the SYSLOGWatch Display Filter and corresponding events for this Watch/Alert in the SYSLOGWatch Display will be displayed. • Press the Configure Filter button (See above) to reopen the Configure SYSLOGWatch Display Filter dialogue box. Sentry II 8.0 User’s Guide p. 144 Version 8.0.12 July 2006 SNMPTrapWatch Display Use SNMPTrapWatch Display to display watched for Traps that you have previously defined (See Configure Watches/Alerts). Only those Traps are displayed that have been specified in the SNMPTrapWatch Display Filter, or if nothing has been specified in the filter then all watched for Traps received are displayed (See Configure Filter below). SNMPTrapWatch Display View The SNMPTrapWatch Display view is the default view. In this view, all received Traps are displayed that match Trap Watches you have specified in the SNMPTrapWatch Display Filter using the Configure Filter. Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Server/Device Name Field • Displays the specific server/device for which the Trap originated. • When you hover with the mouse over the server/device name, a detailed description of the server/device, and the Watch/Alert where it is assigned, is displayed. Trap Type Field • Displays the specific Name and OID of the received Trap. Sentry II 8.0 User’s Guide p. 145 Version 8.0.12 July 2006 Date/Time Stamp Field • Displays the date and time when the Trap was received. Variable Bindings Field • Displays the received Variable Bindings information, if any that was received with the Trap. Alert Audio Checkbox • Enables playing of a WAV file when a Trap event is written to the display. • Uses the Windows 'Asterisk' assignment. Refer to "Control Panel->Sounds and Multimedia Properties" for changing the 'Asterisk' WAV assignment. View Filter Button • Press this button to enable the SNMPTrapWatch Display Filter view below the SNMPTrapWatch Display view. • Only those events for alerts defined in the Configure Filter (See below) and displayed in the SNMPTrapWatch Display Filter are displayed in the SNMPTrapWatch Display. • If no entries are defined in the filter, then all received, watched for Trap events are displayed in the SNMPTrapWatch Display. Configure Filter Button • Press this button to enable the Configure SNMPTrapWatch Display Filter pop-up dialogue box. • Only those events for alerts defined in the Configure SNMPTrapWatch Display Filter (See below) and displayed in the SNMPTrapWatch Display Filter are displayed in the SNMPTrapWatch Display Log. • If no entries are defined in the filter, then all received, watched for Trap events are displayed in the SNMPTrapWatch Display. Clear Log Button • Press this button to clear the SNMPTrapWatch Display. • This does not affect the Trap event data in the Sentry II Server database. Print Button • Press this button to print the SNMPTrapWatch Display Log display. Configure SNMPTrapWatch Display Filter View The SNMPTrapWatch Display Filter view is enabled when the View Filter button is pressed. This view displays the parameters for watched Traps that have been defined (See Configure Sentry II 8.0 User’s Guide p. 146 Version 8.0.12 July 2006 SNMPTrapWatch Display Filter View below) as eligible for display in the SNMPTrapWatch Display. Watch/Alert Name Field • Displays the name of the Watch/Alert as defined in Configure Watches/Alerts that is eligible for display in the SNMPTrapWatch Display. • When you hover with the mouse over the Watch/Alert name, the description for it is displayed. Watch/Alert Type Field • Displays the Alert Type of SNMPTrap. Delete Entry Button • Select an alert entry in the SNMPTrapWatch Display Filter by clicking with the mouse anywhere on the entry line. • Press this button to remove the selected alert entry from the SNMPTrapWatch Display Filter and stop displaying any more corresponding events for this alert in the SNMPTrapWatch Display. Collapse Button • Press this button to close the SNMPTrapWatch Display Filter view. • Press the View Filter button (See above) to reopen the SNMPTrapWatch Display Filter view. Configure SNMPTrapWatch Display Filter Dialogue The Configure SNMPTrapWatch Display Filter dialogue box pops-up when the Configure Filter button is pressed. This view displays the list of all possible Trap Watch/Alerts previously defined (See Configure Watches/Alerts) and their associated parameters. From this comprehensive list of Watches/Alerts, in the Watch/Alert Name drop-down list, choose the alerts you want to display in the SNMPTrapWatch Display. Watch/Alert Name List Field • The names of all possible Watches/Alerts as defined in Configure Watches/Alerts are displayed in this drop-down list. Sentry II 8.0 User’s Guide p. 147 Version 8.0.12 July 2006 Selection(s) Field • Displays the SNMP Trap and its associated server/devices defined (See Configure Watches/Alerts) for this Watch/Alert. • You can choose to include Trap events for display for some or all of the specific servers/devices for this Watch/Alert. Click the checkbox preceding the server/device name to check it (for inclusion) or uncheck it (for exclusion). • When you hover with the mouse over the server/device icon, a description of the server/device is displayed. • For a suspended SNMP Trap Watch/Alert (See Configure Watches/Alerts for suspending an existing Watch/Alert), the server/device names are highlighted in red to indicate the Watch/Alert is currently suspended and no alerts are generated. Show On Open Last n Hours Selection • Select the number of hours between 0 and 24 to search and display previously received SNMPTrap messages when first opening the SNMPTrapWatch Display. • There is a limit on the number of the most recent messages displayed, computed as (N x 25) where ‘N’ is the number of hours specified. • The selected value is saved locally for the next open, and also executes immediately Select All / Unselect All Buttons • Press either of these buttons to select or unselect all the servers/devices in the expanded Selections(s) Field. Close Button • Press this button to close the Configure SNMPTrapWatch Display Filter dialogue box. • If there are servers/devices checked, they are added (or updated) to the SNMPTrapWatch Display Filter and corresponding events for this Watch/Alert in the SNMPTrapWatch Display will be displayed. • Press the Configure Filter button (See above) to reopen the Configure SNMPTrapWatch Display Filter dialogue box. Sentry II 8.0 User’s Guide p. 148 Version 8.0.12 July 2006 System Monitor Use System Monitor to display the Agent status details of your servers & workstations that have the installed Sentry II Agent. You can expand the Group to view the individual System details of the servers and workstations in the Group. The servers and workstations are displayed on the Servers View. Once opened, the System Monitor display automatically refreshes every 5 minutes. When you exit the System Monitor display, the current view choice is saved and restored on the next display. This is saved in the local registry and only applies to the Sentry II console on the particular machine. Groups View Use the Groups View to control which servers/workstations are displayed in the Servers View. Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Expand All Button • Press this button to expand all the Groups and show the specified Registry values of all the servers and workstations in the Servers View. • Clicking the plus icon next to the Group’s status icon can expand individual Groups. Sentry II 8.0 User’s Guide p. 149 Version 8.0.12 July 2006 Collapse All Button • Press this button to contract all the Groups and hide the Registry value details of their servers and workstations in the Servers View. • Clicking the minus icon next to the Group’s status icon can contract individual Groups. Servers View On the Servers View, the specified Registry details of all the servers and workstations of any expanded Group in the Groups View are displayed. Print Button • Press this button to print the System Status Details display. Refresh Button • Press this button to refresh the System Status Details display. Sentry II 8.0 User’s Guide p. 150 Version 8.0.12 July 2006 Memory Monitor Use Memory Monitor to display the Memory utilization details of your servers & workstations that have the installed Sentry II Agent. On the Groups View, each Group is represented by an icon that includes the combined status of the Memory utilization of all the servers & workstations that make up the Group. If the 'Free Pages' on each of the servers and workstations in the Group is greater than 20 Percent, then the Group icon is 'Normal' Green. If the Free Pages available is less than 20 Percent but greater than 10 Percent on any server or workstation in the Group, then the Group icon is 'Caution' Yellow. Otherwise, if the Free Pages available is less than 10 Percent on any server or workstation in the Group, then the Group icon is 'Critical' Red. You can expand the Group to view the individual Memory details of the servers and workstations in the Group. The servers and workstations are displayed on the Servers View. Once opened, the Memory Monitor display automatically refreshes every 5 minutes. When you exit the Memory Monitor display, the current view choice is saved and restored on the next display. This is saved in the local registry and only applies to the Sentry II console on the particular machine. Groups View On the Groups View, each Group is represented by an icon that includes the combined status of the Memory utilization of all the servers & workstations that make up the Group. If the 'Free Pages' on each of the servers and workstations in the Group is greater than 20 Percent, then the Group icon is 'Normal' Green. If the Free Pages available is less than 20 Percent but greater than 10 Percent on any server or workstation in the Group, then the Group icon is 'Caution' Yellow. Otherwise, if the Free Pages available is less than 10 Percent on any server or workstation in the Group, then the Group icon is 'Critical' Red. Sentry II 8.0 User’s Guide p. 151 Version 8.0.12 July 2006 Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Expand All Button • Press this button to expand all the Groups and show the Memory details of all the servers and workstations in the Servers View. • Clicking the plus icon next to the Group’s status icon can expand individual Groups. Collapse All Button • Press this button to contract all the Groups and hide the Memory details of their servers and workstations in the Servers View. • Clicking the minus icon next to the Group’s status icon can contract individual Groups. Servers View On the Servers View, the Memory details of all the servers and workstations of any expanded Group in the Groups View are displayed. Print Button • Press this button to print the Memory Details display. Sentry II 8.0 User’s Guide p. 152 Version 8.0.12 July 2006 HDD Monitor Use HDD Monitor to display the status of the Logical Drives of your servers & workstations that have the installed Sentry II Agent. On the Groups View, each Group is represented by an icon representing the combined status of the Logical Drives of all the servers & workstations that make up the Group. If the 'Free Space' on all the Logical Drives of all servers and workstations in the Group is greater than 20 Percent, then the Group icon is 'Normal' Green. If any Logical Drive Free Space is less than 20 Percent but greater than 10 Percent, then the Group icon is 'Caution' Yellow. Otherwise, if any Logical Drive Free Space is less than 10 Percent, then the Group icon is 'Critical' Red. You can expand the Group to view the individual Logical Drive details of the servers and workstations in the Group. The servers and workstations are displayed on the Servers View. Once opened, the HDD Monitor display automatically refreshes every 5 minutes. When you exit the HDD Monitor display, the current view choice is saved and restored on the next display. This is saved in the local registry and only applies to the Sentry II console on the particular machine. Groups View On the Groups View, each Group is represented by an icon representing the combined status of the Logical Drives of all the servers & workstations that make up the Group. If the 'Free Space' on all the Logical Drives of all servers and workstations in the Group is greater than 20 Percent, then the Group icon is 'Normal' Green. If any Logical Drive Free Space is less than 20 Percent but greater than 10 Percent, then the Group icon is 'Caution' Yellow. Otherwise, if any Logical Drive Free Space is less than 10 Percent, then the Group icon is 'Critical' Red. Sentry II 8.0 User’s Guide p. 153 Version 8.0.12 July 2006 Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Expand All Button • Press this button to expand all the Groups and show the Logical Drive details of all the servers and workstations in the Servers View. • Clicking the plus icon next to the Group’s status icon can expand individual Groups. Collapse All Button • Press this button to contract all the Groups and hide the Logical Drive details of their servers and workstations in the Servers View. • Clicking the minus icon next to the Group’s status icon can contract individual Groups. Servers View On the Servers View, the Logical Drive details of all the servers and workstations of any expanded Group in the Groups View are displayed. Print Button • Press this button to print the Logical Drive Details display. Sentry II 8.0 User’s Guide p. 154 Version 8.0.12 July 2006 Registry Monitor Use Registry Monitor to display selected Registry values from your servers & workstations that have the installed Sentry II Agent. In conjunction with an optional setting in the “AGENT” ServerWatch type (see Configure Watches/Alerts), you can optionally enable the Registry checking of your selected Keys/Values and be alerted when Sentry II detects additions, changes, and/or deletions. You specify which Registry values you want to monitor via the ‘Manage’ function. You can expand the Group to view the specified Registry values of the servers and workstations in the Group. The servers and workstations are displayed on the Servers View. Once opened, the Registry Monitor display automatically refreshes every 5 minutes. Groups View Use the Groups View to control which servers/workstations are displayed in the Servers View. Press the "Expand" icon decrease the display area. to toggle the hide and show of the Menu and Banner panes to increase or Expand All Button • Press this button to expand all the Groups and show the specified Registry values of all the servers and workstations in the Servers View. • Clicking the plus icon next to the Group’s status icon can expand individual Groups. Collapse All Button • Press this button to contract all the Groups and hide the Registry value details of their servers and workstations in the Servers View. Sentry II 8.0 User’s Guide p. 155 Version 8.0.12 July 2006 • Clicking the minus icon next to the Group’s status icon can contract individual Groups. Servers View On the Servers View, the specified Registry details of all the