r Veriato Server Manager Guide 2/5/2016 www.veriato.com Printed Documentation Table of Contents Getting Started ............................................................................................................... 7 Getting Started .............................................................................................................................. 7 About Veriato Server Manager ..................................................................................................... 8 Client Server Architecture ............................................................................................................. 9 System Requirements ................................................................................................................. 11 Screencasts.................................................................................................................................. 11 Upgrade from Disk Monitor ........................................................................................................ 12 Upgrade from Internet Server Monitor ...................................................................................... 12 Upgrade from Log Manager ........................................................................................................ 12 Licensing and Registration .......................................................................................................... 12 Application Program Interface .................................................................................................... 16 PCI DSS Compliance .................................................................................................................... 17 Terminology ................................................................................................................................ 19 Tutorials ....................................................................................................................... 20 Tutorials ...................................................................................................................................... 20 Configure Server Manager to use MySQL ................................................................................... 20 Configure Server Manager to use SQL Server ............................................................................. 25 Configure Server Manager to use the file system....................................................................... 28 Conserve Disk Space ................................................................................................................... 31 Migrate to a New Server ............................................................................................................. 32 Monitor a Rolling Text Log File (IIS) ............................................................................................ 33 Monitor CSV Files ........................................................................................................................ 40 Use Gmail as a Backup Email Server ........................................................................................... 44 Management Console .................................................................................................. 46 Management Console ................................................................................................................. 46 Object Explorer ........................................................................................................................... 46 Options ........................................................................................................................................ 48 Service Connections .................................................................................................................... 49 Enable and Disable Objects ......................................................................................................... 50 Monitor Hierarchy....................................................................................................................... 51 Registry Explorer ......................................................................................................................... 51 Import a Disk List......................................................................................................................... 53 Filename Masks........................................................................................................................... 53 Server Manager Properties........................................................................................... 55 Server Manager Properties ......................................................................................................... 55 Email Settings .............................................................................................................................. 55 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. ii Printed Documentation Database Settings........................................................................................................................ 56 Active Directory Settings ............................................................................................................. 59 Syslog Server Settings ................................................................................................................. 60 Web Server Publishing Settings .................................................................................................. 62 Management Server Settings ...................................................................................................... 64 HTML and Email Template Settings ............................................................................................ 65 WMI Settings ............................................................................................................................... 68 Web Proxy Server Settings .......................................................................................................... 69 SNMP Server Settings.................................................................................................................. 70 Computers, Devices and Hosts ..................................................................................... 71 Computers, Devices and Hosts ................................................................................................... 71 Add Computers, Devices and Hosts ............................................................................................ 71 Assign Computer, Device or Host................................................................................................ 72 Map Computers, Devices and Hosts ........................................................................................... 72 Computer, Device and Host Properties ...................................................................................... 73 Assign Logon As Credentials........................................................................................................ 75 Copy Assignments ....................................................................................................................... 76 Import a Host List ........................................................................................................................ 77 Search for Computers, Devices and Hosts .................................................................................. 77 Browse Active Directory Dialog................................................................................................... 78 Browse Network Dialog .............................................................................................................. 78 Templates ..................................................................................................................... 79 Templates.................................................................................................................................... 79 Add Template .............................................................................................................................. 83 Assign Template .......................................................................................................................... 84 Template Properties.................................................................................................................... 84 Reports ......................................................................................................................... 86 Reports ........................................................................................................................................ 86 Add Report .................................................................................................................................. 87 Assign Report .............................................................................................................................. 88 Report Properties ........................................................................................................................ 88 Views ........................................................................................................................................... 89 Summary Reports........................................................................................................................ 89 Account Lockout Reports ............................................................................................................ 90 Security Event Log Reports ......................................................................................................... 93 Event Log Reports ..................................................................................................................... 112 Syslog Reports ........................................................................................................................... 115 Text Log Reports ....................................................................................................................... 117 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. iii Printed Documentation Duplicate Files Reports.............................................................................................................. 119 File and Directory Access Permissions Reports......................................................................... 121 File Extension Reports ............................................................................................................... 123 Largest Files Reports ................................................................................................................. 123 Least Accessed Files Reports ..................................................................................................... 125 Recently Accessed Files Reports ............................................................................................... 127 Temporary Files Reports ........................................................................................................... 129 Schedules ................................................................................................................... 130 Schedules .................................................................................................................................. 130 Add Schedule ............................................................................................................................ 131 Assign Schedule ......................................................................................................................... 131 Schedule Properties .................................................................................................................. 132 Day and Time Exclusions ........................................................................................................... 133 Filters.......................................................................................................................... 136 Filters......................................................................................................................................... 136 Add Filter ................................................................................................................................... 137 Assign Filter ............................................................................................................................... 138 Filter Properties ........................................................................................................................ 139 Import and Export Filters .......................................................................................................... 139 Actions, Alerts and Notifications ................................................................................ 140 Actions, Alerts and Notifications............................................................................................... 140 Desktop Actions, Alerts and Notifications ................................................................................ 142 Add Action ................................................................................................................................. 143 Assign Action ............................................................................................................................. 143 Action Properties ...................................................................................................................... 144 Database Actions....................................................................................................................... 144 Action Variable Tags.................................................................................................................. 145 File Output Options ................................................................................................................... 157 Tray Icon .................................................................................................................................... 158 Auto Configurators ..................................................................................................... 161 Auto Configurators .................................................................................................................... 161 Add Auto Configurator .............................................................................................................. 161 Auto Configurator Properties.................................................................................................... 162 Assign Templates to Auto Configurator .................................................................................... 163 Select Active Directory Organizational Unit.............................................................................. 164 Groups ........................................................................................................................ 165 Groups ....................................................................................................................................... 165 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. iv Printed Documentation Add Group ................................................................................................................................. 167 Assign Group ............................................................................................................................. 167 Log Management ........................................................................................................ 169 Log Management ...................................................................................................................... 169 Email Logs.................................................................................................................................. 170 Encrypt and Sign Files ............................................................................................................... 171 Event Log to Syslog.................................................................................................................... 173 EVT and EVTX Files .................................................................................................................... 174 Export Logs ................................................................................................................................ 176 Log Repository Retention Policy ............................................................................................... 177 Search for Logs .......................................................................................................................... 178 Log Viewers ................................................................................................................ 179 Log Viewers ............................................................................................................................... 179 Event Log Viewer....................................................................................................................... 180 Syslog Log Viewer...................................................................................................................... 180 Text Log Log Viewer .................................................................................................................. 181 Windows Service ........................................................................................................ 181 Windows Service ....................................................................................................................... 181 Assign Service Logon As Credentials ......................................................................................... 181 Windows Service Log ................................................................................................................ 182 Run the Service in Verbose Mode ............................................................................................. 183 Syslog Server ............................................................................................................................. 183 SNMP .......................................................................................................................... 185 SNMP Server ............................................................................................................................. 185 SNMP Server ............................................................................................................................. 185 SNMP Trap Viewer .................................................................................................................... 185 Batch Functions .......................................................................................................... 186 Batch Functions ......................................................................................................................... 186 Batch Assign Computers, Devices and Hosts to a Group .......................................................... 186 Batch Assign Logon As Credentials ........................................................................................... 187 Batch Assign Templates to a Group .......................................................................................... 187 Batch Delete Computers, Devices and Hosts ............................................................................ 188 Batch Update Auto Configurators ............................................................................................. 189 Batch Update Computers, Devices and Hosts........................................................................... 189 Batch Update Reports ............................................................................................................... 190 Batch Update Templates ........................................................................................................... 190 Select Multiple Auto Configurators........................................................................................... 191 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. v Printed Documentation Select Multiple Computers, Devices and Hosts ........................................................................ 191 Select Multiple Logs .................................................................................................................. 192 Select Multiple Reports ............................................................................................................. 