GFI Product Manual Manual
http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document.
Contents 1 Introduction 1.1 1.2 1.3 1.4 2 3 5 6 93 Introduction ........................................................................ 93 Creating new folders .............................................................. 94 Configure properties of existing folders ....................................... 95 Deleting folders.................................................................... 95 Moving folders .....................................................................
6.5 7 Global alerting options 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 8 Introduction ...................................................................... Mail server settings ............................................................. Global settings for network alerts ............................................ Global settings for SMS/pager alerts ......................................... In-built GSM SMS Server ........................................................
14.1 14.2 14.3 14.4 14.5 Introduction ...................................................................... Writing a script/function ....................................................... Adding a monitor function written in VBscript .............................. WMI (Windows Management Instrumentation) .............................. ADSI (Active Directory Service Interfaces) ................................... 15 Troubleshooting 15.1 15.2 15.3 15.4 15.5 Index Introduction ...........................
List of screenshots Screenshot 1 - The GFI Network Server Monitor configuration Screenshot 2 - Previous Version Detected Screenshot 3 - Check for latest build Screenshot 4 – Import settings from an older installation Screenshot 5 - User and License key details Screenshot 6- Service Account details Screenshot 7 - Mail Server details Screenshot 8 - Select a database backend Screenshot 9 – Launching the Quick Start Wizard from the Tools Explorer window Screenshot 10 – Specify the OS of the target computer Scre
Screenshot 62 - CPU usage check parameters dialog Screenshot 63 - Directory Size check parameters dialog Screenshot 64 - File size check parameters dialog Screenshot 65 - LDAP Query check parameters dialog Screenshot 66 - Physical Disk check parameters dialog Screenshot 67 - Printer availability check parameters dialog Screenshot 68 – Running Process check parameters dialog Screenshot 69 – Users and Groups check parameters dialog Screenshot 70 - ISA Server check parameters dialog Screenshot 71 - Exchange se
Screenshot 126 - Select authentication method Screenshot 127 - Setting permissions Screenshot 128 - Proxy Server Setup Window Screenshot 129 - Log file setup Window Screenshot 130 - Database Options Screenshot 131 – Ms Access backend properties dialog Screenshot 132 - MSDE/MS SQL Server backend properties dialog Screenshot 133- Users and Groups folders Screenshot 134 - User Properties dialog Screenshot 135 - Working Hours Setup dialog Screenshot 136- Alerts Setup Dialog Screenshot 137- Members of tab Screen
1 Introduction 1.1 Introduction to GFI Network Server Monitor (GFI NSM) GFI Network Server Monitor is a network and server monitoring tool that allows administrators to monitor the network for failures or irregularities automatically.
through a connected GSM phone/modem or using an Email to SMS service, such as Clickatell. GFI Network Server Monitor can also choose the type of alert to be sent depending on the time that an important event (e.g. check failure) occurs and in relation to the working hours specified for the intended recipients.
» Directory size function – Monitors and restricts the size of a specified directory. » File size function – Monitors and restricts the size of specified files. » LDAP Query – Checks the status of LDAP services on target computers. » Physical Disk Condition function –Checks the physical health of disk drives on windows based target computers. » Disk drive function - Monitors the physical status of specified disk drives.
Built-in checks for Linux/Unix OS » Generic Secure Shell (SSH) check – Allows you to create custom monitor functions which can be remotely executed on Unix/Linux based computers through the Secure Shell (SSH) service running on that computer. » File existence function – Checks for the existence of a particular file on Linux/Unix based computers; e.g. results of scheduled batch jobs. » CPU usage function – Checks and restricts processor usage on Linux/Unix based target computers.
» Enumerate Computers function – Searches your network for a list of domains, workgroups and constituent computers. » Enumerate Processes function – Searches for processes running on local or remote computers. » DNS Lookup function – Resolves Domain Names to their corresponding IP address. » Whois function – Looks for information related to a specified domain, or IP address. » Traceroute function – Shows the network path that GFI Network Server Monitor used to reach a target computer.
Monitor. To launch this module go on Start > GFI Network Server Monitor program group > GFI Network Server Monitor configuration. Screenshot 1 - The GFI Network Server Monitor configuration The main GFI Network Server Monitor configuration display is divided into two windows. » Tools Explorer window (left view) – Contains nodes, check folders and tools required for the configuration and running of GFI Network Server Monitor.
2 Installing GFI Network Server Monitor 2.1 System requirements 2.1.1 Supported operating systems(x86 or x64) » Windows 2008 (R1 and R2) – Standard, Enterprise » Windows 2003 – Standard, Enterprise » Windows 2000 – Professional, Server, Advanced Server » Windows 7 - Standard, Professional, Enterprise » Windows Vista – Enterprise, Business, Ultimate » Windows XP – Professional » SBS 2008 » SBS 2003 2.1.2 Other components » Internet Explorer 5.5 (SP2) or later » .NET framework 1.
Screenshot 2 - Previous Version Detected 3. The Installation Wizard starts by checking if you have previous versions of GFI Network Server Monitor installed on your computer. Specify if you want to keep any previous installation detected or instruct the wizard to uninstall it for you. Screenshot 3 - Check for latest build 4.
Screenshot 4 – Import settings from an older installation The following stage is required only if GFI Network Server Monitor 6 or higher have been previously installed on your computer. 5. Choose whether you want to import configuration settings from an existing installation or else continue with a new (clean) installation. Click on „Next‟ to continue.
Screenshot 5 - User and License key details The following stage is only required during a new (clean) installation. 6. Specify the full user name, the company name and the license key. If you are evaluating the product, leave the evaluation key as default (i.e. “Evaluation”). Click on „Next‟ to continue.
Screenshot 6- Service Account details 7. Specify a service account for GFI Network Server Monitor. The GFI Network Server Monitor service must run with administrator credentials. It is recommended to provide a Domain Admin or Enterprise Admin account, because GFI Network Server Monitor will most likely need administrative rights to access the servers on your domain.
The following stage is only required during a new (clean) installation. 8. Specify the SMTP/mail server details (Hostname/IP and Port) as well as the email address where generic alerts will be sent. Click on „Next‟ to continue. You can define separate email alert addresses for each check from the check properties during configuration. You can verify your settings by sending a test message. Do this by clicking on „Verify Mail Settings‟. Screenshot 8 - Select a database backend 9.
When using Windows NT authentication, ensure that the GFI Network Server Monitor services are running under user accounts which can access the SQL Server databases. 11. Specify the installation path for GFI Network Server Monitor and click on „Next‟. The installation will need approximately 30 MB of free disk space. 12. Click on „Finish‟ to finalize the installation and launch GFI Network Server Monitor. 2.
3 Configuring GFI Network Server Monitor 3.1 Getting started with GFI Network Server Monitor All configuration settings for GFI Network Server Monitor are carried out from GFI Network Server Monitor configuration. Launch this configuration program from Start > GFI Network Server Monitor program group > GFI Network Server Monitor configuration. Introduction to monitor checks Monitoring checks are tests which verify the condition of specified computers and services on your network.
Screenshot 10 – Specify the OS of the target computer 2. Select the operating system installed on your target computer(s). Screenshot 11 – Specify the services provided by the target computer 3. Based on the operating system selection, GFI Network Server Monitor brings up a set of applicable roles for that operating system. Select any additional roles that the target computer(s) have within your network. Click on Next to continue.
Screenshot 12 – Specify additional applications that require monitoring 4. Select any additional important service applications installed on the target computer(s).
5. Specify the target computer(s) on your network which fit the options you selected (operating system / roles / applications). Click on next to continue. TIP: Use the 'Select' button to choose from a list of computers detected to be running on your network. TIP: Use the „Import‟ button to load the list of target computer name(s) from a text file (plain text file containing one computer name per line). 6. Click on „Finish‟.
Screenshot 15 - ICMP/Ping check properties dialog 3. Configure the parameters to be used by the selected check. Click on 'Next' to continue. The ICMP/Ping check requires the following parameters: » Make sure you…..ping the target computer – Specify whether the ping will succeed or fail if a ping reply is received. » Number of Echo requests to send – Specify the number of consecutive pings to be sent (e.g.
Screenshot 16 – The Select Computer(s) dialog 4. Select the target computer(s) to ping. TIP 1: You can also enumerate target computers by clicking on ‘Select’. This will open a dialog from where you can choose the required target computer(s). TIP 2: You can import the list of target computers from a text file using the ‘Import’ button. However make sure that the text file is in plain text. 5. Optionally, you can specify a short description for the new check(s) to be created. 6.
Logon credentials Some type of checks (e.g., IMAP, POP3) may require alternative logon credentials to the ones used to log on to the target computer. When applicable you will be asked to confirm or specify alternative logon credentials to be used for that check. Screenshot 17 - Logon Credentials dialog As an example, the IMAP Mailserver check uses logon credentials to connect to the mailserver and check its availability.
Screenshot 18 – The Select Target folder dialog Refer to 'Configuring Monitor Functions' chapter for more information on the type of checks supported by GFI Network Server Monitor. 3.4 Configure monitor check properties About monitor check properties Monitoring checks require parameters which define their performance. (E.g. the „Scan Frequency‟ defines the time interval between consecutive runs of a monitoring check).
3.4.1 Configure general parameters Screenshot 19 - Check properties dialog To specify the general parameters of a monitor check (e.g., Check Name and Target Computer): 1. Right click on the check to be configured and select „Properties‟. By default the check properties dialog will open in the „General‟ tab. 2. Specify the following parameters: » Check details – The monitoring check name (e.g. „Fileserver Availability Check‟) and relative function description (e.g.
3.4.2 Configure check (functional) parameters The check functional parameters are the test settings that define the role of a monitoring check (i.e., each type of monitoring check requires its own configuration settings and parameters). For further information on functional parameter setups, please refer to the Configuring monitor functions chapter in this manual. Example: Configuring the functional parameters of a File Existence check. GFI Network Server Monitor can check for the existence of a file.
Computers running on Linux and Unix may require reference to a certificate authentication (private key) file instead of the logon password. The certificate authentication file is often required by the SSH module for authentication by Linux/Unix computers. By default, GFI Network Server Monitor uses the same security context account used by the GFI Network Server Monitor engine. Screenshot 21 - Logon Credentials Setup Dialog To setup alternative or certificate authentication credentials: 1.
Alerts and actions Screenshot 22 - Actions Setup dialog Actions refer to the activities which follow the occurrence of an important event, i.e., what happens when a monitoring check meets a specified condition. GFI Network Server Monitor supports the following actions: » Alerts – Send messages to inform the recipient(s) of the event(s). » Run an external file – Launch an executable, batch or VBScript file when a particular check fails.
Screenshot 23- Alerts Setup Dialog These alerts can be sent in two situations: » When a monitoring check fails – after a configurable number of errors, the monitor check is considered as failed. » When a monitoring check has recovered from the „Failed‟ state – since GFI Network Server Monitor can recover a server/device, it can be useful to send an alert to the operator to inform him/her that the previous error is no longer present.
uses the modem to dial in to the SMSC provider and deliver the actual SMS message(s); most countries have one or more SMSC service providers. When an SMS alert is to be sent via a webbased SMS gateway, GFI Network Server Monitor generates an email containing all the alert details. This email is then sent to the web-based SMS gateway where it is converted to an SMS and forwarded to the intended recipient. 3.4.4 Configure alert parameters Screenshot 24 - Actions dialog with Inherit options enabled 1.
Screenshot 25 - Alerts setup dialog 3. Choose the event for which alerts must be sent: » Select „When the check fails:‟ option to send alerts whenever this check fails. » Select „When the check recovers from a failed state‟ option to send alerts when the monitoring check recovers from a failed state. 4. Select the type of alert to be sent (e.g., click on the „Send an email to:‟ option to send email alerts whenever this check fails). Screenshot 26 – Configuring alert recipients 5.
Select the „Once every …… minutes as long as the check continues failing’ option, ONLY if this alert is to be sent more than once during the time that this check is in a failed state. In this case specify the time interval (in minutes) required between each alert sent. (e.g., To send an alert every 10 minutes, select this option and enter „10‟ in the time interval to make it read „„Once every 10 minutes as long as the check continues failing’). 6. Click on „Apply‟ to accept the current configuration. 3.4.
Screenshot 28 - File parameters dialog If the file requires any parameters you can still pass them on the command line. You can also pass such parameters through GFI Network Server Monitor, by specifying them in the „Parameters to pass to the file‟ field. You can pass parameters in plain text as well as through variables like <%Date%> and <%CHECK_RESULT%>. These variables are then substituted to values when the program or script is launched.
3.4.6 Restart computers/services after an alert is triggered Screenshot 29 - Services / Computer restart setup dialog GFI Network Server Monitor can be set to remotely reboot a computer or restart specific services whenever a monitoring check fails (e.g. if you can‟t reach an IIS web server in your LAN, you can restart the W3SVC service). Configure this action as follows: 1. Right click on the check to be configured and select „Properties‟.
E.g., If you access the Internet through a Proxy Server, an ICMP Ping dependency check can be set to check the availability of the Proxy Server, before executing HTTP/HTTPS monitoring checks. If the dependency check fails, the HTTP/HTTPS check will not be run but will be classified as a „Failure by Dependee‟. For further information on check status classification, please refer to the „Check State Indicators‟ section in the „Monitoring check status‟ chapter.
Screenshot 31 – List of available checks TIP: Multiple check selections are possible by holding down the „CTRL‟ or „SHIFT‟ keyboard buttons. 4. Click on „Apply‟ to accept the current configuration. 3.4.8 Define maintenance schedules Maintenance parameters define the times during which monitoring check(s) are not executed i.e., during maintenance schedules.
Screenshot 32 - Maintenance schedule Dialog To set up maintenance schedules: 1. Right click on the check to be configured and select „Properties‟. By default the check properties dialog will open in the „General‟ tab. 2. Click on the „Maintenance‟ Tab. If the „Inherit maintenance times parameters from Parent folder’ option is selected, unselect it and specify the operational/maintenance periods for the target computer being monitored. e.g.
All properties except for the „Check details‟ and „Check (functional) Parameters‟ can be inherited from a parent folder. These include Scan Frequency, Logon credentials, Alerts, and Maintenance parameters among others. For further information on parent folders, please refer to the „Check folders‟ chapter in this manual. 3.5.1 How to set a folder to inherit properties from a parent folder For a folder to inherit properties from a parent folder, select the ‘Inherit …….
3.6 Enable or disable checks Screenshot 34 – Check Status display and relative options GFI Network Server Monitor allows you to enable/disable existing monitoring checks. The icon on the left of the check details will indicate its state: - Monitoring check enabled. - Monitoring check disabled To enable a monitoring check: Right click on the monitoring check and select 'Enable'. To disable a monitoring check: Right click on the monitoring check and select 'Disable'. 3.
When running a check through the 'Monitor Now…' utility, no alerts or actions are triggered whenever a check fails. 3.8 Move checks between existing folders To move checks from one folder to another: 1. Select the check(s), right click on the selection and select „Cut‟. 2. Right click on the destination folder and select 'Paste'. 3.9 Copy checks from/to existing folders To copy checks from one folder to another: 1. Select the check(s), right click on the selection and select „Copy‟. 2.