servers and workstations of any expanded Group in the Groups View are displayed. Print Button • Press this button to print the Registry Details display. Manage Button • Press this button to open the Manage Registry Monitoring Specifications display. Manage Registry Monitoring Specifications Dialogue Box The Manage Registry Monitoring Specifications dialogue box is displayed when the Manage button is clicked. Here you specify the Registry values you want to monitor. You specify the Frequency in minutes to check the Registry value; you specify the Value Name and Registry Key to identify the specific Registry value to monitor; and you specify an optional Description to describe what the value represents. The settings are saved in the file called RegistryMonitor.txt found in the “…\Sentry II\Bin” folder. It is possible to edit this file directly with Notepad in order to change the set of Registry values you are monitoring. Sentry II 8.0 User’s Guide p. 156 Version 8.0.12 July 2006 Add Button • Press this button to add a new Registry value to monitor. • Click the OK button to save the new entry; new entries are displayed at the top; or click Cancel to abort the Add or Edit. • Sort entries by clicking the column header for Value Name or Registry Key to sort accordingly. Edit Button • Press this button to Edit the selected Registry value setting. Duplicate Button • Press this button to Duplicate the selected Registry value setting. And create a new setting; you have the opportunity to edit the setting. Delete Button • Press this button to Delete the selected Registry value setting. Save Button • Press this button to Save any of your Registry value setting changes. Sentry II 8.0 User’s Guide p. 157 Version 8.0.12 July 2006 Cancel Button • Press this button to skip saving any of your Registry value setting changes. Show Key Checkbox • Uncheck this checkbox and just display the subkey for the Registry values. Sentry II 8.0 User’s Guide p. 158 Version 8.0.12 July 2006 CounterWatch Graphs Use CounterWatch Graphs to create and view real-time and historical graphs of monitored Windows & SNMP CounterWatch counter data from the servers/workstation and devices on your network. There is an option to export the raw data on a graph to a CSV file that is easily viewed by Microsoft Excel. Windows CounterWatch Graphs requires the Sentry II Agent on Microsoft Windows 98/ME, NT/2000/XP computers being monitored. There is no Agent required for SNMP devices; rather Counter information is derived from your provided MIBs for the devices. Monitored Objects Tree View Refer to Manage CounterWatch Monitoring, on the Monitor menu tab, for Help on the Monitor Objects Tree View in the left pane, and for a description of servers/devices and their associated 'counters'. The Tree View provides you with a view of your network of servers/devices and their 'counters'. The counters are registered with the Sentry II Server database and available for monitoring and graphing. Press the 'Tree" icon to toggle between hiding and showing the Tree View in the left pane. Press the "Expand" icon to toggle the hide and show of the Menu and Banner panes. Creating and Configuring Charts New Chart • Press the New button to create a New Chart. The start date/time for any Counters added to the chart is the current date/time that the new Chart is created. Save and close it, then reopen it and specify an earlier start date/time if you want to see monitored data for the charted counters starting at an earlier date/time. Sentry II 8.0 User’s Guide p. 159 Version 8.0.12 July 2006 • Press the Wizard button to activate the Chart Wizard (See Chart Configure Wizard below) to configure the New Chart with Name, type of chart, and other properties. Use the Chart Wizard to cut and paste your chart, or save it as a file for importing into other programs. You can also print your chart from the Chart Wizard. Open Existing Chart • Press the Open button to choose a previously saved chart. You are prompted with a Chart to OPEN dialog box. Select the name of the chart to open and then press the "OK" button. • You are prompted for a Start Date/Time for the chart with the default being the current date/time. If you want to see the monitored data for the charted counters starting with an EARLIER date/time, specify it in the "Start Date/Time" prompt box. • You are also prompted for an End Date/Time for the chart with the default being the current date/time plus 1 day. If you want to see the charted data ending with a different date/time, specify it in the "End Date/Time" prompt box. • Press the Wizard button to activate the Chart Wizard (See Chart Configure Wizard below) to configure the Opened Chart with Name, type of chart, and other properties. Use the Chart Wizard to cut and paste your chart or save it as a file for importing into other programs. You can also print your chart from the Chart Wizard. Multiple Open Charts • Open or create new multiple charts simultaneously; the most recent opened or new chart has the 'full-view', whereas the previously opened charts are positioned in the reduced picturein-picture or 'PIP' view (See Selecting the Active Chart below). Add Counters to Chart • Click the counter name in the Tree View to select it to add to a chart. (You click the counter's associated checkbox to enable monitoring). • Use the standard Shift and Ctrl keys when clicking on the counter name to select more than one. • Selecting one or more counters enables the Add button. • Press the Add button to add the selected counter(s) to the chart. • Alternatively, drag and drop the selected counter(s) onto the chart. • Be cognizant of time differences for your different servers, locally, if the server clocks are not synchronized, and particularly for remote servers in different time zones. Monitored data is stored in the Sentry II database based on the local time of the server being monitored. You have to take this time into account when setting up your charts to monitor these counters. Allow for an appropriate start time and chart density (see below) to be sure to view monitored counters from servers in different time zones. Delete Counters from Chart Sentry II 8.0 User’s Guide p. 160 Version 8.0.12 July 2006 • • Press the Stop button to stop the chart if running, then click the mouse on the graph edge line on the chart (not on the Legend) to select it, and then press the Delete key to remove the counter from the chart. Graph edge line will change to black color or a broken line to indicate it is selected. Delete Existing Chart(s) • Press the Delete button (enabled when at least one chart is open) to delete a previously saved chart. You are prompted with a Select One or More Chart(s) to DELETE dialog box. Select the name of one or more charts to delete and then press the "OK" button. • Use the standard Shift and Ctrl keys when clicking on a chart name to select more than one. • You are prompted to confirm the delete. Close Chart • Press the Close button to close and save an open chart. Save Chart • Press the Save button to save the Chart parameters you have configured • This does not save the chart data since the data for the chart is already saved in the Sentry II database. See the Export function below for exporting and saving the raw chart data to a CSV file. • If Security is enabled (See Configure Security), you also have the option to assign ownership for the saved Chart. You can assign a Saved chart to either 'All' users, or to you, the current logged-on User. Charts assigned to you are not available to other Users. Charts assigned to 'All' are available to all Users. • If Security is enabled and the current logged-on User has Full Administration Rights (see Configure Security), then when saving a Chart, the User also has the option to assign ownership for the Chart to any available User. Export Chart • Press the Export button to export the raw chart data to a CSV file that is suitable for viewing by Microsoft Excel and can be processed by any application that can handle importing a comma-delimited file. Sentry II 8.0 User’s Guide p. 161 Version 8.0.12 July 2006 Chart Context Menu • Right-click on an open chart, either the 'full-view' chart or a 'PIP' chart (See Dynamic Chart Play below) to activate a context menu. • From the context menu, you can: o create a New chart, o Open an existing chart, o Save, Export or Close the clicked chart, o Delete the clicked chart, o Play, Reverse, or Stop the clicked chart, o invoke the Chart Configure Wizard o Fine Tune Properties for the clicked chart, o Export the chart data to a unique CSV file. Chart Configure Wizard Activated by pressing the Wizard button or selecting Wizard from the Chart Context Menu (See above). Use the Chart Wizard to configure every aspect of your chart. Chart Components Each chart is divided into independently configurable components. The components of the chart are Background, Title (top area of chart), Display (middle or main body area of chart), and Legend (bottom area of chart). This is configurable on the Misc Tab (See below). Selecting Chart Components Sentry II 8.0 User’s Guide p. 162 Version 8.0.12 July 2006 On each Chart Wizard tab (See below), select the component of the chart you want to configure from the Setting of drop down list, or press the shift key plus point to the component in the preview window and click. General Tab • Select the component of the chart you want to configure. • Specify the area rectangle size for each component in the Component Rect fields, and define the meaning of the values from the Measure drop down list; the default is Percent. • Specify the Border and Shadow type for each component's area rectangle. • For the Title_B component, specify the Chart Title. • For the Display_C component, specify parameters regarding chart type (there are over 43 types); orientation of the axis, and style of grid lines. • For the Legend_D component, specify parameters regarding legend style and key style. Fill Style Tab • Select the component of the chart you want to configure. • For each component, specify fill style and colors. Font Style Tab • Select the component of the chart you want to configure. • For each component, specify font type, size, color, style, and alignment. Misc Tab • Configure and position the chart components. Chart Preview Window • Select a component to configure in each of the property tabs above by pressing the shift key plus pointing to the component in the preview window, and then click. • Point and right-click on the preview window to display a context menu with options to Copy Chart to clipboard, Save Chart As Dib file or Save Chart As Jpeg file. Use any of these to 'export' the chart to other applications to include in reports or documents or to print the chart from within these applications. Dynamic Chart Play The "VCR"-type button controls, which are used to control the dynamic play of a chart, always apply to the active chart (See Selecting the Active Chart below). Available options are Export, Save, Play, Fast Forward (FF), Reverse (Rev), Fast Reverse (FR), and Stop. Selecting the Active Chart Sentry II 8.0 User’s Guide p. 163 Version 8.0.12 July 2006 • When you have more than one chart open, the red border indicates the active chart. • To change the active chart or to change which chart has the full view, use the buttons on the bottom right. • Press the Next button to make the top PIP chart the new active chart; the chart with the red border is the active chart and the "VCR" button controls apply to it. • Press the Swap button to change the active chart to the full view. • Alternatively, Click a blue-bordered chart to make it the new active chart. • Double Click a blue-bordered chart to make it the new active chart and swap it to the full view. • Point the mouse to a chart, and press the right mouse button to pop-up a context menu with similar functions as the control buttons below (See Chart Context Menu above). Full-View Chart Slider • Use the slider with the 'full-view' chart, to scroll forward and backward in time through the chart data. Click on the slider 'tab' to 'grab' it and slide it left (backward in time) or right (forward in time). • Click on the slider to the left of the 'tab' to move the chart backward, or to the right of the 'tab' to move the chart forward, one chart image at a time. Sentry II 8.0 User’s Guide p. 164 Version 8.0.12 July 2006 Plotted Point Information • Hover with the mouse over a plotted point on the graph to see a pop-up with information about it. • Information displayed is the Group Name, Computer Name, Object Name, Counter Name, Value, Average, and Date/Time for the plotted point. Fine Tune Chart Play Activated by pressing the Tune button or selecting Tune from the Chart Context Menu (See above). Use the Fine Tune Chart Play to configure the performance of the chart playback. General Tab • In Chart Density, specify the density of values displayed on the chart at one time. More density shows a larger time slice but plays more slowly and takes longer to initially load and scroll through. • Specify, in Server Polling Rate, the frequency with which the chart polls the Sentry II Server for new data to add to the chart when playback is at present time. • Specify, in Playback Speed, how fast the chart playback is at past time. • Specify, in Playback Acceleration, how fast the chart plays in the fast forward and fast reverse playback. • Be cognizant of time differences for your different servers, locally, if the server clocks are not synchronized, and particularly for remote servers in different time zones. Monitored data is stored in the Sentry II database based on the local time of the server being monitored. You have to take this time into account when setting up your charts to monitor these counters. Allow for an appropriate start time and chart density (see below) to be sure to view monitored counters from servers in different time zones. Sentry II 8.0 User’s Guide p. 165 Version 8.0.12 July 2006 Advanced Tab • Specify a fixed vertical axis (y-axis) scale; by default the scale varies based on the data currently being displayed. Sentry II 8.0 User’s Guide p. 166 Version 8.0.12 July 2006 Schedule CounterWatch Monitoring Use Schedule CounterWatch Monitoring to schedule the execution of Windows & SNMP CounterWatch reports you have previously defined using Sentry II templates (See Create CounterWatch Reports). In Schedule CounterWatch Monitoring mode, define the Start Date/Time and Duration parameters for the monitoring phase. After the monitoring phase has completed, run the Performance Wizard (See Run/Analyze & View Reports) to analyze results of the monitoring. Schedule View Select this tab for the Schedule view. In this view, select the report you want to execute, define the start date/time to begin monitoring, and define how long the monitoring should occur. Report Name Field • Drop-down list box displaying the names of all reports defined previously in Create CounterWatch Reports and available to be executed. Report Description Field • Description for the selected report. Report Details