192 Select Multiple Templates ........................................................................................................ 193 Troubleshooting ......................................................................................................... 194 Troubleshooting ........................................................................................................................ 194 Access Denied Errors ................................................................................................................. 194 Quota Violation Errors .............................................................................................................. 196 The RPC server is unavailable Errors ......................................................................................... 197 Windows Firewall ...................................................................................................................... 199 About Veriato ............................................................................................................. 200 About Veriato ............................................................................................................................ 200 Contact Us ................................................................................................................................. 200 Third Party Software Notices and/or Additional Terms and Conditions .............................................................................................. 201 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. vi Getting Started Getting Started For new users, we recommend that you get acquainted with how Server Manager works. Here are some introductory topics to get you started: Client Server Architecture Management Console Groups Terminology After completing the Server Manager installation for the first time, there are some required configuration tasks you need to complete prior to configuring Server Manager to monitor and report. Required tasks: 1. If you have already purchased a license, register your license. 2. Follow the Server Manager Configuration Wizard. If the wizard does not automatically open, select Tools > Server Manager Configuration Wizard. The wizard includes the following pages: o Service Credentials o Email Settings o Database Settings Optional tasks: • • • • • • • Configure Active Directory Connections Configure Syslog Server Settings Configure Web Server Publishing Settings Configure Management Server Settings Configure HTML and Email Template Settings Configure WMI Settings Configure Web Proxy Server Settings What's next? • • • • Add Computers, Devices and Hosts Create and assign Templates Create and schedule Reports Create and schedule Auto Configurators Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 7 Printed Documentation Related Topics Screencasts Tutorials Troubleshooting About Veriato Server Manager Veriato Server Manager is an enterprise-wide systems and application monitoring software package enabling both small business and large enterprise System Administrators to proactively manage their networks and fulfill compliance requirements. • Consolidates, archives and monitors logs such as: o o o • Includes Security Event Log Reports such as: o o o o o • Object Access Auditing Failed Logons, Successful Logons and Logon Sessions Account Management Account Lockout New Accounts Monitors resources such as: o o o • Windows Event Logs Syslogs Text Logs Disk space CPU load over time Memory load over time Monitors and controls applications and services such as: o o o o Websites Email servers Databases Windows services and processes • Monitors Internet connectivity and throughput. • Includes extensive disk and directory monitoring and analysis functions and Reports. • Monitors changes to the Windows Registry. • Monitors SSL and digital certificate expiration and validity. • And more... Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 8 Printed Documentation How It Works Server Manager... • Installs to a single server then remotely manages computers, devices and hosts. • Is configured though a client user interface which can be installed to any supported Windows computer at any location. • Is an agentless system that utilizes Windows technologies such as WMI and Windows Networking. Fires alerts and notifications through email, SMS, remote desktop popups, SNMP traps and more. Automatically publishes systems and network status to your web server for remote access via your iPhone or Android. Generates Reports to HTML, PDF, text and CSV. • • • Related Topics Getting Started System Requirements Client Server Architecture Management Console Client Server Architecture Server Manager is implemented using client/server architecture. The server, referred to as the Server Manager Service, runs as a Windows service and is responsible for all Monitor and Report execution. The client application, referred to as the Management Console, runs on any supported Windows platform and is responsible for all configuration and management. The tray icon, also a client application, is responsible for desktop notifications (e.g. message box and sound alerts). You can install the console and tray icon on as many computers as necessary. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 9 Printed Documentation The client/server interface is implemented using TCP port 6766 by default. The TCP interface authenticates all incoming connections using Windows authentication. Access will only be granted if the user accessing the service belongs to the Administrator group. For secure environments, the TCP interface can be configured to encrypt all packets using private keys. For more information see Management Server Settings. To configure the console or tray icon to connect to a remote service installation, see Service Connections. Server Manager is deployed through a single installer that always installs the service, console and tray icon. If you only plan to use the console and/or tray icon, you can disable the Veriato Server Manager service via the Windows Service Control Manager. Related Topics Management Server Settings Service Connections Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 10 Printed Documentation System Requirements Supported Operating Systems • • Windows Server 2012, 2008 R2, 2008, or 2003 Windows 8, 7, Vista, or XP Supported CPUs (64-Bit / 32-Bit) Server Manager is offered in both 64-bit and 32-bit Windows installers. Be sure to install the 64-bit installer when targeting 64-bit hardware as the 64-bit installer includes 64-bit binaries. Memory 4 GBs of available memory, 8 GBs suggested for large networks. Microsoft .NET Framework 3.5 Service Pack 1 The installation detects if the .Net Framework 3.5 Service Pack 1 is already installed. If not, the framework is automatically downloaded from Microsoft and then installed. Please note the framework may take a significant amount of time to