4 Configuring monitor functions 4.1 Introduction As soon as the new check wizard is triggered, you must select the required monitor function from the extensive list of built-in functions included in GFI Network Server Monitor. This chapter explains how to configure each built-in function as well as how to create custom monitor functions using VB Scripts. GFI Network Server Monitor groups monitor functions according to their respective role. 4.
An HTTP/HTTPs function requires the following parameters: » URL:http(s):// – Specify the location of the HTTP/HTTPS site in URL format (i.e. http://server[:port]/path/... format). » Use server verification (https) for this site – Enable, this flag when logon credentials are required to access the target site. » Check for availability only – Enable this option to check ONLY for the availability of a target site.
GFI Network Server Monitor can be configured to go through a proxy server as well as to pass access credentials to the specified FTP site should authentication be required. » An FTP monitor function requires the following parameters: » URL:ftp(s):// – Specify the location of the ftp site in URL format (i.e. ftp://server[:port]/path/... format). » Use FTP site authentication – Enable this flag when logon credentials are required to access the specified FTP site.
» Requires an encrypted connection (SSL) – Select this option if you want to encrypt the data during transmission. » Login to mailbox – Select this option if you want to physically check whether a mailbox on your mail server can be logged on to. » Mail count in folder - Select this option if you want the check to fail/succeed based on the number of emails present in a folder on the IMAP server. In addition, you must specify the: IMAP folder name (e.g.
Screenshot 39 - NNTP Server check parameters dialog An NNTP news server availability function requires the following parameters: » Port – Specify the TCP port number to be used when connecting to NNTP news server. (NNTP Default port is 119). » Send command when connected – Enable this flag to send a specified command as soon as the connection is established. » Response must include the following string – Enable this flag in order to check if the response message contains a specified string.
» Port – Specify the TCP port to be used when connecting to the POP3 mail server (POP3 Default port is 110). » Timeout – Specify the connection timeout in milliseconds. The check will fail if a connection is not established before the specified timeout elapses. » Requires an encrypted connection (SSL) – Select this option if you want to encrypted the transmission (i.e. establish a secure session by electronically authenticating each end of an encrypted transmission).
Screenshot 41 - SMTP server check parameters dialog The SMTP Mailserver check requires the following parameters: » Port – Specify the TCP port to be used when connecting to the SMTP mail server (SMTP Default port is 25). » Timeout – Specify the connection timeout in milliseconds. The check will fail if a connection is not established before the specified timeout elapses. » Requires an encrypted connection (SSL) – Select this option if you want to encrypted the transmission (i.e.
GFI Network Server Monitor uses NTP to check the availability of internal and external time sources. Screenshot 42- NTP Time server check parameters dialog The NTP function requires NO parameters. 4.2.8 DNS server check The DNS server check can read a specific „record‟ type on a DNS server and then compare it to a specified (expected result) value.
Screenshot 43 - DNS server check parameters dialog The DNS server check requires the following parameters: » Type of record – Specify the record type which needs to be defined by the DNS server. This can be an A record or any other record type present in the drop down list. » Host/Domain Name to query – Specify the hostname or domain that you wish to resolve (E.g., www.google.com). » Record values – Specify the expected return value(s).
Although local hosts should normally respond to ping requests within milliseconds, an ICMP timeout failure doesn't necessarily mean that the remote host is actually functioning beyond its ability to echo packets. Screenshot 44 - ICMP/Ping check parameters dialog The ICMP/Ping function requires the following parameters: » Make sure you…..ping the target computer – Select „Can‟ to specify that the check is successful if the server replies to the ping.
Screenshot 45 - TCP/IP check parameters dialog A TCP/IP check requires the following parameters: » Port – Specify the TCP port number of the protocol to be checked, by default port 80. » Send command when connected – Enable this flag to send the specified command as soon as the connection is established. » Response must include the following string – Enable this flag in order to check if the response message contains the specified string.
4.2.11 Email Route check Figure 1 – Email Route check operation The Email Route check verifies if your email services are working properly; it does so by sending a physical email through a target SMTP server and checking for the arrival of the test email in a mailbox on a target POP3 Server.
» The sender‟s and recipient‟s email address. For more information on how to configure these parameters refer to the „Configuring the sender‟s and recipient‟s email address‟ section. » The SMTP server through which the test email will be sent (i.e., the SMTP server to be checked). For more information on how to configure these parameters, refer to the „Configuring the SMTP Server details‟ section below. » The POP3/IMAP server through which the test email will be delivered (i.e.
Configuring the sender’s and recipient’s email address Screenshot 47 - The test email details dialog Click on the „Configure‟ button of the relevant section to specify the following parameters: » From – Specify the sender‟s email address (i.e., the email account from where the test email will be sent). » To – Specify the recipient‟s email address (i.e., the email account where the test email will be sent). » Subject – (Optional) Specify the text to be included in the subject field of the test email.
4.2.12 Configuring the SMTP Server details Screenshot 48 - SMTP Server configuration dialog Click on the „Configure‟ button of the relevant section to specify the following parameters: The „Host name/IP‟ parameter contains the details of the SMTP Server to which the connection will be established. This parameter cannot be changed and it is configured to acquire its value from the %CHECK_TARGET% variable. This variable takes its value directly from the Target Computer field in the Check properties.
» Use the following credentials – Select this option to specify the additional credentials to be used for authentication (i.e. User name and password). The New Check Wizard automatically prompts you to configure alternative credentials during the creation of this check. After the check has been created, you can make changes to alternative credentials from the check properties dialog > „Logon Credentials‟ tab.
» Port – Specify the TCP port through which the connection will be established. By default this parameter is set according to the value selected in the „Type‟ field (i.e., 995 if POP3 is selected, 993 if IMAP is selected in the „Type‟ field). However, you can still specify other port numbers by inputting them directly in the provided field. » Timeout – Specify the connection timeout value. This value defines the time interval required for a connection to take place.
Screenshot 50 - SNMP check parameters dialog The SNMP (Simple Network Management Protocol) GET message allows the Network Monitor Engine to request information about a specific variable on a remote computer or device. Upon receiving a GET message, the agent will issue GFI Network Server Monitor Engine a GETRESPONSE message containing either the information requested or an error indicating why the request cannot be processed.
Screenshot 51 - VBscript check parameters dialog A VBScript function requires the following parameters: » Script location – Specify the path to the required VBScript file. The script should contain the function specified in the Function name field and should return True (-1) in case of success, or False (0) in case of an error. » Function name – Specify the function that GFI Network Server Monitor service will be calling from the specified script file.
Strings must always be specified within double quotes (“”) e.g. “Mail Server”. You may make changes to the selected script file by clicking on the „Edit script …‟ button. The “Generic Secure Shell (SSH) Check” requires logon credentials (i.e. username and password or Private Key file) to connect (authenticate) and run SSH scripts on a remote Unix-based target computer. These credentials must be specified from the „Logon Credentials‟ tab available in the properties of the relative check.
Screenshot 54 - Performance Counter - Object Selection Dialog 1. Specify the target computer containing the object/performance counters that need to be shown by selecting one of the following options: » Select ‘this computer‟ to use the performance counters available on the target computer. » Select „another computer‟ and specify the computer name to use performance counters available on another computer. 2. Select from the available dropdown list, the Object to be checked. (e.g.
Screenshot 55 - Command Line Output check parameters dialog The parameters required for this function are: » Run the file at location – Specify the complete path to the command line tool file which must be executed (e.g.C:\Windows\System32\Ping.exe). » With the following parameters – Specify additional parameters required by the specified tool (e.g. the IP address / name of host to which the ping will be sent).
Screenshot 56 - Process Properties check parameters dialog The parameters required for this function include: » Check that the…. – Select the system resource that will be checked from the dropdown list. » Used by the process – Specify the name of the process to be checked. » Operand – Select the operand and specify the value to be compared with the result. 4.5 Windows operating system checks 4.5.