Button • Press this button to pop-up a display that shows the selected report parameters as defined previously in Create CounterWatch Reports. Sentry II 8.0 User’s Guide p. 167 Version 8.0.12 July 2006 • Collection Set Name and Collection Set Description are the name and description for the collection set template used as the basis for the selected report. • Server/Device Name and Group Name are the name of all the servers/devices and the Group to which each belongs and which the selected report will use for the monitoring phase. • Click the OK button to close the Report Details display. Start Date/Time Field • For the selected report, define when the report should begin the counter-monitoring phase for the specified computers. These are "point & click" fields. o Click the first field (Start Date) to view the current month calendar. "Point & click" to select a date from this month or click the right-arrow icon to scroll to the next month. Use the left- and right-arrow icons to scroll backward or forward to find the calendar month you want, and then click the date for the Start Date. o Click the second field (Start Time), to display the start time choices. Specify the time in hour and minute, AM or PM. Duration Field • Define how long the monitoring phase should last (this is a "point & click" field). o Click the Duration field to display the duration choices. You specify this value in minutes, hours, days, or weeks. Exclude Time Periods Button • Press this button to pop-up a dialogue where you can specify selected times-of-day periods and day-of-the-week where monitoring results will be ignored during the Report analysis phase associated with this report (See Run/Analyze & View Reports). Schedule Button • Once the Start Date/Time and Duration fields are defined, press this button to queue the report and schedule it to execute when the Start Date/Time becomes current. • Be cognizant of time differences for your different servers, locally, if the server clocks are not synchronized, and particularly for remote servers in different time-zones. The schedule Start Date/Time is based on the Sentry II Server's clock. However, once remote servers are told to begin monitoring by the Sentry II Server, monitored data is stored in the Sentry II database based on the local time of the server being monitored. You have to take this time into account when running the analysis reports. You also have to take this time into account when setting up your charts to monitor these counters. Allow for an appropriate start time and chart density (see below) to be sure to view monitored counters from servers in different time-zones. Status View Select this tab for the Status view. This view shows the status of all reports that have been previously scheduled. It includes: Sentry II 8.0 User’s Guide p. 168 Version 8.0.12 July 2006 Reports waiting to start the monitoring phase (Monitor Status Scheduled) Reports currently in the monitoring process (Monitor Status InProcess) Reports that have completed the monitoring phase (Monitor Status Completed) Reports that have completed the monitoring phase are ready to be analyzed by the Performance Wizard (See Run/Analyze & View Reports). To activate a report, point and click a report entry and enable the appropriate buttons, which will vary depending upon the report's status. Scheduled Monitor Status Field • Scheduled - reports that are currently waiting to start monitoring. Their Start Date/Time is in the future. • InProcess - reports that are in the process of monitoring. Their Start Date/Time has past and their End Date/Time is in the future. • Completed - reports that have completed monitoring. Their End Date/Time has past. Date/Time Fields • The Start Date/Time and End Date/Time define the period for which monitoring has or will occur for the counters and computers defined in the report (See Create CounterWatch Reports). Sentry II 8.0 User’s Guide p. 169 Version 8.0.12 July 2006 Remove Button • Use this button to remove a selected report entry from the waiting queue before it has started the monitoring phase (Monitor Status is Scheduled) or to remove it from the completed queue after it has completed the monitoring phase (Monitor Status is Completed). Once removed, the report is no longer accessible. Stop Now Button • Use this button to stop the monitoring process for a selected report that is currently in the monitoring phase (Monitor Status is InProcess). You can still analyze the monitoring data accumulated to date through the Performance Wizard (See Run/Analyze & View Reports). Edit Stop Button • Use this button to modify the monitoring phase end date/time for a selected report that is waiting to start the monitoring phase (Monitor Status is Scheduled), or for one that is currently in the monitoring phase (Monitor Status is InProcess). • A "point & click" calendar and hour/minute drop-downs are displayed to specify a new end date/time. Sentry II 8.0 User’s Guide p. 170 Version 8.0.12 July 2006 Manage CounterWatch Monitoring The Manage CounterWatch Monitoring feature lets you view the Windows & SNMP CounterWatch counters you have previously manually selected and are now currently actively monitoring. Also, optionally view your entire network of servers, workstations, and devices, and the associated "counters" registered with Sentry II that are available for monitoring. Monitoring these performance counters requires the Sentry II Agent be installed on each Windows NT/2000/XP server/workstation for Windows CounterWatch monitoring; no Agent is required for SNMP CounterWatch monitoring. Current Counters Monitored View The Current Counters Monitored View is the default view. All servers/devices, which have one or more counters manually selected for monitoring, are displayed. Each server/device is displayed along with the Group it is assigned and its operating system (See Monitor Objects Tree View below for details on manually selecting counters for monitoring). To see a pop-up description of the Server/Device or Group, hover over the name with the mouse. Press the 'Tree" icon to toggle between showing and hiding the Monitor Objects Tree View in the left pane. Press the "Expand" icon to toggle the hide and show of the Menu and Banner panes. Sentry II 8.0 User’s Guide p. 171 Version 8.0.12 July 2006 Expanding/Contracting Server/Device Line Display • The default display is with each Server/Device's active counter details hidden. Click anywhere on the server/device line display to expand it to see all the details of the associated counters that are currently active in monitoring. • The active Counters are displayed by name and with associated Object name. • To see a pop-up description of the Counter or associated Object, hover over the name with your mouse. Unselecting Active Counters • With the expanded detailed Counter view, you can unselect one or more Counters, and press the Apply button to set inactive and stop monitoring. • Press the Unselect All button, and press the Apply button, to unselect all the expanded, displayed Counters, and to set inactive and stop monitoring. Note that the Unselect All button does not affect the unexpanded, non-displayed Counters. Unselect All Button • Press the Unselect All button to unselect all the expanded, displayed Counters. Note that the Unselect All button does not affect the unexpanded, non-displayed Counters. Apply Button • Press the Apply button to set inactive and stop monitoring, all the unselected Counters. Refresh Button • Press the Refresh button to refresh the display with all the current Servers/Devices with active Counters. Sentry II 8.0 User’s Guide p. 172 Version 8.0.12 July 2006 Print Button • Press this button to print the Current Counters Being Monitored display. Properties Button • Press this button to show the Properties display where you can set the Global CounterWatch Sampling Rate for Windows and SNMP, separately. • Setting the Sample Rate is a Global setting and overwrites any individual server/workstation setting. Monitor Objects Tree View The Tree View is created and updated automatically whenever server/device are added to the Sentry II database, either manually or through Sentry II Agent's auto-registration (See Configure Servers/Agents & Devices). The Tree View organizes your Network, top down, from your Groups (See Configure Groups) to your Servers/Devices in the Groups (See Configure Servers/Agents & Devices), to the Hardware and Software resource "Objects" on the Servers/Devices, to the detailed performance "Counters" within each of the resource Objects. Counters, when monitored, provide rich detail for measuring and observing the performance and operation of your network of Windows servers, workstations and devices (See Create CounterWatch Reports, Schedule CounterWatch Monitoring, and Run/Analyze & View Reports; also see CounterWatch Graphs). Counters also provide the basis for defining alerts to signal real-time performance and operation situations that you want to be aware of (See Configure Watches/Alerts and Alert Watch Display). Expanding/Contracting the Tree • Expand items on the Tree by clicking the '+' icon; collapse items on the Tree by clicking the '-' icon. • Expand the Group to view its associated Servers/Devices. Sentry II 8.0 User’s Guide p. 173 Version 8.0.12 July 2006 • Expand any Computer in a Group to view the associated resource Objects. • Expand the Objects for any Server/Device to view the associated detailed Counters. Tree Operations • To see a pop-up description of any item (Group, Server/Device, Object, Counter), hover over any Tree item with the mouse. • To activate a Server/Device pop-up menu, right-click with your mouse over a Server/Device item; choose Properties to access the Monitor Schedule property sheet (See below). • To activate a Counter pop-up menu, right-click with your mouse over a Counter item; choose Summary to access the Value Summary for the Counter's monitored data in the database (See below). For SNMP Counters, the pop-up menu also contains a SNMP Get command and a SNMP Set command to query the Counter's value or to set the Counter, respectively. • For SNMP Table entries in the Tree, distinguished by the empty meter icon, the pop-up menu contains an Add Instance; choose Add Instance to query the device to determine the available 'Instances' where you can then select 'Instances' to add to the Tree for monitoring; the menu for these added 'Instances' contains a 'Delete Instance' to remove these Counters Manual Control of Counter Monitoring • To manually begin the monitoring process, click the checkbox to the left of a counter to set it according to its defined Monitor Schedule (see Computer Schedules Property Sheet, below). To stop the monitoring process, click the checkbox to remove the checked item. • Counter monitoring may also occur automatically due to a Scheduled Report (See Create CounterWatch Reports and Schedule CounterWatch Monitoring) or a defined Alert (See Configure Watches/Alerts). Server/Device Monitor Schedule Property Sheet Activate by right-click with the mouse over a Server/Device item. Monitor Schedule Tab • Choose the Monitor Schedule tab to specify the monitoring schedule for this server/device's counters when you have manually activated counter monitoring (See Tree Operations above). • Set the Schedule for Daily, Weekly, or Monthly monitoring. • Set the Beginning and Ending dates for which the schedule applies. Sentry II 8.0 User’s Guide p. 174 Version 8.0.12 July 2006 • Set the Starting at and Stopping at time for each day that monitoring occurs within the Daily, Weekly, or Monthly schedule. • Set the sampling rate of the counter to Repeat every "x" number of Seconds, Minutes, or Hours. Counter Value Summary Report Activate by right-click with the mouse over a Counter item. Value Summary Tab • The Value Summary tab displays: o the date and time of the first value in the database for the counter selected. o the date and time of the last value in the database for the counter selected. o the highest value in the database for the counter selected. o the lowest value in the database for the counter selected. o the average for all values in the database for the counter selected. Sentry II 8.0 User’s Guide p. 175 Version 8.0.12 July 2006 o the last value in the database for the counter selected. Sentry II 8.0 User’s Guide p. 176 Version 8.0.12 July 2006 Create CounterWatch Reports Sentry II provides built in CounterWatch report templates that specify the counters for monitoring and analyzing various aspects of NT / 2000/ XP / 2003 server/workstation system operation. For example, there are collection set templates for analyzing: General NT / 2000 / XP / 2003 Server and Workstation, NT Server As File Server, Microsoft Internet Information Server, and TCP/IP. In addition, you can create your own custom collection set templates for monitoring and reporting on those specific aspects of your Windows based servers and workstations, and SNMP network servers/devices that you are interested in analyzing. Use Create CounterWatch Reports to create reports that use one of the built in report collection set templates listed above, or with your custom created collection set templates, together with one or more of the servers and workstations in your network. Once you have created your reports, you can schedule them to execute so that the associated servers/workstations are appropriately monitored (See Schedule CounterWatch Monitoring). Then the monitored information can be subsequently analyzed to pinpoint problems and help you fine tune performance and operation (See Run/Analyze & View Reports). Review Mode In Review Mode, the default view, you can view the various reports to see which analysis collection set template is used and the computers to which the reports apply. In this view, you can add new reports, edit existing reports, or delete existing reports. Sentry II 8.0 User’s Guide p. 177 Version 8.0.12 July 2006 Report Name Field • Select from among the list of reports in the drop down list to view the parameters, Edit, or Delete an existing report (See Edit and Delete Buttons below), or enter the desired name when defining a New report. Description Field • An optional description for the report defined in the Report Name field. Collection Set Field • The name / description of the collection set template used for this report. Selections Field • The name / description of all the servers/computers that this report applies. New Button • Press the New button to create a new report. You are presented with the Edit and Update Mode view (See Edit and Update Mode below). Edit Button • Select an existing report from the Report Name drop down field, and then press the Edit button. You are presented with the Edit and Update Mode view (See Edit and Update Mode below). Delete Button • Select an existing report from the Report Name drop down field, and then press the Delete button to remove the report from your list of reports. You are prompted to confirm the delete. Custom Collection Sets Button • Press this button to manage your custom created