Monitoring

I would like to explain in my post about the power of easy customization using AppManager. I was going through the list of applications which can be monitored by AppManager. Though the list is huge, I was disappointed to see that there is no monitoring available for PostgreSQL, so I decided to do something on…

+ read more

Anmol Rastogi
Feb 2, 2016
7:42 pm
Reads:
91
Score:
Unrated

AppManager for hardware can be used for monitoring EXi/ESX underlying hardware failure due to fully supported WBEM protocol by VMWare. I was looking for the same solution to monitor my Windows based underlying hardware but it’s not yet supported. What I figured out by using AppManager for hardware is that it uses the WBEM which…

+ read more

Anmol Rastogi
Dec 10, 2015
12:00 pm
Reads:
156
Score:
Unrated

I was going through the list of applications which can be monitored by AppManager. Though the list is huge, I was disappointed to see that there is no monitoring available for IDM server, so I decided to do something on my own. As AppManager is highly customizable I created a few KSs to monitor my…

+ read more

Anmol Rastogi
Nov 19, 2015
4:51 pm
Reads:
235
Score:
Unrated

One of the biggest new features of AppManager 9, and the piece we’re most proud of, isn’t really a feature at all. Confused? Read on, and see if you agree. From its inception, AppManager was designed to deliver a premium, robust, and highly scalable application and infrastructure monitoring experience. And we delivered. Our customers voted…

+ read more

Mike Robinson
Nov 11, 2015
12:38 pm
Reads:
302
Score:
4

If you’re working in an environment with Microsoft servers (and who isn’t these days), you more than likely have some IIS (Internet Information Service) servers running around.  These may be vitally important systems that house your companies external website, they may run some applications that maybe aren’t quite as important to day to day operations…

+ read more

Joe Rogers
Aug 4, 2015
5:25 pm
Reads:
835
Score:
Unrated

After Sentinel 7.3 was released, the Rules and Action options were changed, and it got a little trickier to set up automatic emails to notify security team members about things like login failures. Here’s how you set things up to enable a “Send Email” action to be part of routing actions.

May 27, 2015
4:10 pm
Reads:
1,120
Score:
Unrated

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
1,580
Score:
5

Is there anything more annoying than using a Unified Communications (UC) or VoIP telephony service—and suddenly everyone sounds like malfunctioning androids trapped in some sort of infinite echo chamber? Hello? (Hello.) Can anyone hear me? Allusions to Pink Floyd aside—even today, UC/VoIP quality is still an issue, despite all the IT monitoring we do. But…

+ read more

wheaps
By: wheaps
Feb 27, 2015
3:30 pm
Reads:
1,731
Score:
Unrated

I know what you’re thinking and no,  I’m not drunk.  What does monitoring have to do with better applications? Well,  for me,  a lot.  Think for a moment about who is involved with creating applications.  You’ve got developers (obviously), testers,  architects, project managers and probably a few other roles.  Now think about who supports the…

+ read more

Joe Rogers
Feb 4, 2015
7:12 am
Reads:
2,326
Score:
5

Get ready for the Internet of (Every)thing!  As IT professionals, if we aren’t preparing for it now—we’re falling behind. But what exactly will the Internet of Things (IoT) mean for our IT environments going forward? How are we going to deliver on all this hype and buzz? The devil is always in the details, right?…

+ read more

wheaps
By: wheaps
Jan 22, 2015
2:25 pm
Reads:
1,678
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow