How to use Monitoring inventory in ITSM

Release Time
08/01/2018
Views
412 times
Category
Monitors
Tags

How to use Monitoring inventory in ITSM


Introduction:

The monitor inventory is a single pane of glass which lets you manage, run and assign monitors to profiles. A monitor is a script which tracks events on your network and takes specific actions if its conditions are met.

For example, ‘Alert me when a USB removable disk is connected to the system’, or ‘Create a log entry if CPU usage goes above 75% for a certain length of time’.

Predefined monitors are available for a range of tasks and you can also create custom monitors. Monitors are implemented by adding them to a profile which is deployed to your endpoints

I) Create monitors:

Step 1: Click CONFIGURATION TEMPLATES → Monitors as shown below.

Step 2: Click ‘Create Monitor’ and provide a name and description. Specify the folder in which you want to save it then click ‘Create’.

Example: PERFORMANCE MONITORING

The Monitor's configuration page will open. This contains 4 tabs:

  1. General
  2. Conditions
  3. Profiles
  4. Logs

1.General:

Set basic monitor parameters such as name, description and folder.

You can also set the following:

  • "Trigger Alert if" – Set how many conditions need to be met before an alert is dispatched
  • "Use Alert Settings" – ‘Alert settings’ govern how, and what happens when you receive an alert. Unless you change it, the ‘Default Alert’ settings will be applied to your new monitor. Click ‘Configuration Templates’ > ‘Alerts’ then click on ‘Default Alert’ to view these settings. Click ‘Create Alert’ if you wish to apply different settings.

 

2.Conditions:

This is where you configure the ‘nuts-and-bolts’ of your monitor. Choose what item you want to monitor and specify rule thresholds. If the conditions are breached, then ITSM will take the actions specified in the monitor’s ‘alert settings’.

Go to ‘Configuration Templates’ > ‘Alerts’ to view/edit alert settings.

Example: Performance

The added conditions will be listed as below.

 

3.Profiles:

Your monitor can be attached to a profile, which is in turn deployed to endpoints in your protected network. This tab lists all profiles with which your monitor is associated.

To actually add the monitor to a profile, you need to go to ‘Configuration Templates’ > ‘Profiles’ > ‘Add Profile Section’ > add ‘Monitors’.

See below for more help with this.

4.Logs:

You can have your monitors create a log entry when their conditions are met. These logs are listed in this interface.

 

II) Attach monitors to a profile:

This section will describe attaching the monitors to the profiles which is associated with the required devices.

Step 1: Go to CONFIGURATION TEMPLATES → Profiles and select the required profile.

Example: WINDOWS PRODUCTION DEVICE PROFILES.

Step 2Click Add Profile Section → Monitors and then choose the monitor which you need.

Example: PERFORMANCE MONITORING

 

The action will be reflected as below.