Screenshot 57 - Event log check parameters dialog It can also look for specific patterns in the description of an event as well as notify the system administrator if one of the events occurred within a specific period of time (e.g. You can check if a message from your antivirus software has been posted in the Application Event Log during the last 30 minutes. An Event Log function requires the following parameters: » Query the following event Log – Select the log File to be checked, from the dropdown list.
Use (*) wildcard to indicate all/any criteria. 4.5.2 File Existence GFI Network Server Monitor can check for the existence of a particular file on a target computer as well as search its contents for particular strings. This is particularly convenient when checking for results of scheduled batch jobs and other logging information.
Screenshot 59 - Disk space check parameters dialog A Disk Space function requires the following parameters: » Check that the Drive… – Select the disk drive to be checked. » Does not use more than the following hard disk space – Enable this option and specify the maximum disk space that can be used. The monitoring check will fail if the specified disk limit is exceeded.
Screenshot 60 - Services check parameters dialog A Service monitor function requires the following parameters: » With internal name – Enable this option to check for services having an internal identification / name identical to the string specified in the NAME field. The Internal identification is the „Service Name‟ displayed in the General dialog of the service properties.
4.5.5 CPU Usage This monitor function requires WMI to be installed on the computer running GFI Network Server Monitor as well as on the computer being monitored. The monitor function will create a VBscript which uses WMI with the parameters you specify in the check parameters dialog. WMI is only available on Windows 2000 and higher computers, therefore this monitor function can only be used if both the GFI Network Server Monitor computer and the computer to be monitored are running Windows 2000 or higher.
Screenshot 63 - Directory Size check parameters dialog The Directory Size function requires the following parameters: » Directory Name – Specify the path to the folder/directory in UNC format (e.g. \\server01\public\docs) which needs to be monitored. » Directory size limit – Specify the maximum size in KB, MB or GB allowed for this directory. 4.5.7 File Size GFI Network Server Monitor can check for the size of particular files on local and remote computers.
Screenshot 64 - File size check parameters dialog The file size function requires the following parameters: » File name – Specify the path to the file in UNC format (e.g. \\server01\public\docs.txt) which needs to be monitored. » File size limit – Specify the maximum size in KB, MB or GB allowed for this file. 4.5.8 LDAP query GFI Network server monitor can verify if LDAP Services are available on target computers by querying the rootDSE for the relative information.
Screenshot 65 - LDAP Query check parameters dialog No Setup parameters are required for this check. 4.5.9 Physical disk conditions check This monitor function requires WMI to be installed on the computer running GFI Network Server Monitor as well as on the computer being monitored. GFI Network server monitor can check the physical condition of the disk drives mounted on computers running windows operating systems.
Screenshot 66 - Physical Disk check parameters dialog No parameters are required for this function. 4.5.10 Printer availability GFI Network Server Monitor monitors the availability of network printers by checking their status definition. Supported status definitions include 'Running', 'In Test', 'Power Off', 'Offline', and 'Power Save'. If the Printer Status is not equal to „Running’ or „Power Save’, then GFI Network Server Monitor will consider this printer as being down.
Screenshot 67 - Printer availability check parameters dialog The Printer Availability rule requires the following parameter: » Printer name – Specify the name of the network printer to be monitored. Specify the same printer name used on the network (e.g. HP4P_onJMPC). 4.5.11 Process Running This monitor function requires WMI to be installed on the computer running GFI Network Server Monitor as well as on the computer being monitored.
Screenshot 68 – Running Process check parameters dialog A Process monitor rule requires the following parameter: » Process – Specify the module name of the process which needs to be monitored. For instance: alerter.exe, or explorer.exe. 4.5.12 Users and Group membership This monitor function requires WMI to be installed on the computer running GFI Network Server Monitor as well as on the computer being monitored.
Screenshot 69 – Users and Groups check parameters dialog The User and Groups membership function requires the following parameters: » Domain – Specify the name of the domain in which the group is present (e.g. GFIMALTA). » Group – Specify the name of the group to be checked (e.g. Domain Admins group) » Allowed members – Specify the name of the members that are allowed in this group. Separate each member by commas (e.g. JasonM, NickG, AndreM) 4.6 Windows applications checks 4.6.
Screenshot 70 - ISA Server check parameters dialog The parameters required are: 1. Specify the ISA Server version installed on the target computer. » 2000 – Enable this option, if your target computer has ISA server 2000 installed. » 2004 – Enable this option, if your target computer has ISA server 2004 installed. 2. Enable „Integrated / Firewall’ or ‘Cache’ option to specify the operation mode of the ISA Server installed on the target computer.
Screenshot 71 - Exchange server check parameters dialog The Exchange server check requires the following parameters: 1. Specify the MS Exchange Server version installed on the target computer(s): » Exchange 2000 – Enable this option if the target computer is running Exchange server 2000. » Exchange 2003 – Enable this option if the target computer is running Exchange server 2003. 4.6.
Screenshot 72 - MS SQL/ADO check parameters dialog An MS SQL / ADO function requires the following parameters: » ADO Connection String – Specify the ADO connection string which will be used to connect to the SQL Server/Data source. » Query – Specify the SQL Query which will be triggered when connection is established. For more information on SQL/ADO connections strings, please visit http://www.connectionstrings.com 4.7 Windows OS databases checks 4.7.
Screenshot 73 - ODBC administrator with sample database configured A system DSN entry is setup as follows 1. Go to Administrative tools > Data Sources (ODBC) to launch the ODBC administrator. 2. Click on the „System DSN‟ tab then click on „Add‟. It is important that you select „System DSN‟ and not „User DSN‟ otherwise the service will not have access to the data source/database. Screenshot 74 - ODBC setup with sample database 3. Select a database driver suitable for the database you wish to monitor (e.g.
Screenshot 75 - Generic ODBC properties The ODBC check requires the following parameter: » 4.8 ODBC DSN name - Specify the ODBC data source name (e.g. Northwind). Terminal Services checks 4.8.1 Terminal Services Port Check GFI Network Server Monitor can check if Local or Remote servers have their terminal services port enabled. This is done by establishing a handshake connection on the remote TCP port (by default port 3389) of the target computer.
Screenshot 76 – Terminal Services: Port Check parameters dialog A Terminal Services check requires the following parameters: » Port – Specify the TCP port number which will be used for communicating with a target computer. The default TCP port is 3389. » Send command when connected – Enable this option to send the specified command as soon as connection is established. » Response must include the following string – Enable this option and specify the string which must be present in the response.
Screenshot 77 – Terminal Services: Physical Logon check parameters dialog The parameters required by this function are: » RDP File – Specify path were the Remote Desktop Protocol (RDP) file is located (e.g. C:\Documents and Settings\\Recent\default.rdp). » Timeout – Specify the number of milliseconds before the function times out. Usually, a connection to the server is established within 1 second. However, some slow/busy servers need more time.
Screenshot 78 - SSH check parameters dialog A Generic SSH Script Check requires the following parameters: » Script file – Specify the path to the SSH script file which will be used by the monitoring check to test the specified target computer(s). Screenshot 79 - The parameters dialog » Arguments – In the arguments list, specify any additional parameters required by this function.
The “Generic Secure Shell (SSH) Check” requires logon credentials (i.e. username and password or Private Key file) to connect (authenticate) and run SSH scripts on a remote Unix-based target computer. These credentials must be specified from the „Logon Credentials‟ tab available in the properties of the relative check. For more information on logon credentials, please refer to the „Logon credentials‟ section in the „Configuring GFI Network Server Monitor‟ chapter. 4.10 Linux/Unix Operating System Checks 4.