report collection set templates. Create new collection set templates, edit existing custom collection set templates, or delete no longer wanted collection set templates. (See Custom Collection Sets below) Edit and Update Mode In Edit and Update Mode, you can modify the parameters for existing reports or define parameters for newly created reports. Report Name Field • The current name of the existing report (it can be modified), or the name for a newly created report. Description Field Sentry II 8.0 User’s Guide p. 178 Version 8.0.12 July 2006 • An optional description for the report defined in the Report Name field. Collection Set Field • The name and description of the collection set template used for this report. Choose one, by clicking on the drop-down, from among the list of built-in and custom collection set templates. Groups : Servers/Workstations Selections Field • By clicking the checkbox, select the servers/computers to which the new report will apply. Save Button • Press the Save button to save new or edited parameters for the report. • If Security is enabled (See Configure Security), you also have the option to assign ownership for the saved Report. You can assign a Saved Report to either 'All' users, or to you, the current logged-on User. Reports assigned to you are not available to other Users. Reports assigned to 'All' are available to all Users. • If Security is enabled and the current logged-on User has Full Administration Rights (see Configure Security), then when saving a Report, the User also has the option to assign ownership for the Report to any available User. • If a New report object is being saved, you are prompted as to whether you want to start the monitoring of the counters for the servers in the report object. Click OK to strat the monitoring. You mange monitoring report objects in Schedule CounterWatch Monitoring. Sentry II 8.0 User’s Guide p. 179 Version 8.0.12 July 2006 Cancel Button • Press the Cancel button to abandon any new or edited parameters and return to the Review Mode. Customizing Collection Sets In Customizing Collection Sets, you manage your custom created report collection set templates. Create new templates, edit existing custom templates, or delete no longer wanted templates. Collection Set Name Field • The current name of an existing collection set template, which can be edited or deleted, or the name for a newly created template. Description Field • An optional description for the collection set template defined in the Collection Set Name field. Counters Tab • In Review Mode, the default view, all the Objects, Counters, and Counter Descriptions for the selected Collection Set Template are displayed. • In Edit and Update Mode, a tree view of all the available Objects and associated Counters is displayed. If Editing an existing custom template, the Objects are expanded and appropriate Counters checked to reflect the current Object-Counter selections for the selected collection set template Sentry II 8.0 User’s Guide p. 180 Version 8.0.12 July 2006 • Click the "+" icon to expand an Object and view its associated Counters. Click the "-" icon to contract the Object. • Click the checkbox associated with a Counter to select it for the collection set. Only checked Counters are applied to the collection set. Parameters Tab In Review Mode, the default view, all the configurable parameters for the Counter selected in the Object-Counter drop-down, for the selected Collection Set, are displayed. • In Edit and Update Mode, all checked Counters in the Counters Tab tree view, are available for selection in the Object-Counter drop-down. Select a Counter from the Object-Counter drop-down to view its associated collection set parameters. These are: Sentry II 8.0 User’s Guide p. 181 Version 8.0.12 July 2006 • Section Header - Optional Report Section Header for the selected Counter. All Counters with the same Section Header are grouped together in the Report. If no Section Header is specified, the Counter is grouped in the 'General' section. • Annotation - Optional text that follows the Counter's Report data on a separate line. • Exclude Graph - Check this checkbox to exclude the Graph for the selected Counter in the Report output. By default, the Report output for every Counter is Minimum/Maximum/Average as text and a Graph of all the monitored data for the Counter over the Report interval. • Sample Rate - Rate at which Counter value is sampled during monitoring. Default value is 30 seconds. • Report Last Value Only - Check this checkbox to have the Report output display on the last monitored value for the selected Counter instead of the default information of Minimum/Maximum/Average. In addition, there is no Graph included. If the selected Counter is an SNMP counter than the Counter value is queried for its value during the Report generation. • Sample Rate - Rate at which Counter value is sampled during monitoring. Default value is 10 seconds. • Suggested Average Value - During the analysis of the Counter data accumulated during monitoring, this value is used as a base-line average for comparison and deriving some recommendations, which can be specified in the Comment parameters, described below. • Suggested Maximum Value - During the analysis of the Counter data accumulated during monitoring, this value is used as a base-line maximum for comparison and deriving some recommendations, which can be specified in the Comment parameters, described below. • Comment 0 - Report analysis comment if Counter value equals zero. • Comment 1 - Report analysis comment if Counter value is greater than zero and less than one-half the Suggested Average Value. • Comment 2 - Report analysis comment if Counter value is greater than one-half, and less than, the Suggested Average Value. • Comment 3 - Report analysis comment if Counter value equals the Suggested Average Value. • Comment 4 - Report analysis comment if Counter value is greater than the Suggested Average Value and less than the Suggested Maximum Value. • Comment 5 - Report analysis comment if Counter value equals to or greater than the Suggested Maximum Value. New Button Sentry II 8.0 User’s Guide p. 182 Version 8.0.12 July 2006 • Press the New button to create a new collection set. You are presented with the Collection set Edit and Update Mode view (See Counters Tab and Parameters Tab descriptions above). Edit Button • Select an existing collection set from the Collection set Name drop-down field, and then press the Edit button. You are presented with the Collection set Edit and Update Mode view (See Counters Tab and Parameters Tab descriptions above). • Built-in collection sets that come with Sentry II cannot be edited or deleted. If one of these collection sets is selected in the Collection set Name drop-down field, the Edit and Delete buttons are disabled. Delete Button • Select an existing collection set from the Collection set Name drop-down field, and then press the Delete button to remove the collection set from your list of available collection sets. You are prompted to confirm the delete. • Built-in collection sets that come with Sentry II cannot be edited or deleted. If one of these collection sets is selected in the Collection set Name drop-down field, the Edit and Delete buttons are disabled. Save Button • Press the Save button to save new or edited parameters for the collection set. Cancel Button • Press the Cancel button to abandon any new or edited parameters and return to the Collection set Review Mode. Close Button • Press the Close button to exit the Customize Collection set mode and return to the Report Review Mode. Sentry II 8.0 User’s Guide p. 183 Version 8.0.12 July 2006 Schedule Periodic Reports Use Schedule Periodic Reports to schedule the execution of selected CounterWatch, IP Service, and Alert Notifications reports on a repeat, periodic and fixed schedule, to analyze and generate a Report for any previous specified period. The report output, or a link to the HTML report output, can be optionally Emailed to one or more recipients. Previously Scheduled Reports can be managed by subsequently editing their schedule parameters, or by deleting and removing them from the schedule report queue. Schedule View Select this tab for the Schedule view. In this view, select the report you want to schedule for execution, from your list of created CounterWatch Reports plus the five fixed reports: Alert Notifications, IP Service Performance and Availability, Logical Drive Utilization, Memory Utilization, and HW/Configuration Reports. Here you also define the schedule parameters for when and how frequently the Report executes, for what time period it reports on, and where the Report output should go. Report Name Field • Drop-down list box displaying the names of all reports defined previously in Create CounterWatch Reports and available to be scheduled, as well as the always available Alert Sentry II 8.0 User’s Guide p. 184 Version 8.0.12 July 2006 Notifications, IP Service Performance and Availability, Logical Drive Utilization, Memory Utilization, HW/Configuration, Registry Monitor, and Watches/Alerts Status Reports. Report Description Field • A display, read-only field showing the assigned description for the selected Report. Report Details Button • Press this button to pop-up a display that shows the selected report parameters as defined previously in Create CounterWatch Reports. This is not available for the Alert Notifications, IP Service Performance and Availability, Logical Drive Status, and Memory Utilization Reports since the parameters for these are defined at the time of scheduling. • Collection set Name and Collection set Description are the name and description for the collection set used as the basis for the selected report. • Server/Device Name and Group Name are the name of all the servers/devices and the Group to which each belongs and which the selected report will use for the monitoring phase. • Click the OK button to close the Report Details display. Optional Notes Field • These are your user specified notes for annotating the Queue entry for this report to help you identify and track it on the Queued status display tab. Particularly for the Alert Notifications, IP Service Performance and Availability, Logical Drive Status, and Memory Utilization Reports, which you can schedule multiple instances with different reporting parameters, they will have the same Report name, so these Optional Notes provide a way for you to annotate some specific and unique information for each scheduled report. • Data in the Optional Notes field, up to the first colon character (‘:’) if any, are appended to the Report Name instances that are created whenever the report runs. This helps to distinguish among multiple instances of the same type of report when they are displayed in the Queued display and also in Run/Analyze & View Reports where the created report instances are available for viewing. Run Report Every Field • Define how frequently the report is run. This dictates the next data/time for running the report when it is automatically rescheduled. (This is a "point & click" field). o Click the Run Report Every field to display the frequency choices. You specify this value in minutes, hours, days, weeks, or months. Start Date/Time Field • For the selected report, define when the report should first execute. Thereafter, the report is rescheduled based on the 'Run Report Every' parameter. These are "point & click" fields. o Click the first field (Start Date) to view the current month calendar. "Point & click" to select a date from this month or click the right-arrow icon to scroll to the next Sentry II 8.0 User’s Guide p. 185 Version 8.0.12 July 2006 month. Use the left- and right-arrow icons to scroll backward or forward to find the calendar month you want, and then click the date for the Start Date. o Click the second field (Start Time), to display the start time choices. Specify the time in hour and minute, AM or PM. For Previous Period Field • Define the time-period prior to the Start Date/Time that the report should cover in its analysis and results. (This is a "point & click" field). o • Click the For Previous Period field to display the duration choices. You specify this value in minutes, hours, days, weeks, or months. Not applicable for the Logical Drive Status, and Memory Utilization Reports. Exclude Time Periods Button • Press this button to pop-up a dialogue where you can specify selected times-of-day periods and day-of-the-week where monitoring results will be ignored during the Report analysis phase associated with this report. Optional Report Output To Field • The report output for each scheduled report instance is always available for viewing and printing in Run/Analyze & View Reports. However, optionally here you can specify a fully qualified path to a folder where the Sentry II Server will, in addition, write the report output. • You can use this additional report output location in conjunction with the Optional Link to Report Output that is used with the Email, 'Link Only' option, to provide access to the report data via an alternate Internet/Intranet address. Optional Report Name Field • The report output for each scheduled report instance is always available for viewing and printing in Run/Analyze & View Reports. However, if you are specifying Optional Report Output and/or are using the Email options, you can optionally specify the name for the Report output. • Since the Report is running periodically, each new output will overwrite the previous output when using this specified name. You can, however, include the macros &D and or &T in the optional Report Name, and when the Report output is created &D is substituted with the current date, and &T is substituted with the current time, creating a unique name for each output. Email Report Checkbox • Set the checkbox to enable optional Emailing of the Report output results. • Then choose to Email the 'Link Only' or the 'Full Report' as well as the other Email details. Email Link Only / Full Report Radio Buttons • By default, the Email 'Link Only' to the Report output is enabled. Sentry II 8.0 User’s Guide p. 186 Version 8.0.12 July 2006 • Set the 'Full Report' radio button if you want to Email the complete report output, in HTML format, to the Email recipient(s). Specify Email Details Button • Press this button to pop-up a dialogue where you can specify the addresses for the Email recipients as well as the Email Subject line. • You may use any of your defined Email Groups, and here you can also choose to 'Manage' your Email Groups by adding new ones, editing or deleting existing ones. • The Email Subject line supports an '&D' and '&T' macros that are substituted with the date and time, respectively, at the time of the report generation. Optional Link to Report Output Field • This is an optional 'link', usually expected to be an "HTTP://...“style link that can be used to point to the folder where you have specified the report output should be placed using the Optional Report Output To parameter. Choose IP Service & Servers/Devices, Choose Alert Type & Servers/Devices and Choose Groups Buttons • One of these buttons is available depending on whether the selected report is the Alert Notifications, IP Service Performance and Availability, Logical Drive Status, or Memory Utilization Reports. • Press the displayed button, based on the report, to choose the Groups, or to specify the type of IP Service or Alert Notifications, plus the servers/devices, to report on. Query Button for Event Log Report Filter • Press this button to pop-up a dialogue where you can specify an additional filter for the Event Log data portion of the report. • Each of the parameters are optional, and each will take multiple, comma-delimited values if you choose to filer on one or more of the specific parameters such as Event ID, Source, User/Group, and/or Description. • In the User/Group field, you can also enter an Active Directory Group Name so that any User that is a member of the Group would be considered a Match. You can specify multiple Group Name parameters by separating with a comma. You also mix User and Group names. The Group name is indicated by the including of a parenthesis pair as part of the name; for example, ‘Administrator()’ is the ‘Administrator’ Group. Click the button to the right of this field to pop-up a display Windows and view your Active Directory information where you can select one or more Users and/or Groups. Schedule Button • Once all the required fields are defined, press this button to queue the report and schedule it to execute the first time when the Start Date/Time becomes current. Thereafter, the report is automatically rescheduled based on the 'Run Report Every' parameter. Sentry II 8.0 User’s Guide p. 187 Version 8.0.12 July 2006 Queued View Select this tab for the Currently Scheduled Reports view. This view shows the status of all reports that have been previously scheduled. The reports are sorted based on the Start Date/Time so that the next reports to run are at the top. • To activate the Edit and Delete buttons, point and click a report entry to select it. • Hover with the mouse over a report entry and the tool tip will display with the 'Optional Notes' you assigned to the entry when first creating it. These 'Optional Notes', if any, are also displayed as part of the queued entry's information. Scroll the window to the right to see all the parameter information for each queued report entry. Refresh Button • Click an entry to select it, and enable the Edit and Delete buttons. Press Edit to modify the report schedule parameters.Use this button to refresh the display. While the display is open, scheduled reports may come due, execute, and then be rescheduled with new date/times. The display is NOT updated automatically. Use Refresh to see the latest parameters. Edit Button • Click an entry to select it, and enable the Edit and Delete buttons. Press Edit to modify the report schedule parameters. • Clicking Edit automatically switches the view to the Schedule view with the reports current defined parameters. Here you can modify them. Click OK to apply your changes, or Cancel to abort. Either OK or Cancel switches the view back to the Queued tab's view. Sentry II 8.0 User’s Guide p. 188 Version 8.0.12 July 2006 Delete Button • Click an entry to select it, and enable the Edit and Delete buttons. Use this button to remove a selected report entry from the currently scheduled queue. • Once removed, the report is no longer scheduled. Print Button • Use this button to Print a copy of the Queued reports and their parameters. Brand View Select this tab for the Brand Reports view. This view shows available fields that you can define that Sentry II will use to Brand all report output at the end of the output. Sentry II 8.0 User’s Guide p. 189 Version 8.0.12 July 2006 Run/Analyze & View Reports Use Run/Analyze & View Reports to run the Performance Wizard and analyze the three types of reports provided in Sentry II. The Performance Wizard results can then be viewed and printed. Report Types The three report types are: ServerWatch Service Reports, Windows & SNMP CounterWatch Counter Reports, and Inventory Reports. The Service and Inventory Reports, highlighted in blue, are special in that they are not scheduled and cannot be deleted, and are always available. You define and schedule the Counter Reports. Service Reports There are two special Service reports included. They are the Service Availability & Performance report, and the Alert Notifications report. These Service reports provide detailed availability and performance, and alert metrics for the HTTP, SMTP, POP, FTP, DNS, SQL, ORACLE, TELNET, SNMP, PING, AGENT and USER specified IP Services on those servers you previously selected for monitoring (see Configure Watches/Alerts for service monitoring). The Alert Notifications Report provides a view of any or all failures for selected Watches or all Watches. See Service Report Analysis below for more information on these two Service Reports. Sentry II 8.0 User’s Guide p. 190 Version 8.0.12 July 2006 Inventory Reports There are four special Inventory reports included. They are the Operating System Inventory, Group Inventory, User Security, and Session Log. These Inventory reports provide a convenient way to display Sentry II Server database information for various items that you define using the Sentry II Configure functions (See Configure tab). These Inventory reports are unique in that they are not scheduled and cannot be deleted. When analyzed, they provide information about the Sentry II Server system. Standard Sentry II reports provide information on the monitoring of one or more user server or workstation computers. Counter Reports You define Counter reports from the provided collection sets (See Create CounterWatch Reports), and then schedule Counter reports (See Schedule CounterWatch Monitoring) to gather countermonitoring results, or press the New button to specify date/time and duration parameters for report data already in the database. Status View Select this tab for the Status view. This view shows the status of all Counter reports that have been previously scheduled (See Schedule CounterWatch Monitoring) to execute the monitoring phase, and, the always available, Inventory and Service reports. Analysis Status Field • Monitor Scheduled - Counter reports that are currently waiting to start monitoring because their Start Date/Time is in the future. • Monitor Processing - Counter reports that are in the process of monitoring; their Start Date/Time has past and their End Date/Time is in the future. • Ready - Counter reports that have completed monitoring but have not yet been analyzed by the Performance Wizard; their End Date/Time has past; also Service Availability & Performance and special Inventory reports that can be analyzed. • Started - Counter, Service, and Inventory reports that are waiting for analysis by the Performance Wizard. • Processing - Counter, Service, and Inventory reports that are currently being analyzed by the Performance Wizard. • Stopping - Counter, Service, and Inventory reports in the process of being analyzed by the Performance Wizard that are cancelled by the User. • Complete - Counter, Service, and Inventory reports with completed analysis results from the Performance Wizard. Sentry II 8.0 User’s Guide p. 191 Version 8.0.12 July 2006 Date/Time Fields • The Start Date/Time and End Date/Time define the period for which monitoring has or will occur for the counters and computers defined by the report (See Create CounterWatch Reports). • Reports that have completed the monitoring phase are eligible for analysis by the Performance Wizard. Select one or more reports with Analysis Status of Ready, and press the Analyze button to start the Performance Wizard. • Be cognizant of time differences for your different servers, locally, if the server clocks are not synchronized, and particularly for remote servers in different time-zones. The Start Date/Time is based on the Sentry II Server's clock. However, once remote servers are told to begin monitoring by the Sentry II Server, monitored data is stored in the Sentry II database based on the local time of the server being monitored. You have to take this time into account when running the analysis reports. You also have to take this time into account when setting up your charts to monitor these counters. Allow for an appropriate start time and chart density (see below) to be sure to view monitored counters from servers in different time-zones. Last Status Message Field • This is a dynamic display of last status message from the Performance Wizard while it is analyzing the report. Show All Checkbox • When unchecked, only those reports that have completed the monitoring phase (Analysis Status is Ready, Started, Processing, Stopping, or Complete) are shown. • When checked, the Status View will show Counter reports that are currently waiting to start monitoring or are in the process of monitoring (Analysis Status is Monitor Scheduled, or Monitor Processing), as well as all those reports that have completed the monitoring phase. New Button • Press the New button to pop-up a display where you pick from your previously created CounterWatch reports (See Create CounterWatch Reports), and specify date/time range, earlier than current time, in order to create an entry that you can then Analyze for CounterWatch data already available in the database. Analyze Button • Press to run the Performance Wizard to analyze the selected Service, Counter, and/or Inventory report(s). • Select one or more reports that have completed monitoring (Analysis Status is Ready), and/or have completed monitoring and already have been analyzed (Analysis Status is Complete). Sentry II 8.0 User’s Guide p. 192 Version 8.0.12 July 2006 • When attempting to analyze a report that has already been analyzed (Analysis Status is Complete), you are prompted to confirm since the previous generated analysis result is deleted and replaced by the new analysis results about to be generated. Delete Button • Select one or more Counter reports to delete. Service and Inventory reports cannot be deleted. • Deleting reports that are waiting to monitor or currently monitoring (Analysis Status is Monitor Scheduled, or Monitor Processing), aborts this process. Deleting reports that have already been analyzed by the Performance Wizard (Analysis Status is Complete) deletes both the report and the analysis results. • You are prompted to confirm the delete. Cancel Button • Select one or more reports currently being analyzed (Analysis Status is Started or Processing) by the Performance Wizard to terminate this process. • You are prompted to confirm the cancel Refresh Button • Press this button to refresh the Status display with any new updated report information. • The Status display is updated dynamically for reports that you manually start the analysis. However, report instances created via the 'Schedule Periodic Report' process are not dynamically added to the Status display. Service Report Analysis Select the Service Availability & Performance report to see the metrics and graphs for any of the available services: HTTP, SMTP, POP, FTP, DNS, SQL, ORACLE, TELNET, SNMP, PING, AGENT and USER; or select the Alert Notifications to see the history of the alert events and failures for all your configured Watches. (See Configure Watches/Alerts). • Select either or both reports with the mouse to highlight them. • Press the Analyze Button to run the Performance Wizard and start the analysis. • For the Service Availability & Performance, a pop-up dialogue box appears and you are prompted to select the Service Type from a drop-down containing the available IP Services; select the range, Report On, in Days and Hours, for the report analysis, and a Starting at Date/Time. There is a Total Availability Summary option, if selected, provides a sorting option choice, and when run yields a summary report, with one line per server. You can run the report on just specific server/devices rather than all, which is the default. Press the Select button to view the available Watches and the associated servers/devices for the selected IP Service. There is also a Include Maintenance Periods option, if selected, includes the maintenance periods where the server/device was not being monitored during the report period. Sentry II 8.0 User’s Guide p. 193 Version 8.0.12 July 2006 • For the Alert Notification, you can select the report on ServerWatch, FileWatch, WinServicesWatch, EventLogWatch, and/or SNMPWatch type alerts; select the range, Report On, in Days and Hours, for the report analysis, and a Starting at Date/Time. • There is an option to limit the number of report entries, Max Report Lines/Server, for any alert type per server. There is also a Notified Only checkbox to limit the report entries to those alert failures that resulted in a notification. You can run the report on just specific server/devices rather than all, which is the default. Press the Select button to view the available Watches and the associated servers/devices for the selected Watch type. • Press the OK button to confirm your choice and continue with the report analysis or press the Cancel button to terminate the report analysis. When the report analysis is complete, select the Results View, defined below, to review the results. Exclude Time Periods Button Sentry II 8.0 User’s Guide p. 194 Version 8.0.12 July 2006 • Press this button to pop-up a dialogue where you can specify selected times-of-day periods and day-of-the-week where monitoring results will be ignored during the Report analysis phase associated with this report. Query Button for Event Log Report Filter • Press this button to pop-up a dialogue where you can specify an additional filter for the Event Log data portion of the report. • Each of the parameters are optional, and each will take multiple, comma-delimited values if you choose to filer on one or more of the specific parameters such as Event ID, Source, User Name, and/or Description. • In the User/Group field, you can also enter an Active Directory Group Name so that any User that is a member of the Group would be considered a Match. You can specify multiple Group Name parameters by separating with a comma. You also mix User and Group names. The Group name is indicated by the including of a parenthesis pair as part of the name; for example, ‘Administrator()’ is the ‘Administrator’ Group. Click the button to the right of this field to pop-up a display Windows and view your Active Directory information where you can select one or more Users and/or Groups. Results View Select this tab to review the report analysis results. This view shows the results of all selected reports in the Status view that have been analyzed by the Performance Wizard (Analysis Status is Complete). When more than one Complete report in the Status view is selected, the results of the first selected report will be shown in the Results view first. Full View Buttons Sentry II 8.0 User’s Guide p. 195 Version 8.0.12 July 2006 • Use this