install. Please be patient while the installation completes. Domain Administrator Account To access and manage remote resources Server Manager requires domain administrator credentials. If off-domain, local administrator credentials. The first time the application is run, you will be prompted to assign administrator credentials to the service. Windows Management Instrumentation (client and server) Many functions within Server Manager utilize Microsoft's Windows Management Instrumentation (WMI) API (e.g. Event Log management, CPU, memory, services, processes, Access Permissions Reports). Optional Components Microsoft's SNMP Service - SNMP traps are exposed through Microsoft's SNMP Service. Screencasts Veriato offers video screencast tutorials to help you learn how to use Server Manager. • • • Introduction to Server Manager Server Manager Actions Server Manager Schedules Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 11 Printed Documentation • • • • Event Log Consolidation and Monitoring using Templates Object Access Reports Ping Monitoring and Reporting Complex Event Log Filtering Related Topics Troubleshooting Tutorials Upgrade from Disk Monitor When installing Server Manager on a server that already has Disk Monitor installed, you will be prompted to upgrade. Server Manager includes an upgrade wizard that automatically imports your license and configurations, and optionally uninstalls Disk Monitor. Upgrade from Internet Server Monitor When installing Server Manager on a server that already has Internet Server Monitor installed, you will be prompted to upgrade. Server Manager includes an upgrade wizard that automatically imports your license and configurations, and optionally uninstalls Internet Server Monitor. Upgrade from Log Manager When installing Server Manager on a server that already has Log Manager installed, you will be prompted to upgrade. Server Manager includes an upgrade wizard that automatically imports your license and configurations, and optionally uninstalls Log Manager. Licensing and Registration Server Manager is licensed by the number of nodes being monitored. A node is defined as a unique IP address and/or hostname that is monitored, scanned, or otherwise managed by the Software. You can apply as many Templates (e.g. CPU, memory, disk space, web content, etc.) to each node as necessary. A simple licensing sample: If monitoring a single physical server called mycompany that hosts a web server (www.mycompany.com) and mail server (mail.mycompany.com), 3 nodes within your license will be required for each of the 3 addressable names: mycompany (e.g. Ping monitor) Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 12 Printed Documentation www.mycompany.com (e.g. HTTP monitor) mail.mycompany.com (e.g. SMTP monitor) NOTE: If each of the 3 addressable names are on the same IP address, using the IP address instead of the addressable names will reduce the required hosts from 3 to 1. To register your license: 1. After purchasing a license from Veriato, you will receive a serial number via email. 2. If not already installed on the target server, install, then open the Management Console. 3. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 13 Printed Documentation 4. Select the Licensing tab then click Register License. The Register License dialog displays. 5. Specify the email address used when purchasing. 6. Paste the serial number you received in your order confirmation email. 7. Click Submit. NOTES: If you are running on an isolated network, you can register your license at: www.Veriato.com/support/registernodessm.asp Fill out the license registration form. Once complete a license key file will be automatically emailed to you. When moving this software from one server to another or when waiting for your purchasing department to upgrade an existing license, Veriato offers users the option to register up to 10% over the current number of nodes purchased. Anytime your registered node count exceeds the number of nodes you purchased, you will receive a nightly notification email reminding you to reduce the number of registered nodes. To set the maximum node count: The Server Manager licensing enables you to install the Server Manager Service on multiple servers. For example, if you purchased a 100 node license, you could install Server Manager on three different servers potentially located at 3 different sites then configure each installation to monitor 33 nodes. Finally, a forth instance of Server Manager could be installed in a DMZ to monitor a single server within the DMZ for a total of 100 nodes. To set the number of nodes associated with a specific Server Manager installation: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 14 Printed Documentation 1. 2. 3. 4. 5. 6. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Select the Licensing tab. From the Installed Licenses list, select the serial number to update. From the Registration List, select the Host to update. Click Set Maximum Node Count. The Set Maximum Nodes view displays. Set the maximum number of nodes which you would like to manage. If the target host is another remote installation, the target Server Manager Service will automatically update at midnight or can be manually updated by restarting the Veriato Server Manager Service on the effected server. When moving this software from one server to another or when waiting for your purchasing department to upgrade an existing license, Veriato offers users the option to register up to 10% over the current number of nodes purchased. Anytime your registered node count exceeds the number of nodes you purchased, you will receive a nightly notification email reminding you to reduce the number of registered nodes. To reset your license: If you need to move a license to another computer, you can reset your own license for registration on the new server. 1. 2. 3. 4. 5. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Select the Licensing tab. From the Installed Licenses list, select the serial number to return. From the Registration List, select the Host you are no longer using then click Return License. When prompted to confirm to return the license and disable all associated monitors, click Yes. If the target host is another remote installation, the target Server Manager Service will automatically update at midnight or can be manually updated by restarting the Veriato Server Manager Service on the effected server. To renew your maintenance: When your maintenance is about to expire, you can upgrade through the Management Console. 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Licensing tab. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 15 Printed Documentation 3. From the Installed Licenses list, select the serial number to renew then click Renew Maintenance. You will be re-directed to your Internet browser where you can then renew online. If the server you are on does not have internet access you can renew at: www.Veriato.com/purchase/renewal.asp To upgrade or add more nodes to your license: If your license only provides access to a sub-set of Templates and/or Reports or you would like to add more hosts to your current installation, you can upgrade through the Management Console. 