» File must contain …string – Enable this flag and specify the string to be searched for in the existing file contents. In this case the check will succeed only if the file exists and the specified string is present in the file contents. 4.10.2 CPU usage Check GFI Network Server Monitor can monitor the CPU usage of a target computer running on Linux / Unix.
Screenshot 82 – Directory/folder Size setup window A Directory Size function requires the following parameters: » Directory Name – Specify the path to the directory to be monitored (e.g. /user/personal). » Directory size – Specify the maximum size (in KB, MB or GB) allowed for this directory. 4.10.4 File size Check GFI Network Server Monitor can check the size of files on target computers running on Linux/Unix.
Screenshot 83 - File size check parameters dialog The File Size function requires the following parameters: » File name – Specify the complete path to the file which needs to be monitored (e.g. /data/sys_log). » File size limit – Specify the maximum size (in KB, MB or GB) allowed for this file. 4.10.5 Printer availability Check GFI Network Server Monitor can check for the availability of network printers connected to target computers running on Linux / Unix.
Screenshot 84 - Printer check parameters dialog GFI Network Server Monitor uses a Linux shell script, via SSH, to determine printer availability. A Printer Availability check requires the following parameters: » Printer name – Specify the name of the printer to be monitored. 4.10.6 Process Running Check GFI Network Server Monitor enables you to check processes on local and remote target computers running on Linux/Unix. If a process is active, then the target computer is considered to be available.
Screenshot 85 –Running Process check parameters dialog A process check requires the following parameter: » Process – Specify the name of the process to be monitored (e.g. init). 4.10.7 Users and groups membership Check GFI Network Server Monitor inspects groups and group membership against intruders which could pose a vulnerability threat to your network system (e.g. Intruders in Domain Administrators group can give themselves administrative rights).
Screenshot 86 – Users and Groups check parameters dialog The User/Group membership function requires the following parameters: » Group – Specify the name of the group to be checked against intruders. » Allowed members – Specify the list of authorized members in the specified group. Separate each member by a comma (e.g. JasonM, NickG, AndreM). 4.10.
Screenshot 87 - Disk Partition check parameters dialog The parameters required by this function are:» Partition label – Specify the identification name of the disk partition to be checked. 4.10.9 Disk Space Check GFI Network Server Monitor can check for available free or used disk space information on local and remote target computers running on Linux/Unix. Alerts can be sent when the used or free space exceeds a specified limit.
Screenshot 88 - Disk Space check parameters dialog. A Disk Space function requires the following parameters: » Check that the Drive – Specify the drive to be checked. » Does not use more than the following hard disk space – Enable this option and specify the maximum disk space (in KB, MB or GB) allowed for use on this particular drive, i.e. the check will fail if the used disk space exceeds the specified value.
Screenshot 89 - Daemon check properties dialog The Daemons check requires the following parameters: » Name – Specify the name of the daemon that you wish to check (e.g. lpd). » State – Specify whether this check should verify if the daemon is running or stopped.
5 Check folders 5.1 Introduction In GFI Network Server Monitor, all checks are organised into folders. Folders have properties such as alerts, dependencies and maintenance parameters that are inherited by the checks contained in those folders. This way, it is easy to change an alert or dependency for a whole group of checks from a centralized point. By default, a check inherits properties from the parent folder; however, you can override this setting for individual checks if necessary.
Folders with the same name cannot exist on the same level. This means that you can have folders with the same name but only if they are located within separate parent folders. 5.2 Creating new folders To create a folder: 1. Right click on the destination (i.e., where you wish to create the new folder), then select New > Folder. For example, to create a folder within another folder called ZONE1, right click on ZONE1, then go on New > Folder.
Example: Configuring the target computer parameter 1. Right click on the folder to be configured and select properties.. By default the check properties dialog will open up in the „General‟ tab. 2. Specify the target computer name or IP address (e.g. TMJASON or 192.168.1.100) in the „Target‟ section. 3. Click on „OK‟ to accept the configuration settings and exit the folder properties dialog. 5.
3. Click on „Find Next‟ to start the search. The Find Folder tool will identify and highlight every occurrence matching the specified string. Keep clicking on „Find Next‟ until you locate the required folder. 4. To stop the search, click on „Close‟.
6 Monitoring checks status 6.1 Introduction You can view the current state of monitoring checks in three ways: 1. From the GFI Network Server Monitor configuration, by clicking on the „Monitoring Check Status‟ node. For more information, refer to the „Viewing the state of checks from the GFI N.S.M. configuration‟ section in this chapter. 2. From a dedicated application called GFI N.S.M. 7 Activity Monitor.
The icon on the left-hand-side of listed checks indicates the relative check status. For more information on these icons, refer to the „Check State Indicators‟ section in this chapter. The Status Monitor home page also includes a list of all the folders present in GFI Network Server Monitor. This list is displayed at the bottom of the page. Screenshot 94 – The Folder contents page To view the status of the checks contained in a folder, click on the folder name.
Viewing all the checks Screenshot 95 - All checks page To view the status of all checks in GFI Network Server Monitor, click on the „Status – All checks‟ link located at the top of the Status Monitor home page. This will display a list of all the checks, grouped under their respective folder. Screenshot 96 - Nested Folders You can expand or collapse the contents of a folder by clicking on or respectively.
6.3 Viewing the state of checks from the GFI N.S.M. Activity Monitor GFI Network Server Monitor ships with an Activity Monitor which enables you to view the status of the monitoring engine and monitoring checks. This activity monitor is automatically installed with GFI Network Server Monitor and thus it can only be used from the computer where this software is installed. To launch the Activity Monitor, go on Start > Programs > GFI Network Server Monitor 7 > GFI N.S.M. 7 Activity Monitor.
down included at the top of the dialog. For example, to see all of monitoring checks which are configured in GFI Network Server Monitor irrespective of which folder they are contained in, select “(All folders)” from the available drop down list. 6.4 Viewing the state of checks from a web browser GFI Network Server Monitor also ships with a remote web monitor. This allows you to remotely view the status of checks via Internet Explorer over a network or Internet.
Mobile device view Screenshot 100 – Monitoring checks status view for mobile devices The „Mobile device‟ view displays information in a layout suitable for viewing on small displays. Such displays are commonly found on small portable devices, for instance mobile phones and PDAs. To inspect your network status in „Mobile device‟ view, open your Internet Explorer and type in the following URL: http://:11695/mobile.
6.5 Check state indicators Check state indicators are images which graphically define the current state of your monitoring checks. The following is a list of states which any monitoring check can have: » Queued – Check is waiting to be processed. » Success – Check successful. » Failure – Check not successful/failed. A check is not marked as failed on the first unsuccessful result. At first, the check is placed under a 'Pending Failure' state.
7 Global alerting options 7.1 Introduction Screenshot 101 - ‘Alerting Options’ node The „Alerting Options‟ node contains the general alerting parameters required by GFI Network Server Monitor for sending Email, Network and SMS/Pager alerts. From this node you can: » Specify which mail servers can be used to send email alerts. In addition you can format and define the contents of the email message. » Specify SMS/Pager settings and format the message to be used when sending SMS/Pager alerts.
Screenshot 102 – Email Alerts configuration dialog By default, the server at the top of the mail servers list has the highest priority and is used to send email alerts. If this server is not available, GFI Network Server Monitor automatically switches to the next mail server in the list. This continues until an available mail server is found and the email alert is successfully sent. Sort the mail servers list in ascending order of priority.
Screenshot 103 - Mail server propertiesdialog 2. Click on „Add‟ and specify the following parameters in the Mail server properties dialog: » Hostname/IP - Specify the Hostname (e.g. Mailserver) or IP address (e.g. 192.168.1.200) of the Mail server to be used. » Port - Specify the TCP communication port to be used for the transmission.