button to see a nearly full-screen view in a separate browser window of the current Performance Wizard results being displayed. • From the Full View, you can print, save, and even Email, the report results. Next & Previous Buttons • Use these buttons to scroll forward to the Next or Backward to the previous Performance Wizard results when more than one Complete report in the Status view is selected. Sentry II 8.0 User’s Guide p. 196 Version 8.0.12 July 2006 Print Button • Press this button to Print the currently displayed report output. You can also go to the Full View (See above) and use the browser’s Print button to print the report. Sentry II 8.0 User’s Guide p. 197 Version 8.0.12 July 2006 Event Log View/Archive & Report Use the Event Log View/Archive & Report to: Manage your Event Log Archive schedules; View events in your Archived Event Log files, as well as View Monitored events in the Sentry II database; and/or View events in the actual Event Log files of selected servers/workstations. You can create one or more Archive Schedules to automatically upload and archive native Event Log EVT files and save them in a central storage in a compressed format. There are a variety of conditions that you can specify to trigger the upload. The Viewer supports setting very flexible filters, which you can Save and then Load later to reuse, so that you can view just the events that you are interested in viewing. You have the option to Print, Email, or Export the view results. And the Viewer is designed to be very interactive, making it easy to change your filter and view a different result set of events. Click the appropriate button to View Archived Event Logs, View Monitored Events, View Current Event Logs, Manage Archive Schedules, or Set Maximum Event Log File Sizes. View Archived Event Logs The View Archived Event Logs dialogue box is displayed when the associated button is pressed. This dialogue box displays checkboxes to choose the Event Logs to view, the Event Types within Sentry II 8.0 User’s Guide p. 198 Version 8.0.12 July 2006 the logs to view, and options to further filter based on Event ID, Source, User Name, and/or Description. Each of these options accepts one or more comma-delimited, non-case sensitive parameters, and in addition, the Event ID field also accepts a range (e.g. 532-550, 560-590). In the User/Group field, you can also enter an Active Directory Group Name so that any User that is a member of the Group would be considered a Match. You can specify multiple Group Name parameters by separating with a comma. You also mix User and Group names. The Group name is indicated by the including of a parenthesis pair as part of the name; for example, ‘Administrator()’ is the ‘Administrator’ Group. Click the button to the right of this field to pop-up a display Windows and view your Active Directory information where you can select one or more Users and/or Groups. There are checkbox options to treat the filter options as a Boolean AND (“AND Params”); as an inverse (“NOT Check”), and provide a Summary with Counts of like events rather than each individual event. Click the Save Filter button to save your filter selections so you can recall them at a later time; or click the Load Filter to load a filter from your list of previously saved filters. There are Start and End Date/Time fields to put a time-frame around the events you want to view. Click the Specify Archive button to provide the path to the Archive storage folder you want to view. The viewer will automatically uncompress and retrieve the events matching the filer specification from the archive storage. Sentry II 8.0 User’s Guide p. 199 Version 8.0.12 July 2006 Also displayed is the tree of all Windows NT / 2000 / XP / 2003 servers and workstations eligible, organized by their associated Groups. From this tree of server and workstation computers, choose the ones whose selected logs you want to view. View Monitored Events The View Monitored Events dialogue box is displayed when the associated button is pressed. This dialogue box is the same as the View Archived Events Logs except the Sentry II database is searched for events captured as a result of Event Log Watches (see Configure Watches/Alerts) that match the specified filter. View Current Event Logs The View Current Event Logs dialogue box is displayed when the associated button is pressed. This dialogue box is the same as the View Archived Events Logs except the Event Log files on the selected servers/workstations are searched for events that match the specified filter. Groups : Servers/Workstations Tree • All the eligible (Windows NT / 2000 / XP) servers and workstations are displayed as nodes in the tree under their associated Groups. • Press the + image to expand a Group and see its list of associated computers; press the image to contract. • Click the checkbox to check or uncheck the computer to choose whether to display its Event Logs of the type selected (See Select Event Logs to View above). • When checked and eligible for selected log display in the Event Log Viewer, the computer icon image is replaced with the event log viewer image . • Hover with the mouse over the computer icon computer description. or event log viewer icon to display the View Button • Press this button to close the Filter dialogue box and to initiate the read and display of the selected events. Cancel Button • Press this button to close the Filter dialogue box without taking any action. Event View In the Event view, the events matching the specified filter are displayed. Press the "Expand" icon to toggle the hide and show of the Menu and Banner panes to increase or decrease the server status log display area. Click the column header to sort the display entries by the associated column. Sentry II 8.0 User’s Guide p. 200 Version 8.0.12 July 2006 Displays the specific Event type icon with for Error type events, for Information type events, and for Security Check type events. for Warning type events, Menu Button • Click this button to redisplay the opening Menu screen. Back Button • Click this button to return back to the filter screen you just created so that you can easily change your filter and view another set of events. Print Button • Press this button to print the Event display. Email Button • Press this button to email the Event display to a specified recipient. Sentry II 8.0 User’s Guide p. 201 Version 8.0.12 July 2006 Export Button • Press this button to export the Event display to a uniquely named CSV file in the “…\Sentry II\Export” folder. • The CSV file can be opened in Excel. Cancel Button • Press this button to Cancel an in progress search for events matching the filter. Sentry II 8.0 User’s Guide p. 202 Version 8.0.12 July 2006 Manage Archive Schedules The Manage Archive Schedules dialogue box is displayed when the associated button is pressed. This dialogue box provides the option to create one or more Archive Schedules to archive and optionally upload the selected archived Event Log files, from the selected servers/workstations, based on 1 of 4 conditions. Administrator rights are required for this function and the Set Maximum File Size function. You can define multiple Archive Schedules for the same servers/workstations, and even for the same Logs, based on different conditions. So for example, create a schedule that archives whenever the Event Log file is 90 percent full, and then create another schedule that archives every 7 days at 1AM. Each archive schedule can archive to the same or different central archive storage folders. The default central archive storage folder is in the “…\Sentry II\Archive” folder; whereas archived files are stored in a subfolder based on server/workstation name. You can override the default archive folder and specify an alternative folder that can be on the same machine as the Sentry II Server, or reachable from the Sentry II Server via a mapped drive, or via a UNC path. Archived Event Log files are stored in a compressed GZIP format which achieves 20 to 1 and as much as 30 to 1 compression. The files are automatically uncompressed by the Viewer, but can also be manually decompressed by WinZip or any other Windows compression utility that supports the GZIP format. Archived Event Log files are named by appending the machine name where the file originated plus the date/time the archive file was created. For example, a standard “AppEvent.evt” file name for an Application Event Log would be named “AppEvent_MachineName_mmddyy_hhmmss.gz” after it was uploaded in the native EVT format and compressed. Sentry II 8.0 User’s Guide p. 203 Version 8.0.12 July 2006 Set Maximum File Size The Set Maximum File Size dialogue box is displayed when the associated button is pressed. This dialogue box provides the option to set the maximum log file size for selected Event Log files on selected servers/workstations. The size is in KB and is rounded to the nearest 64KB increment following the Windows behavior for these. Sentry II 8.0 User’s Guide p. 204 Version 8.0.12 July 2006 Syslog View/Archive & Report Use the Syslog View/Archive & Report to View Syslog messages in your Archived Syslog files, as well as View Monitored Syslog messages in the Sentry II database. The Viewer supports setting very flexible filters, which you can Save and then Load later to reuse, so that you can view just the Syslog messages that you are interested in viewing. You have the option to Print, Email, or Export the view results. And the Viewer is designed to be very interactive, making it easy to change your filter and view a different result set of Syslog messages. Click the appropriate button to View Archived Syslogs, or View Monitored Syslogs. View Archived Syslogs The View Archived Syslogs dialogue box is displayed when the associated button is pressed. This dialogue box displays options to further filter based on Syslog Message content. Click the Save Filter button to save your filter selections so you can recall them at a later time; or click the Load Filter to load a filter from your list of previously saved filters. There are Start and End Date/Time fields to put a time-frame around the messages you want to view. Sentry II 8.0 User’s Guide p. 205 Version 8.0.12 July 2006 Click the Specify Archive button to provide the path to the Archive storage folder you want to view. The viewer will automatically uncompress and retrieve the messages matching the filer specification from the archive storage. Also displayed is the tree of all servers and devices eligible, organized by their associated Groups. From this tree of servers/devices, choose the ones whose selected logs you want to view. Content Search Substring(s) Filter With this parameter you can optionally specify a simple, or compound/complex filter based on matching specified substrings versus the content of the Syslog messages. Use ‘+’ for a Boolean AND; ‘,’ for a Boolean OR; and ‘-‘ for Boolean NOT. For example, string1+strng2-string3; this would find all Syslog messages that included ‘string1’ AND ‘string2’ but NOT ‘string3’. View Monitored Syslogs The View Monitored Syslogs dialogue box is displayed when the associated button is pressed. This dialogue box is the same as the View Archived Syslogs except the Sentry II database is searched for messages captured as a result of a SYSLOGWatch with an alert notification option defined (see Configure Watches/Alerts) and that match the specified filter. Groups : Servers/Devices Tree Sentry II 8.0 User’s Guide p. 206 Version 8.0.12 July 2006 • All the eligible servers/devices are displayed as nodes in the tree under their associated Groups. • Press the + image to expand a Group and see its list of associated servers/devices; press the image to contract. • Click the checkbox to check or uncheck the server/device to choose whether to display its Syslog messages. • When checked and eligible for display in the Syslog Viewer, the computer icon image is replaced with the Syslog viewer image. • Hover with the mouse over the computer icon or Syslog viewer icon to display the server/device description. View Button • Press this button to close the Filter dialogue box and to initiate the read and display of the selected messages. Cancel Button • Press this button to close the Filter dialogue box without taking any action. Messages View In the Messages view, the messages matching the specified filter are displayed. Press the "Expand" icon to toggle the hide and show of the Menu and Banner panes to increase or decrease the messages display area. Click the column header to sort the display entries by the associated column. Sentry II 8.0 User’s Guide p. 207 Version 8.0.12 July 2006 Menu Button • Click this button to redisplay the opening Menu screen. Back Button • Click this button to return back to the filter screen you just created so that you can easily change your filter and view another set of messages. Print Button • Press this button to print the Syslog Message display. Email Button • Press this button to email the Syslog Message display to a specified recipient. Export Button • Press this button to export the Syslog Message display to a uniquely named CSV file in the “…\Sentry II\Export” folder. • The CSV file can be opened in Excel. Cancel Button • Press this button to Cancel an in progress search for messages matching the filter. Sentry II 8.0 User’s Guide p. 208 Version 8.0.12 July 2006 Server/Device Maintenance Use the Server/Device Maintenance function to specify schedules, either one time or repeated, where you want to suppress ALL monitoring and alerting on selected servers/devices. Typically you would do this when servers/devices are going to be unavailable due to some planned maintenance and you do not want to monitor these nor generate any alert notifications during these maintenance down times. Current Maintenance Schedules The Current Maintenance Schedules frame displays any current or scheduled maintenance periods including the starting date/time, the duration, and whether the schedule is repeated. The servers/devices affected by the particular maintenance schedule are listed in the drop-down box. The schedules are sorted automatically by the ‘Starting Date/Time’ with the most recent first. Hover over the Description parameter field to see the full description in the pop-up tool tip for the particular schedule; hover over other fields in a particular schedule and see the list of selected Watches in the pop-up tool tip that are part of the particular schedule To terminate a schedule at any time, click the schedule line to select it, and then click the Delete button. If you want to change a schedule, you just delete it and then specify it again. Sentry II 8.0 User’s Guide p. 209 Version 8.0.12 July 2006 This frame is automatically updated while opened when any change occurs: either changes you make; or changes that occur due to other users; or changes made automatically by the Sentry II Server when schedules expire or are rescheduled. to toggle the hide and show of the Specify Maintenance Schedule for Press the "Expand" icon Servers/Devices frame to increase or decrease