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Licensing tab. 3. From the Installed Licenses list, select the serial number to upgrade then click Upgrade License. You will be re-directed to your Internet browser where you can then upgrade online. If the server you are on does not have internet access you can upgrade at: www.Veriato.com/support/offers.asp?ItemID=41 Application Program Interface Server Manager enables users to write custom applications to view monitor history data. For example, a user could create an application that shows ping response times or disk utilization over a period of time. Consumption of history data can obtained when saving history to SQL Server, MySQL or Oracle. At this time there is no API to access file system based history. Server Manager saves each monitor's history to a unique table. The table name for each monitor uses the following format: M[HOST_ID]_[TEMPLATE_ID] Host ID The internal object ID. Template ID The internal object ID. For example: H100_200 To view a Host ID: 1. From the Object Explorer, navigate to the target computer, device or host. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 16 Printed Documentation 2. Right-click and select Host Properties. The Host Properties dialog displays. 3. The Host ID is listed within the General tab. To view a Template ID: 1. From the Object Explorer, navigate to the target Template or Monitor. 2. Right-click and select Template Properties. The Template Properties view displays. 3. The Template ID is listed within the General tab. PCI DSS Compliance Server Manager provides software solutions to meet PCI DSS compliance requirements as defined in v2.0 section 10 of the PCI Data Security Standard. Section Requirement Solution 10.2 Out-of-the-box Security Event Log filters and Reports such as: Implement automated audit trails for all system components to reconstruct the following events. • • • • • • Failed Logons Success Logons Account Management Logon Sessions New User Accounts Account Lockout Real-time and scheduled monitoring of all Object Access Security Event Log entries. 10.4 Using time-synchronization technology, Pre-installed Synchronize Clocks Template synchronize all critical system clocks and which uses NTP to synchronize clocks on all times and ensure that the following is discovered Windows servers. implemented for acquiring, distributing, and storing time. Note: One example of time synchronization technology is Network Time Protocol (NTP). 10.5 Secure audit trails so they cannot be altered. Pre-installed Event Log File Backup Template which can be scheduled to consolidate to a central log server then encrypt, password protect and digitally sign output files ensuring file integrity. Includes a File Consolidation Template which Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 17 Printed Documentation can be scheduled to consolidate to a central log server any set of files then encrypt, password protect and digitally sign output files ensuring file integrity. Pre-installed Syslog Backup Template which can be scheduled to archive consolidated Syslog messages to a central log server then encrypt, password protect and digitally sign output files ensuring file integrity. 10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter. Pre-installed Event Log Consolidation Template which can be scheduled to download Event Logs to a central log server then save to SQL Server, MySQL, Oracle or our own binary file format. Includes a Syslog Server that is pre-configured to save all received Syslog messages. Optionally supports saving messages to SQL Server, MySQL or Oracle. Includes several Text Log Monitoring Templates that can be configured to save all entries to a central log server. Supported output includes: SQL Server, MySQL, Oracle and our own binary file format. 10.6 Review logs for all system components at least daily. Log reviews must include those servers that perform security functions like intrusion-detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS). Note: Log harvesting, parsing, and alerting tools may be used to meet compliance with Requirement 10.6. Includes: • • • • Numerous log viewers that enable users to page through large volumes of data, hide duplicate entries, filter and merge multiple logs into a single view. Out-of-the-box filters. Customizable filters with AND, OR, NOT, criteria nesting and regular expression support. Automated and on-demand Reporting. Related Topics Payment Card Industry (PCI) Data Security Standard Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 18 Printed Documentation Terminology Term Definition Action A configurable object that executes a function when: • • • A monitor triggers, recovers, errors or completes. A Report is complete or errors An Auto Configurator is complete or errors Auto Configurator A configurable object used to monitor new servers and workstations. When utilized in large environments, Auto Configurators can be a very powerful tool enabling Server Manager to automatically monitor new and renamed servers without any interaction. Desktop Action Desktop Actions are defined as Actions that are executed within a user's Windows desktop (e.g. message box alerts, sound alerts and optionally interactive file execution) Filter A configurable object used to target or limit specific log entries or computers from real-time and consolidated log views, Monitors and Reports. Filters can also be used when manually searching computers in Active Directory or through an Auto Configurator. Host Term used to refer to either a computer, a device (e.g. switch, router or firewall) or a hostname (e.g. www.Veriato.com). Log Repository A database or file system location where log entries are saved. • • • Primary Log Repository - Contains the LATEST consolidated log entries. Archive Log Repository - Contains ARCHIVED consolidated log entries previously saved to the Primary Log Repository Auxiliary Log Repository - Contains AUXILIARY or BACKUP consolidated logs. Typically used to view old database backups for auditing purposes. Monitor The result of a host-Template assignment causing the function to execute on a scheduled basis (e.g a ping monitor). Report A configurable object that enables users to receive summarized data on-demand or on a scheduled frequency. Reports typically output to an HTML file or email. Schedule A configurable object that defines the frequency to execute a Monitor, Report or Auto Configurator (e.g. daily at 6:00 AM or every 5 minutes). Management Console The client application used to configure the service, view logs and manually execute Monitors, Reports and Auto Configurators. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 19 Printed Documentation Server Manager The server application responsible for executing Monitors, Reports and Auto Service Configurators. The service is implemented as a Windows Service. Server Manager The client application that enables your Windows desktop to display system status, Tray Icon receive desktop notifications (e.g. message box alerts, sound alerts and optionally interactive file execution) and launch the Console. Template A configurable object that defines properties for an executable function that is assigned to one or more hosts, host groups, Template groups and Summary Reports. Tutorials Tutorials The following tutorials are available: • • • • • • Configure Server Manager to use SQL Server Configure Server Manager to use MySQL Migrate to a New Server Monitor a Rolling Text Log File Monitor CSV Files Use Gmail as a Backup Email Server Forum If none of these topics help, please see our online forum at: http://spectorlive.com/phpbb3/ Screencasts Veriato offers several video screencast tutorials to help you learn how to use Server Manager. The screencasts can be found at: http://www.Veriato.com/products/server-manager/tutorials.asp Configure Server Manager to use MySQL In this tutorial, we walk you through the process of downloading, installing and configuring MySQL. Once completed, we will configure Server Manager to use MySQL when saving history and log entries. Lastly, we will download logs to the MySQL database and verify entries were written to the database. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 20 Printed Documentation Step 1: Download and install MySQL Community Server Download and install MySQL Community Server from: http://mysql.com/downloads/mysql/ Step 2: Download and install MySQL Workbench The MySQL Workbench enables you to configure and manage MySQL. Download and install from: http://mysql.com/downloads/workbench/ Step 3: Create new server instance The first time you open the workbench you must add the connection to your database. From the Home page select New Server Instance. Follow the wizard adding in your connection information. Step 4: Create databases 1. From the Home page, under the SQL Developmentcolumn, double-click on the connection to your database. The SQL Editor view is displayed. 2. 3. 4. 5. 6. 7. From the toolbar click the button. The new_schema - Schema tab displays. From the Name text box type CBSM From the Collation drop-down select utf8 - default collation. Click OK. The Apply SQL Script to Database dialog displays. Click Apply then Finish. Create 2 more databases, one for the Archive Log Repository named CBSM_ARCHIVE and the other for the History database named CBSM_HISTORY. Once all 3 databases have been created the MySQL Workbench lists the 3 databases as seen below: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 21 Printed Documentation Step 5: Create the database user and assign privileges 1. From the Home page, under the Server Administrationcolumn, double-click on the sever instance. The Admin view is displayed. 2. From the Task and Object Browser view, select Users and Privileges. The Users and Privileges view displays. 3. From the Server Access Management tab, click Add Account 4. Set the Login Name to cbsmuser. 5. Enter a Password then duplicate the password in the Confirm Password text box. 6. Select the Administrative Roles tab. 7. From the Role list check DBA. 8. Click Apply. The MySQL configuration process is now complete. Step 6: Configure the Log Repositories and History 1. From Server Manager, select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Databases tab. 3. Create the Primary Log Repository. 1. 2. 3. 4. 5. Click the button. From the Role drop-down select Log Repository. Specify a Name (e.g. MySQL Primary Log Repository). From the Provider drop-down select MySQL. Specify the Server name. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 22 Printed Documentation 6. Set the User name to cbsmuser. 7. Specify the Password you set earlier. 8. Set the Database to CBSM. 9. Click the button. The database is automatically initialized. 4. Create the Archive Log Repository. Follow the the instructions above, however; 1. Set the Name to MySQL Archive Log Repository. 2. Set the Role to ArchiveLogRepository. 3. Set the Database to CBSM_ARCHIVE. 5. Create the History database. Follow the the instructions above, however; 1. Set the Name to MySQL History. 2. Set the Role to History. 3. Set the Database to CBSM_HISTORY. Step 7: Test and verify the configuration 1. From the Object Explorer, add a new computer. 2. Assign the sample Event Log Consolidation and Monitoring Template. 3. Right-click on the Monitor you just created under your new computer and select Execute Now (Verbose). 4. The Application, System and Security Event Logs are downloaded and saved to the MySQL Primary Log Repository you just created and configured. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 23 Printed Documentation 5. From the Object Explorer, expand Log Repositories > SQL Server Log Repository then navigate to the computer you just downloaded the logs from. 6. Expand the computer to find the Event Logs node. 7. Expand the Event Logs to find the Application, System and Security nodes. 8. Right-click on the Application node and select View Top 10000 Consolidated Log Entries. The Select Display Filters dialog displays. 9. Check the Information, Warning and Error options then, if a filter is selected, click the button to clear the filter. Finally click OK. The Log Viewer displays. 10. Verify entries are displayed in the view. 11. From MySQL Workbench, within the SQL Editor, right-click then select Refresh All. The 3 databases you created are now listed. 12. Expand the CBSM > Tables node. Several table display including a table for each consolidated log. 13. You should now see a new table called [servername]_evt_application where [servername] is the name of the server you downloaded the logs from. If you see this table, you have successfully downloaded the Event Log and saved it to your MySQL database, otherwise the Primary Log Repository is not configured to use this database. Check the Server Manager configurations and try again. MySQL Log Repository Schema Defined The Primary and Archive Log Repositories require the following tables: Table Description level Contains a list of the Event Log levels (Information, Warning, Error, Audit Success, and Audit Failure). facility Contains a list of the Syslog facilities. priority Contains a list of the Syslog priorities. event_logs Contains an index of consolidated Event Logs. syslogs Contains an index of consolidated Syslogs. text_logs Contains an index of consolidated Text Logs. Each log file is consolidated to its own table using the following naming conventions: Log Type Table Event Log [host]_evt_[log] Syslog [host]_syslog Text Log [GUID] - Since the only thing that uniquely identifies a text log is the filename and a filename can easily exceed the maximum length of a table name, a GUID is used in place of the filename. The text_logs table maps the consolidated text log s filename to the GUID Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 24 Printed Documentation enabling the software to identify which table to read and write entries from. Related Topics Conserve Disk Space Database Settings Log Repository Retention Policy View Logs Configure Server Manager to use SQL Server In this tutorial, we walk you through the process of configuring SQL Server. Once completed, we will configure Server Manager to use SQL Server when saving history and log entries. Lastly, we will download logs to the SQL Server database and verify entries were written to the database. Step 1: Create the databases 1. 