1. Right click on the „Alerting Options‟ node and select „Properties‟. The alerting properties will open by default in the Email Alerts configuration dialog (i.e., Email tab). 2. Click on „Edit‟ and make the required configuration changes. For more details on mail server configuration, refer to the „Adding a mail server‟ section in this chapter. Formatting the email message The alert message can contain manually inputted text (e.g., Alert by NSM), text from system variables (e.g.
Explanation: %CHECK_EXPLANATION% - Details on the result of the executed check. » Format – Define the message format by selecting one of the following: Plain text – Send the email in plain text. Rich text – Send the email in HTML. For more information on variables and message templates, please refer to the „Message Template‟ section in this chapter. 7.3 Global settings for network alerts GFI Network Server Monitor makes use of „net send‟ to send network alerts.
3. Make the required changes to the message. The formatting of this message is identical to that of the email message. 4. Click on „OK‟ to accept these changes. For more information on variables and message templates, please refer to the „Message Template‟ section in this chapter. 7.4 Global settings for SMS/pager alerts This section is only applicable for advanced users. We cannot guarantee that GFI Network Server Monitor will work with any SMS provider.
7.5 In-built GSM SMS Server Figure 2 - SMS alert flow via the in-built GSM Server The in-built GSM SMS Server allows GFI Network Server Monitor to directly send SMS (text) messages through a GSM phone or GSM modem, connected to the computer by serial cable, Infrared or Bluetooth. Screenshot 107 – The in-built GSM SMS Server properties Requirements 1. A GSM modem or GSM phone that is capable of processing AT+C commands. This GSM device must be connected to the server running GFI Network Server Monitor.
1. Right Click on the „Alerting Options‟ node and select „Properties‟. 2. Click on the „SMS‟ tab and from the SMS System dropdown, select „In-built GSM SMS Server‟. Screenshot 108 - Edit Property dialog 3. Double click on the property which you want to configure (e.g., Service Center Number) and specify the necessary parameters in the Edit Property dialog. When configuring properties, always specify the details supplied to you by your SMSC provider.
7.6 GFI FAXmaker SMS service provider template Figure 3 - SMS alert flow via GFI FAXmaker SMS service provider The GFI FAXmaker SMS Service allows GFI Network Server Monitor to send SMS messages through GFI FAXmaker, market-leading fax server software that allows you to send and receive faxes via your email infrastructure. GFI FAXmaker is also an SMS gateway which allows you to send SMS messages through: » A GSM phone / modem connected to your fax server. Or » Web-based SMS service providers.
Requirements In order to use the FAXmaker SMS service, you must have: 1. GFI FAXmaker installed and configured for SMS messaging. For more information on how to configure the SMS gateway on GFI FAXmaker refer to „The SMS Gateway‟ chapter of the GFI FAXmaker manual. You can download the GFI FAXmaker manual from http://www.gfi.com/downloads/downloads.aspx?pid=FAX&lid=en 2. A supported GSM phone/modem connected to the GFI FAXmaker fax server computer or a subscription to a supported web-based SMS provider.
The Clickatell Email2SMS Service allows GFI Network Server Monitor to relay SMS (text) alerts via Clickatell, a web-based SMS service which sends SMS messages worldwide. Whenever an event triggers an SMS alert, GFI Network Server Monitor sends a “template” email (via SMTP) to Clickatell‟s SMS gateway. This template email contains all the required SMS alert details including the SMS text message and the recipient‟s number. Clickatell then converts this email to SMS and sends it to the intended recipient.
When configuring properties, always specify the details supplied to you by Clickatell. If configuration parameters are not available, ask Clickatell to provide you with the required information. The Clickatell Email2SMS Service requires the following parameters: » SMTP server – Specify the name of the SMTP server through which GFI Network Server Monitor will send the email to the SMS gateway. » SMTP port – Specify the SMTP port through which the transmission will take place.
7.8 Generic SMS service provider template Figure 5 - SMS alert flow via a web-based Email to SMS service provider GFI Network Server Monitor can relay SMS (text) alerts via a web-based SMS gateway. Whenever an event triggers an SMS alert, GFI Network Server Monitor will send a “template” email (via SMTP) to a web-based SMS gateway. This template email contains all the required SMS alert details including the SMS text message and the recipient‟s number.
2. The SMTP server configured in the properties of the Generic SMS service must be able to send emails over the internet. GFI Network Server Monitor cannot send SMS alerts through the Generic SMS service if no Internet connection is available or when your Internet connection is down. Configuring the Generic SMS service provider template To configure the Generic SMS service: 1. Right click on the „Alerting Options‟ node and select „Properties‟. 2.
If you don‟t know your SMS gateway password, ask your SMS gateway provider to provide this information. » Body line 4 – (Leave as default). This property contains the number of the SMS recipient (i.e., the number where the SMS will be sent). This value is automatically passed on by GFI Network Server Monitor through variable [smsnumber] which is substituted to text when the email is generated. The contents of this property are formatted as follows: to:[smsnumber] » Body line 5 - (Leave as default).
Configuring a TAP/UCP compliant SMS Service Center Screenshot 112 – NSM 5 SMS Server configuration dialog 1. Right click on the „Alerting Options‟ node and select „Properties‟. 2. Click on the „SMS‟ tab and from the SMS System dropdown, select „NSM 5.x/6.0 SMS Server‟. 3. Click on the „Configure SMS Settings‟ button.
Screenshot 113 - Providers tab 4. Choose your SMSC service provider from the available list of providers. To add unlisted providers, refer to the „Adding new SMSC providers‟ section in this chapter.
Screenshot 114 - Dial & Modem properties tab 5. Click on the „Dial and Modem Properties‟ tab and specify the following parameters: » Tone/Pulse – Select the type of dialing that your modem will use (i.e., tone or pulse). » Dial prefix – Specify any additional numbers that need to be dialed before the dial-string. The dial-string is the number of the selected provider and can only be modified by editing the SMSC provider‟s details.
1. Right click on the „Alerting Options‟ node and select „Properties‟. 2. Click on the „SMS‟ tab and from the SMS System dropdown, choose „NSM 5.x/6.0 SMS Server‟. 3. Click on the „Configure SMS Settings‟ button. Screenshot 115 - SMSC Provider Setup Screen 4. Click on „New‟ and specify the following parameters: » Country - Specify the country of the provider. » Provider - Specify the provider name. » Dial-in number - Specify the number that the modem must dial to connect to the provider.
Changing SMSC providers details Screenshot 116 - SMSC providers list This section is only applicable for advanced users. We cannot guarantee that GFI Network Server Monitor will work with any SMS provider. Ensure that you obtain the correct information from your SMS service provider first. To change the provider‟s details: 1. Right click on the „Alerting Options‟ node and select „Properties‟. 2. Click on the „SMS‟ tab and from the SMS System dropdown, select „NSM 5.x/6.0 SMS Server‟. 3.
The number format of a recipient depends on the provider (when using SMSC). This requires an amount of trial and error to find the right format; for example, if you live in the UK (international dialing code: +44), you should try: » 12345678 » 4412345678 » 004412345678 Format SMS/pager message 1. Right Click on the „Alerting Options‟ node and select „Properties‟. 2. Click on the „SMS‟ tab and then click on „FORMAT SMS MESSAGE‟. Screenshot 117 - SMS/Pager Message Format Window 3.
» %CHECK_RESULT% - the result of the monitoring of the check represented as a string. » %CHECK_EXPLANATION% - the explanation returned with the last known status of the check. » %CHECK_DESCRIPTION% - A description of the function carried out by the check. » %PRODUCTNAME% - the (short) product name of the product (i.e. GFI N. S. M. 6.0).