the Current Maintenance Schedules display area. Specify Maintenance Schedule for Servers/Devices The Specify Maintenance Schedule for Servers/Devices frame is where you specify new schedules.. Start Date/Time Field • Specify the date and time when you want the new maintenance schedule to be in effect. Date is MM/DD/YYYY; and time is HH:MM in 24 hour format. • When current time on the Sentry II Server equals the Start Date/Time, the maintenance period is automatically in effect and ALL monitoring and alerting is suppressed on the associated servers/devices. Duration Field • Click the Duration field to enable the drop downs and specify how long you want the maintenance period to be in effect. • At the end of the Duration, the maintenance period automatically expires and all monitoring and alerting is enabled for the associated servers/devices. If there is no Repeat Every parameter defined, the schedule is deleted. Repeat Every Field • Click the Repeat Every field to enable the drop downs and specify if you want the maintenance schedule to be automatically repeated and rescheduled whenever it expires. • This field should be blank if you only want to define a maintenance schedule that is effective one time. Schedules that do not repeat are automatically deleted when they expire. • The ‘Month’ choice reschedules for the same day of the month in the appropriate succeeding month; for example, a Repeat Every of 1 month would reschedule say February 6 to March 6, and March 6 to April 6, and so on. Description Field • Enter any optional text to describe this new Maintenance Schedule. • By default only approximately the 1st 50 characters of the Description entered will display; click the Show Desc checkbox to display the full Description All Watches / Select Watches Radio Button • Click the All Watches radio button to disable all monitoring and all alerting on all Watches for this new Maintenance Schedule. Sentry II 8.0 User’s Guide p. 210 Version 8.0.12 July 2006 • Click the Select Watches radio button, and enable the Select button; then click the Select button to select one or more Watches only that will be disabled by this new Maintenance Schedule.. Groups : Servers/Devices Tree • All the eligible servers and devices are displayed as nodes in the tree under their associated Groups. • Press the + image to expand a Group and see its list of associated servers/devices; press the image to contract. • Click the checkbox to check or uncheck the server/device to choose whether to include in the new maintenance schedule. • When checked, the computer icon image is replaced with the server maintenance image. Apply Button • Press this button to apply and save the new Maintenance Schedule. You will see the Current Maintenance Schedules frame automatically updated with the new Maintenance Schedule. Sentry II 8.0 User’s Guide p. 211 Version 8.0.12 July 2006 Net Toolbox Use the Net Toolbox to do a Trace Route, view/set an SNMP device, send a PING, or do a DNS lookup for an IP address or Host name. Select Tool Drop-down • Choose the net tool, Trace Route, DNS Lookup, SNMP Viewer or PING Server. Name/IP Address Field • Specify either a Host name or IP address. Each of the selected tools will do the appropriate lookup to derive Host name from IP address, or vice-versa. Trace Route Parameters If Trace Route is the net tool selected, additional parameter fields are displayed. All of these fields are set with reasonable default values, good for most trace routes. However, changing these parameters will affect the trace route performance and results. Resolve IP Addresses Checkbox • Uncheck this and IP addresses will not be resolved to a Host name. Doing so usually speeds up the trace route execution substantially. Sentry II 8.0 User’s Guide p. 212 Version 8.0.12 July 2006 Probe Count Drop-down • Defines the number of times each intervening node in the route is probed and checked. A Probe Count greater than 1 will slow down the trace route execution but provide a better view of the average performance for each intervening node. TimeOut Drop-down • Defines the time-out when waiting for a response from each intervening node of the route. TimeToLive Drop-down • Defines the number of intervening nodes that the trace packet is allowed to traverse before it will expire. TypeOfService Drop-down • Defines the type of service, General, Low Delay, High Thruput, High Reliability, for the trace route. General is the default. SNMP Parameters If SNMP Get, Get_Next, Walk_MIB, or Set is the net tool selected, additional parameter fields are displayed. • 'Get' queries the specified OID(s) and returns their values. • 'Get_Next' queries the next lexicographic ordered Object to the one specified. The response is displayed and the OID filed is automatically primed to the next one. Repeatedly pressing the Start button walks the MIB one at a time. • 'Walk_MIB' automatically walks the MIB starting with the next lexicographic ordered Object to the one specified. • 'Set' allows you to set a specified object with a value. Read Community Field • Define the "community" to which the device you want to view belongs. This acts as a level of security, The default Read Community name is "public". • Used with the 'Get', 'Get_Next', and 'Walk_MIB' commands Write Community Field • Define the "community" to which the device you want to set belongs. This acts as a level of security. The default Write Community name is "public". • Used with the 'Set' command. Sentry II 8.0 User’s Guide p. 213 Version 8.0.12 July 2006 Time-Out Field • Specify the time-out, in seconds, to wait for the response to the SNMP viewer inquiry. OID(s) Field • Defines one or more OPTIONAL OIDs to be queried. Multiple OIDs are separated by a semi-colon. • Either OIDs or the Group or Object name accepted. For example, 'sysDescr' or 'sysLocation' for the System name and location objects, or 'system' for the MIB-II System Group. • If no OID(s) are specified, the SNMP query check is for default OIDs of System Name, Description, Up-Time, Location, Services, Contact, and ObjectID. Target OID Field • Defines the one OID or object name for the 'Set' command. Set Value Field • Defines the value to be used in setting the target OID or named object in the 'Set' command. The type of the value is specified in the Type field Type Field • Defines the type of the Set Value in the 'Set' command. Default is 'String' type; the other choices are: Integer, Long, Unsigned. Start Button • Press this button after selecting the tool, and specifying the Host name or IP address to start the tool execution. The result information for the tool execution is displayed in the Result Log. The Result Log can be viewed or printed. Cancel Button • Press this button to abort the selected tool operation. Clear Log Button • Press this button to clear the Result Log view. Print Button • Press this button to print the Result Log view. Sentry II 8.0 User’s Guide p. 214 Version 8.0.12 July 2006 Database Maintenance Use Database Maintenance to manage the Sentry II Server database monitoring contents and overall size. You can schedule an automatic purge of monitored data to occur every day at a set time, and you can specify the maximum amount of days of data to maintain. There is also an option to filter out specific CounterWatch Objects from the Object/Counter tables in order to eliminate Objects of no interest. You can also manually initiate the discard of monitored counter and service data that you are no longer interested in and/or compact the database to reclaim all space from previously deleted records and/or discarded counters. AutoPurge Tab Select the AutoPurge Tab to schedule an automatic purge of monitored data to occur every day at a set time. Also specify the maximum amount of days of data to maintain. Enable AutoPurge Checkbox • Select this checkbox to enable the database AutoPurge function. Purge all Monitored data older than Drop-down • Select the number of day’s worth of monitored data in the database to keep. All data older than the specified number of days is purged from the database. Sentry II 8.0 User’s Guide p. 215 Version 8.0.12 July 2006 Purge all Report data older than Drop-down • Select the number of day’s worth of completed Report output in the database to keep. All completed Report output older than the specified number of days is purged from the database. Run AutoPurge everyday at Drop-down • Select the hour of the day when the AutoPurge will run on a daily basis. Objects Tab Select the Objects Tab to enable and specify an Object Filter that will filter out and delete Objects and associated Counters from the Sentry II database. You normally would filter out Objects such as the NBT Connection objects and others that you would likely not want to ever monitor. This aids in keeping the overall Object count under control and improves performance in those screens and functions that deal with Objects. This is not an irrevocable step. If you decide later that you want to monitor Objects that you previously filtered, change the filter and then next time the Sentry II Agent(s) connect up to the Sentry II Server, the Agent(s) will refresh with the now unfiltered Object(s). Enable Object Filtering Checkbox • Select this checkbox to enable the database Object Filtering function. Sentry II 8.0 User’s Guide p. 216 Version 8.0.12 July 2006 Object Filter List Field • Specify one or more Object names to be filtered. A semi-colon must separate multiple Objects names. • Currently, instances of Objects are not supported. You can only specify the base Object name that will result in all the Objects and its instances of the base name being filtered out. For example, specify "Processor" as the object name, and Objects "Processor 0", "Processor 1","Processor _Total", and so on will be filtered out. Do not include the 'instance' as part of the Object name, as that will result in no match. For example, do not specify "Processor 0" • An asterisk wild-card as the last character in an Object name specification is supported to mean the Object name is a root, and any Object names including the root starting at the 1st character in the name will result in a match. For example, "NBT*" will match and filter all Object names that start with "NBT" as the first three characters. Enable Obsolete Object Purging Checkbox • Select this checkbox to enable 'Obsolete Object Purging’. The default is checked. • This will cause the purging of any CounterWatch Performance Objects from the database that are no longer being reported by the associated Agent when it reconnects based on the Agent querying the system. Also any Objects without associated Counters are purged. Some applications will remove their custom Objects and Counters when they are stopped. This could lead to them being purged and losing historical data. In this case, you may want to disable this feature. Apply Button • Once you have defined the Object Filter parameters, press the Apply button. If the Enable Object Filtering checkbox is checked, then a background process is scheduled to start within 1 minute to scan the database Object inventory and delete those Objects and associated Counters that are now filtered. Also, when Agent(s) subsequently connect and upload Object inventory, it is filtered at this point as well. Purge Tab Select the Purge Tab to manually initiate the discarding of monitored data older than a date/time that you specify. Also, optionally initiate the database compact. Date/Time Fields • Displays the date and time point for which all earlier service / counter data will be discarded when the Apply button is pressed. • These are "point & click" fields. • "Point & click" to select a date from the month or use the left-arrow and right-arrow icons to scroll backward or forward to find the calendar month you want, then click the date for the discard date. • "Point & click" to the hour, minute, and AM/PM drop-down lists to select the time. Sentry II 8.0 User’s Guide p. 217 Version 8.0.12 July 2006 Apply Button • Once you have defined the date and time for which you want to discard all earlier service / counter data, press the Apply button to flag the data as discarded. • You must perform the Compact Now (see below) function to actually reclaim database space. Compact Now Button • Press the Compact Now button to reclaim Sentry II Server database space for all previously deleted records and discarded monitor service / counter data. This function only applies to the default Access database. If using SQL Server, a “No Status” is returned immediately. Use the SQL Server tools available to reclaim freed database space. • You are asked to confirm the Compact before proceeding since it may take up to 1 hour for a very large Access database (>750MB), and during that time the database is closed and no monitoring is taking place. • When using the default Access database, it is a good practice to do a Compact once every 12 weeks. Compact reclaims deleted space, making the database smaller, repairs any damaged links and contributes to overall good Sentry II performance. • With SQL Server, the standard tools will periodically reclaim unused space from deleted records. Sentry II 8.0 User’s Guide p. 218 Version 8.0.12 July 2006 Sentry II Server Log Use the Sentry II Server Log to view the current activity log from the Sentry II Server in real-time. The Sentry II server logs most activities and events to its activity log. Clear Log Button • Press the Clear Log button to reset and clear the log view display. Print Button • Press the Print button to print the log view display. Pause/ Resume Button • Press the Pause button to halt the updating of the display so that it is easy for you to review the display contents. • Press the Resume button to restart the display update from where it was last stopped. Log To Disk Checkbox • Set this checkbox to begin logging the data to a disk file. • The file is called Sentry IIServer.log and is found in the “…\Sentry II\Bin” folder. • This is a global setting that always reflects the state of logging to disk. Sentry II 8.0 User’s Guide p. 219 Version 8.0.12 July 2006 • You are prompted to confirm the setting when changing it. Sentry II 8.0 User’s Guide p. 220 Version 8.0.12 July 2006 Sentry II Server Control Center The Sentry II Server Control Center menu items and their operation are described below. These can only be accessed locally when you have direct access to the Sentry II Server computer. These are not accessible remotely, using the IE browser. Server New • Creates a new '.BTC' file, applies the default settings to the current Server and automatically restarts it. • See the Properties menu item below for a description of the default settings. • See the Restart menu item below for a description of restart. Open • Opens an existing '.BTC' file, applies the default settings to the current Server and automatically restarts it. • You are presented with an Open dialogue box where you navigate to select the name of the '.BTC' file to open. • See the Properties menu item below for a description of the default settings. • See