8 General options 8.1 Introduction Screenshot 118 – ‘General Options’ node From the „General Options‟ node you can: » Specify how GFI Network Server Monitor will handle uncertain results. » Configure GFI Network Server Monitor built in Web server. » Specify which proxy server will be used for Internet Protocol based checks. » Enable the event logging activity. 8.
Screenshot 119 - Uncertain Results setup GFI Network Server Monitor can be configured to convert uncertain results to a definite state i.e. Success or Error. To specify how GFI Network Server Monitor will handle uncertain results: 1. Right Click on the „General Options‟ node and select „Properties‟. By default the properties dialog will open in the Uncertain Results (tab) options. 2.
Screenshot 120 - built in Web Server settings To configure the built in web server: 1. Right Click on the „General Options‟ node, select „Properties‟ and click on the „Web Server‟ tab. 2. Configure the following parameters: » „Enable in-built web server on port….‟ – Enable this flag and specify the port which the built in web server will listen on (by default set to 11695). » „Allow anonymous access to the web server‟ – Enable this flag to indicate that no authentication is required on the web server.
Screenshot 121 - Specifying an alias for the virtual directory 2. This will start the Virtual Directory Creation Wizard. Click on „Next‟ to continue. Now you need to enter an alias for the virtual directory. In this case it is nsmremotemonitor, but you can enter whatever name you like, as long as it follows the folder naming conventions used in Microsoft Windows. Screenshot 122- Pointing to the GFI NSM web folder 3. Now enter the path where the content is located.
Screenshot 123 - Setting permissions 4. Next we need to set the access permissions. Mark „Read‟ only. Do not mark any of the other check boxes. Click on „Next‟ to finish the Virtual Directory Creation Wizard. 5. Right-click on the newly created virtual directory, located under the web root of your web site server and select „Properties‟. Screenshot 124 - Setting Virtual Directory properties 6.
7. Click on „OK‟ to close the properties dialog. The Virtual Directory has been set-up and you can now test access to it. 8.3.2 Securing the Remote Monitor It is important to set up proper authentication and security for this web server and virtual directory. There are three ways to secure the Remote Monitor. These are Basic Authentication, Digest and Integrated Windows Authentication.
Screenshot 126 - Select authentication method If Integrated Windows authentication is used, then authentication will occur against Active Directory. This means you do not need to configure additional users. If you use Basic Authentication, authentication will occur against the local user database on the computer. In this case you must create user names and passwords on that local computer. For more information on securing IIS, please review the IIS documentation. Be sure not to allow anonymous access! 6.
7. Add / remove the users / groups you want to grant access to the Remote Monitor. To grant access only to users forming part of the administrators group, you would set the security tab. Click on „OK‟ to finally secure the remote monitor. 8.4 Proxy Server settings The proxy server settings define which server will be used for Internet protocol checks. Screenshot 128 - Proxy Server Setup Window To configure proxy server parameters: 1. Right Click on the „General Options‟ node and select Properties. 2.
Screenshot 129 - Log file setup Window To configure the logging parameters: 1. Right Click on the „General Options‟ node and select „Properties‟. 2. Click on the „Logging‟ tab and define the following parameters: » „Enable Logging of monitoring checks activity‟ – Enable this flag to start logging all check activity to a specified text file. » Log file – Specify the full path to the log file. » Field separator – Specify the character that will be used to separate the fields in the log file (e.g.
9 Database maintenance options 9.1 Introduction Screenshot 130 - Database Options Through the „Database Maintenance Options‟ node, you can select and configure the database backend to use for the storing of monitoring results data. You can choose between MS Access and MS SQL Server as a database backend. In the case of SQL Server, you can also specify the type of authentication to use when logging onto the database (SQL Server authentication or Windows authentication).
9.2.1 MS Access database backend Screenshot 131 – Ms Access backend properties dialog To use an Ms Access database backend: 1. Select the „MS Access‟ option and specify the full path (including file name) of your MS Access database backend. 2. Click on „OK‟ to save your configuration settings. If the specified database file does not exist, it will be created for you.
9.2.2 MSDE/MS SQL Server database backend Screenshot 132 - MSDE/MS SQL Server backend properties dialog To use an MSDE/MS SQL Server database backend: 1. Select the „MS SQL Server‟ option and specify the name/IP of your SQL Server. 2. Specify the authentication mode to be used when logging on to the SQL Server. GFI Network Server Monitor supports both Windows NT and SQL authentication modes.
10 Users and Groups 10.1 Introduction GFI Network Server Monitor checks refer to the user's properties to gain alert details (e.g., email address), rather than directly to an email or a number. This is in order to avoid having to change all the checks if a particular email or number of a user changes. You can configure user name, email address, mobile number, pager number and the computer name(s) from where network messages should be sent, from the user properties.
Screenshot 134 - User Properties dialog 10.2.2 Configure user’s general parameters These parameters define the general details of the user, including the alert details (e.g. email address, SMS/Pager number, etc...), the person‟s working hours and the groups in which this user is a member. To configure these parameters: 1. Click on the General tab (which is the default opening view of the user properties dialog) 2. Specify the following properties: » Full name – Specify the full name of the user.
Screenshot 135 - Working Hours Setup dialog Marked ( ) hours indicate working time. To setup working hours, click on the „Working hours‟ tab and then click on the working hours that you need to mark / unmark. TIP: To mark / unmark a whole day click on the day (e.g. MONDAY) displayed on the left of the hours setup grid. TIP: To mark the same hour for a whole week, click on at the top of the relative hour column. 10.2.
Screenshot 136- Alerts Setup Dialog Enable the alerts that will be used when alerts occur during and/or outside of working hours (e.g. The screenshot above shows the settings for a user that will receive email alerts at any time an important event occurs as well as a Network alert if the event occurs during working hours and an SMS/Pager alert if the event occurs outside of working hours). 10.2.5 Add user to a group A user can be added to predefined groups.
Screenshot 137- Members of tab To specify the group(s) to which this user will be added, click on „Add‟. TIP: You can make multiple selections of groups so as to add all required groups at one go. 10.2.6 Delete users To delete users: 1. Click on the Users folder under the „Users and Groups‟ node and select the user(s) to be deleted. 2. Right click on the selection and choose „Delete‟. 10.3 Groups A Group contains a collection of users.
Screenshot 138 - Group Properties dialog 2. Specify the group name (e.g. NetworkAdministrators) and the string which describes the group/groups members (e.g. File Server Administrator). 3. To specify the members for this group, click on „Add‟, select the users and click on „OK‟ to accept the selection. 10.3.2 Add members to an existing group To add users to an existing group: 1.
11 Reporting 11.1 Introduction Out of the box, GFI Network Server Monitor includes a dedicated reporting tool. This tool allows you to create reports that detail the availability of your network resources. You can create reports directly in HTML, or generate XML/CSV reports that you can export to your favorite application.
Screenshot 140 - Select the period to be covered by report 3. Specify the monitoring period („From:‟ and „To:‟ date) to be covered by the report. Screenshot 141 - Specify which checks to include in the report 4. Specify the checks that you wish to include in your report. Select the ‘All Checks’ option to include the data of all existing checks. Alternatively you can select ‘The following checks:’ option and choose the checks which you wish to include in the report.
Screenshot 142 – Choose the report format required 5. Specify the format type and output file name of the report. Select ‘CSV’ or ‘XML’ formats if you want to further process the report and perform more advanced calculations using another (external) program such as Microsoft Excel. Click on „Next‟ to continue. 6. At the final stage, a dialog will inform you that the report wizard is ready to start generating the report. If you want to modify any of the previously configured settings, click on „Back‟.
Screenshot 143 - The availability detailed report 11.3 Availability-Summary Report The Availability-Summary Report contains information showing the state of target computers over a specified period of time.
Screenshot 144 - First Stage of the report wizard: Report Type dialog To generate an Availability-Summary Report: 1. Launch the report wizard and select the „Availability–Summary Report‟ option. 2. Specify the rest of the required settings in the same way as described for the creation of an Availability-Detail Report. For more information, refer to the Availability-Detail Report section in this chapter.
Screenshot 145 - The availability summary report 152| Reporting Manual
12 Network tools 12.1 Enumerate computers This tool searches for domains and/or workgroups on your network. Once the domains are defined, you can scan their contents to catalog the constituent computers and their relative details (e.g., OS, other information from NETBIOS). Computers can be enumerated from: » The Active Directory – Fast method which will also enumerate computers that are currently switched off.
Screenshot 147 - Enumerate Computers - Advanced tab options 5. Define additional information to be displayed by marking „Determine Computer role on the network‟ and/or „Determine whether computer is turned on‟. Should it be required, enter authentication details in the fields located at the bottom. The list of constituent computers in the specified domain will be displayed. Status details of the operation carried out is displayed in the bottom window E.g.
Screenshot 148 - Enumerate Processes setup window - General Tab This tool requires the following parameters in the „General‟ tab view: » Hostname/IP – The name of the remote computer whose processes will be enumerated. » Retrieve CPU usage per process – Indicate that the process list should include the percentage (%) CPU usage value. » CPU % usage – Specify the maximum percentage (%) CPU usage allowed. This option will then highlight processes using more than the specified limit.
7. Click on „Start‟ to start enumerating processes. Screenshot 149 – List of Highlighted Processes 12.3 DNS lookup This tool helps resolving domain names to their corresponding IP address. During the DNS lookup process, this tool also enumerates additional information such as Aliases, MX and NS Records. Screenshot 150- DNS Lookup - setup Window To obtain information about a domain name: 1. Go to the Tools > „DNS lookup‟ node. 2. Specify the hostname to resolve.
3. Specify the information to be retrieved. » Basic Information – i.e. host name and what IP this resolves. » Host Information - known technically as the HINFO, usually includes information such as hardware and what OS runs on the specified domain (most DNS entries do not contain this information for security reasons). » Aliases - return information on any A Records the Domain might have.
12.5 Traceroute This tool shows the network path that GFI Network Server Monitor followed to reach the target computer. When you perform a trace route, each hop has an icon next to it which indicates: A successful hop taken within normal parameters. A successful hop, but time required was quite long. A successful hop, but the time required was too long. The hop failed / timed out. (i.e. it took longer then 1000ms). Screenshot 152 - Traceroute Setup window 1.
Screenshot 153 – The SNMP Audit tool 1. Specify the following parameters: » IP Address – The IP address of the computer running SNMP » String List –The list of strings/parameters to be checked (can be left as default). This property is by default set to the dictionary file included in GFI Network Server Monitor. This dictionary file called snmp-pass.
SNMP will help malicious users learn a lot about your system, making password guessing and similar attacks much easier. Unless this service is required it is highly recommended that SNMP is turned off. Screenshot 154 - SNMP Walk Setup window In most cases SNMP should be blocked at the router/firewall so that Internet users cannot SNMP scan your network. It is possible to provide alternative community strings. 1.
13 Other features 13.1 Export configurations You can export a copy of your GFI Network Server Monitor configuration settings, including checks, folders alert settings, users/groups and general parameters to a specified XML file. This function can be used to backup your current configuration settings or to use the same configuration settings on another computer running GFI Network Server Monitor (e.g. to avoid reconfiguration when changing the computer on which GFI Network Server Monitor is running).
Screenshot 156 - Import configuration settings 2. Specify the complete path to the XML file containing the configuration settings (e.g. \\NSM_Server2\Program Files\GFI\config_Backup.xml) or click on „Browse‟ to search for the file. 3. Click on „OK‟ to import the specified configuration file. 13.3 Version information Screenshot 157 - Version Information Check the version of GFI Network Server Monitor from „General‟ node > „Version Information‟.
Screenshot 158 – Check for Newer Builds To check for newer builds, right click on „Version Information‟ in the „General‟ Node and selecting „Check for Newer Build…‟ 13.4 Licensing Screenshot 159 - Licensing details To check your licensing details, click on „Licensing‟ in the „General‟ node.
14 Writing your own monitoring functions 14.1 Introduction GFI Support cannot assist you in the writing and debugging of custom scripts. You must be familiar with VBscript to write your own functions and you must debug them yourself. GFI Network Server Monitor is designed to let operators write their own monitor functions and use them in the product. GFI uses VBScript because it is the most popular scripting language in Windows environments.
If( condition ) Then EXPLANATION = "Yes it is true because ..." Function_i = True Else EXPLANATION = "No it’s not true because ..." Function_i = False End If End If End Function where Function_i is an arbitrary name for the function. You can save this function in either one of the standard VBS files (i.e. ads.vbs, exchange.vbs, hardware.vbs, os.vbs or sample.vbs), or in a new VBScript file. In case of a new file ensure that your VBS file is accessible via the GFI Network Server Monitor Share. 14.
» Function name – Specify the function that GFI Network Server Monitor service will be calling from the specified script file. » VB Function Parameters – Double click on the line where the additional parameter values required by this function are to be specified. Parameters will be passed to the function according to their position in the list, starting from 1. Screenshot 161 - Add Parameters dialog » Specify the parameter value and description.
2000 operating system; and it‟s not part of NT4. For NT4, please download the file from the Microsoft website; ADSI is available for free. GFI includes a sample script that uses ADSI, called ads.vbs. In addition, GFI provides some sample ADSI scripts on the website. You can use these samples as a base for new monitor functions that use ADSI.
15 Troubleshooting 15.1 Introduction The troubleshooting chapter explains how you should go about resolving any software issues that you might encounter. The main sources of information available to users are: » The manual – most issues can be solved by reading this manual. » GFI Knowledge Base articles » Web forum » Contacting the GFI Technical Support 15.2 Knowledge Base GFI maintains a Knowledge Base, which includes answers to the most common problems.
Index A I ADSI, 4, 165, 167, 168 ICMP ping, 3 Alerting Options, 104, 105, 106, 107, 108, 111, 113, 114, 117, 119, 121, 123, 124 inheritance, 1 installation, 7, 10, 13, 130, 133, 165 alerts, 1, 5, 12, 32, 35 Alerts, 25, 26 L License, 6 C Check folders, 35, 93 checks status, 97 configuration, 13, 23, 24, 29, 30, 31, 33, 34 Linux / Unix OS generic checks, 80 Linux/Unix Operating System Checks, 82 logon credentials, 12, 20, 23, 40, 106, 155 Logon Credentials, 13, 23, 39, 40, 41, 155 CPU usage, 2, 4 M
Properties, 60, 61, 65, 94, 95, 105, 106, 107, 108, 111, 113, 114, 117, 119, 121, 123, 124, 128, 129, 134, 135, 137 T property inheritance, 1, 34 Terminal Services checks, 78, 79, 80 Q U Quick Start Wizard, 1, 14 uncertain result, 103, 127 TCP, 3, 41, 42, 43, 44, 45, 48, 49 UNIX, 1 R Reporting, 5 Users and Groups, 3, 4, 28, 73, 88, 108, 141, 145, 146 reporting tool, 147 Users and Groups Membership function, 3, 4 reports, 5, 147 V S Services function, 2 SMS, 1, 25, 26, 109, 118, 119, 121, 122,
USA, CANADA, CENTRAL AND SOUTH AMERICA 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 Email: ussales@gfi.com UK AND REPUBLIC OF IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 Email: sales@gfi.co.uk EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 Email: sales@gfi.