the Restart menu item below for a description of restart. Save • Save the Server's current settings. • You are prompted for a file name if the settings were not previously saved; change to the name and folder desired. • The default name is 'default.btc' and the default folder is the BIN folder of the Sentry II install directory. • Use the saved '.BTC' file name as a desktop icon to start the Server. Save As • Save the Server's current settings. • You are prompted for a file name for the settings; change to the name and folder desired. Sentry II 8.0 User’s Guide p. 221 Version 8.0.12 July 2006 • The default name is 'default.btc' and the default folder is the BIN folder of the Sentry II install directory. • Use the saved '.BTC' file name as a desktop icon to start the Server. Restart • Stops the Server and disconnects any active connections to Agents and to Administrators or Analysts, if present. • Restarts the Server and reestablishes its connections. Properties This is the Sentry II Control Center Server property settings sheet. These settings are saved in your named '.BTC' file; the default name is 'default.btc' (See Save and Save As menu items above). • Select the particular property page by clicking on the corresponding tab. • Click the '?' in the upper right-hand corner of the property sheet and move the '?' mouse icon to any field and click again to get additional, detailed help information. General Tab • Information on Sentry II: Version Number, Configuration File Version, Free Memory available, Security state (default is disabled; See Configure Security), Product ID number, and number of Agent Licenses allowed (See Upgrade Licenses on the Help menu item below). Sentry II 8.0 User’s Guide p. 222 Version 8.0.12 July 2006 TCP/IP Ports Tab • Specify HTTP Web Server port number (default 81), for using your IE Browser to connect to the Server for Administrator and Analyst functions. • Specify Data Collection port number (default 82), for delivery of monitor data by the Sentry II Agent. • Specify Database Access port number (default 83), for the WEB interface to the database. • Press corresponding Default button to restore the particular default value. Web Server Tab • Specify use of Default Server Name or define a specific Server Name (or IP address). • Specify Root Directory for location of the Server executable, RpmCCS.exe; press the Default button to restore the default setting. • Specify the Connection Queue Size (default is 255) for maximum number of simultaneous requests for Sentry II Administrator or Analyst function pages. • Set the Enable Logging check box to log to a '.BTL' file, with date, all accesses to Sentry II Administrator or Analyst function pages. Database Tab • Specify Server database names, and optional login and password. • Press the Default button to restore default database name. Automation Tab • Set the Start Agent when Server Loads checkbox to load the Server's own local copy of the Agent when it starts up. • Set the Show Browser as default view when starting server checkbox to have the Server switch to its embedded browser as the startup view (See View menu item). • Set the Launch browser in 'Standalone' mode checkbox to load the stand-alone Internet Explorer and connect to the Server. • Specify the SMTP Server name or IP address for handling the transmission of the Alert Email action (See Administer Alerts). Exit • Stop all connections to any Agents or Administrators/Analysts and exit the Control Center Server. Sentry II 8.0 User’s Guide p. 223 Version 8.0.12 July 2006 View The View menu items Status Bar, Shortcut Bar and Ticker, enable or disable a particular auxiliary display (See immediately below for details). The Server main window always has one of a mutually exclusive view among the choices of Web Details, Browser, and Server Monitor (See below for details). Select from among the view choices to change the view. Status Bar • When checked, displays a status bar at the bottom of the Server window which displays standard IE browser status type messages on the left; and Server specific messages, such as number of current Connections, number of Messages received, and total Server Uptime in hours and minutes. • Hidden when unchecked. Shortcut Bar • When checked, displays an 'Outlook' style menu on the left side of the Server window, with two tabs, Views and Navigate. The Views selections are the same as present on this View menu item (See immediately below), and the Navigate selections are the same as on the Navigate menu item (See below). • Hidden when unchecked. Ticker • When checked, displays a 'marquee' like display, at the bottom of the Server window, above the Status Bar if present; various Server events are displayed here in real-time, such as Alert events (See Administer Alerts). • Hidden when unchecked. Web Details • Displays the Server log of all accesses to Sentry II Administrator or Analyst function pages, in large icon view, when it is the selected Server view. Browser • Displays the Server's embedded IE browser to use locally for accessing the Sentry II Administrator and Analyst functions. Server Monitor • Displays the Server Monitor log, with information on key Server events and actions, including Server and Agent interaction. Sentry II 8.0 User’s Guide p. 224 Version 8.0.12 July 2006 Clear View • Clears the display of the active Server view except the Browser view. Navigate The Navigate menu items apply to the Server Browser view and provide the same basic navigation functions as the standard Internet Explorer. Home • Redisplays the Sentry II Administer and Analyze Introduction page. Refresh • Refreshes the current Sentry II Administer and Analyze page. Stop • Stops the update of the current selected Sentry II Administer and Analyze page. Back • Goes back to the previous Sentry II Administer and Analyze page. Forward • Goes forward to the next Sentry II Administer and Analyze page in the history list. Start Agent • Start the Server's local Agent to provide monitoring of the Server itself. Service Settings... • Choose to run the Sentry II Server as a "service" on NT / 2000 computers. Help About Sentry II • Information on Sentry II: Version Number, Configuration File Version, Free Memory available, Security state (default is disabled; See Configure Security), Product ID number, and number of Agent Licenses allowed (See Upgrade Licenses immediately below). Sentry II 8.0 User’s Guide p. 225 Version 8.0.12 July 2006 Upgrade License • Provides the means to dynamically upgrade the Sentry II Server from an 'Eval' to a fully licensed version (default 5 Agent licenses) as well as adding additional Agent licenses. Sentry II 8.0 User’s Guide p. 226 Version 8.0.12 July 2006 Appendix A – Local SQL Server Database Follow these steps carefully to install and configure for use of a local Microsoft SQL Server database: Installing the Sentry II MDF File on a Local SQL Server Copy the “Sentry II.mdf” file from the “…\Sentry II\Database” folder where Sentry II is installed to the location that you wish the database file to exist. It may be the same directory in which the Sentry II installation program placed the file. However, it simplifies subsequent Sentry II updating if you move the file to the SQL Server folder, usually “C:\Program Files\Microsoft SQL Server\MSSQL\Data” is where this file will reside. You must make sure that the SQL Server is running. This may be determined via the SQL Server Enterprise Manager. Then… 1) Launch the Data Sources (ODBC) configuration utility from: Start->Settings->Control Panel->Administrative Tools 2) Next…Select the ‘System DSN’ tab and press the ‘Add’ button. Sentry II 8.0 User’s Guide p. 227 Version 8.0.12 July 2006 3) Next… Select the ‘SQL Server’ entry from the list box and press the ‘Finish’ button. 4) Next… fill out the information as outlined below. Since you will be running SQL Server on the same machine as the Sentry II Server, you must select (local) from the ‘Server’ dropdown. Sentry II 8.0 User’s Guide p. 228 Version 8.0.12 July 2006 5) Next…make sure this next panel has the same set of options selected. And, click the Client Configuration button and choose “Pipes” as the method Sentry II uses to communicate with the SQL Server. For SQL2000 and later, Sentry II should use the “Shared Memory” option automatically to communicate with SQL Next, fill out the panel below. Edit and type into the “Change the default database to” field to the string “Sentry II”. Although this is a drop-down field, you can edit and type into it. Then, substitute the attached filename with the actual location of the “Sentry II.mdf” file. Sentry II 8.0 User’s Guide p. 229 Version 8.0.12 July 2006 6) Finally…press the ‘Next’ button and complete the remaining panels as appropriate. The last panel provides a means to test the Data Source. Sentry II Security Issues for Accessing SQL Database When Sentry II Server is running as a program after a user login, it accesses the SQL database with the logged-in user’s credentials. When the Sentry II Server is running as a service before user login, it accesses the SQL database with “System” account credentials, or the credentials of the “LogOn” property of the Sentry II Server service. Insure your SQL Server security is configured accordingly to allow the Sentry II Server access based on the credentials it will be using. Sentry II 8.0 User’s Guide p. 230 Version 8.0.12 July 2006 Appendix B – Remote SQL Server Database Follow these steps carefully to install and configure for use of a remote Microsoft SQL Server database: • Locate the file called “Sentry II.mdf”. It is stored in the Database folder under Sentry II (usually C:\Program Files\Sentry II\Database). • Provide a copy of this file to your Database Administrator. • The Database Administrator should place this file in a location where the SQL Server software may gain access. There should be a scheme already in-place. • To add this standalone “Sentry II.mdf” file to the known SQL databases, the ODBC Data Sources utility should be run on the Sentry II Server computer. • Select the 'System DSN' tab. • Now select the 'Add…' button. You will see the following dialog: Sentry II 8.0 User’s Guide p. 231 Version 8.0.12 July 2006 • Select the driver named 'SQL Server' from the list. You may need to scroll down to find this item. Then press the 'Finish' button. • You are presented with the following screen: • Type the information you see above. For the last input area (Server:), select the computer/server that will host this SQL database. Click the 'Next' button. • You will be presented with the following dialog: Sentry II 8.0 User’s Guide p. 232 Version 8.0.12 July 2006 • Sentry II has been tested using 'Windows NT authentication'. Please make sure this first radio button is selected. Then click the Client Configuration button and choose “Pipes”, if possible, as the method Sentry II will use to communicate with the SQL Server. Complete the panel as displayed above. Then press the button labeled 'Next'. This next step will allow for the Sentry II.mdf file to be added to the list of databases within SQL Server. Complete the panel below as displayed. The 'Attach database filename:' input field will obviously vary depending upon the physical location of the “Sentry II.mdf” file. However, usually “C:\Program Files\Microsoft SQL Server\MSSQL\Data” is where this file will reside. It is necessary to change the default database to Sentry II. You can type this into the field. • You are now presented with the final configuration screen. Please confirm that the options displayed match those in the dialog below. Sentry II 8.0 User’s Guide p. 233 Version 8.0.12 July 2006 • Press the 'Finish' button. Notes: 1. We have tested using 'Windows NT authentication'. 2. When completing the rest of the panels, you want to make sure that the 'Sentry II.mdf' file is selected rather than the default 'master'. The 'master' database contains important information about your SQL Server environment that you should not alter during this process. Sentry II Security Issues for Accessing SQL Database When Sentry II Server is running as a program after a user login, it accesses the SQL database with the logged-in user’s credentials. When the Sentry II Server is running as a service before user login, it accesses the SQL database with “System” account credentials, or the credentials of the “LogOn” property of the Sentry II Server service. Insure your SQL Server security is configured accordingly to allow the Sentry II Server access based on the credentials it will be using. Sentry II 8.0 User’s Guide p. 234 Version 8.0.12 July 2006 Appendix C–SQL/ORACLE Requirements Microsoft SQL Server Checking Run the Cliconfg.exe utility on the Sentry II Server computer in order to define to it where the Microsoft SQL Server databases are that you want Sentry II to check with the ServerWatch SQL check. Set the Default Network Library to TCP/IP, and then click the Add button to define the location of one or more SQL Servers to be monitored. Oracle Database Checking Run the Oracle Client Install (version 8i or 9i) to install the Oracle Client software on the Sentry II Server machine. Consult your Oracle documentation. After you run the Oracle Client Installation, you define the available Oracle databases using either ‘Service Naming’ or ‘Oracle Names Servers’. The Oracle database names defined here are what are used in the ORACLE IP Service setup in Configure Servers/Agent & Devices, in the Database parameter field. Sentry II 8.0 User’s Guide p. 235 Version 8.0.12 July 2006 Appendix D–Moving from Access to SQL Server If you want to move your Sentry II database from Access to SQL Server, follow these steps. 1) Stop the Sentry II Server if it is currently running. Use the Windows Services tool to stop the Sentry II Server service if it is running as a service; 2) Use the ‘Data Sources (ODBC)’ to change the ‘BreakoutRPM’ System DSN that points to your current Access database ‘RPM.mdb’ and rename it to ‘BreakoutRPM_MDB’; 3) Start Enterprise Manager, and expand the tree to the databases; find and right-click on the new Sentry II database, and choose "All Tasks->Import Data" and run the "DTS Import Wizard"; 4) The "Source" choice should be "Driver do Microsoft Access (.mdb)"" and the "User/System DSN" choice should be the saved DSN to your original database "BreakoutRPM_MDB"; 5) Click the Next button, and then the "Destination" choice should be "Microsoft OLE DB Provider for SQL Server" and the "Database" choice should be your new Sentry II database, "Sentry II “; 6) Click Next and select the radio button for "Copy tables from the source database"; 7) Click Next and then Select All to select all the tables; you can choose to uncheck the ‘Value’ table and/or the ‘ServicesLog’ table if you want to leave behind your CounterWatch data (Value table) and ServerWatch data (ServicesLog table); 8) Click Next and then check the "Run Immediately" checkbox; then click Next, confirm the "Summary" and then click "Finish", and then "Done". Sentry II 8.0 User’s Guide p. 236 Version 8.0.12 July 2006