2. 3. 4. 5. 6. Open Microsoft SQL Server Management Studio. From the Object Explorer, expand Databases. Right-click then select New Database. From the Database name text box type CBSM Optionally, set the autogrowth to 100 MBs then click OK. The database is created. Create 2 more databases, one for the Archive Log Repository named CBSM_ARCHIVE and the other for the History database named CBSM_HISTORY. Step 2: Create the database user 1. 2. 3. 4. 5. 6. 7. From the Object Explorer, expand Security. Right-click then select New Login. The New Login dialog displays. From the Login name text box type cbsmuser. Check SQL Server authentication. Type a password. Un-check Enforce password policy. Click OK. The user is created. Step 3: Assign the user to the databases 1. 2. 3. 4. 5. From the Object Explorer, expand Databases > CBLM > Security. Right-click then select New User. From the User name text box type cbsmuser. From the Login name text box type cbsmuser. From the Select a page view, select Membership. The Database role membership view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 25 Printed Documentation 6. Check db_owner. 7. Click OK. The user is assigned. 8. Repeat these steps for the CBSM_ARCHIVE and CBSM_HISTORY databases. Step 4: Configure the Log Repositories and History 1. From Server Manager, select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Databases tab. 3. Create the Primary Log Repository. a. b. c. d. e. f. g. h. Click the button. From the Role drop-down select Log Repository. Specify a Name (e.g. SQL Server Primary Log Repository). From the Provider drop-down select SqlServer. Specify the Server name. Set the User name to cblmuser. Specify the Password you set earlier. Set the Database to CBSM. i. Click the button. The database is automatically initialized. 4. Create the Archive Log Repository. Follow the the instructions above, however; Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 26 Printed Documentation a. Set the Name to SQL Server Archive Log Repository. b. Set the Role to ArchiveLogRepository. c. Set the Database to CBSM_ARCHIVE. 5. Create the History database. Follow the the instructions above, however; a. Set the Name to SQL Server History. b. Set the Role to History. c. Set the Database to CBSM_HISTORY. Step 5: Test and verify the configuration 1. From the Object Explorer, add a new computer. 2. Assign the sample Event Log Consolidation and Monitoring Template. 3. Right-click on the Monitor you just created under your new computer and select Execute Now (Verbose). 4. The Application, System and Security Event Logs are downloaded and saved to the SQL Server Primary Log Repository you just created and configured. 5. From the Object Explorer, expand Log Repositories > SQL Server Log Repository then navigate to the computer you just downloaded the logs from. 6. Expand the computer to find the Event Logs node. 7. Expand the Event Logs to find the Application, System and Security nodes. 8. Right-click on the Application node and select View Top 10000 Consolidated Log Entries. The Select Display Filters dialog displays. 9. Check the Information, Warning and Error options then, if a filter is selected, click the button to clear the filter. Finally click OK. The Log Viewer displays. 10. Verify entries are displayed in the view. 11. From SQL Server Management Studio, within the Object Explorer, right-click then select Refresh. 12. Expand the Databases > CBSM > Tables node. Several table display including a table for each consolidated log. 13. You should now see a new table called [servername]_evt_application where [servername] is the name of the server you downloaded the logs from. If you see this table, you have successfully downloaded the Event Log and saved it to your SQL Server database, otherwise the Primary Log Repository is not configured to use this database. Check the Server Manager configurations and try again. SQL Server Log Repository Schema Defined The Primary and Archive Log Repositories require the following tables: Table Description level Contains a list of the Event Log levels (Information, Warning, Error, Audit Success, and Audit Failure). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 27 Printed Documentation facility Contains a list of the Syslog facilities. priority Contains a list of the Syslog priorities. event_logs Contains an index of consolidated Event Logs. syslogs Contains an index of consolidated Syslogs. text_logs Contains an index of consolidated Text Logs. Each log file is consolidated to its own table using the following naming conventions: Log Type Table Event Log [host]_evt_[log] Syslog [host]_syslog Text Log [GUID] - Since the only thing that uniquely identifies a text log is the filename and a filename can easily exceed the maximum length of a table name, a GUID is used in place of the filename. The text_logs table maps the consolidated text log s filename to the GUID enabling the software to identify which table to read and write entries from. Related Topics Conserve Disk Space Database Settings Log Repository Retention Policy View Logs Configure Server Manager to use the file system In this tutorial, we walk you through the process of configuring Server Manager to use the file system to save history and log entries. Lastly, we will download logs to the file system and verify entries were written to the directory. Step 1: Create the directory 1. Open Windows Explorer. 2. Create 3 directories. One for the History, Primary Log Repository and the Archive Log Repository. Step 2: Configure the Log Repositories and History 1. From Server Manager, select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Databases tab. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 28 Printed Documentation 3. Create the Primary Log Repository. a. b. c. d. e. f. Click the button. From the Role drop-down select Log Repository. Specify a Name (e.g. Primary Log Repository). From the Provider drop-down select FileSystem. Specify the Path (e.g. c:\logs\Primary Log Repository). Choose the Encoding. The default is UTF-8. Use UTF-16 when the primary language requires Unicode (e.g. Japanese). g. Click the button. The database is automatically initialized. 4. Create the Archive Log Repository. Follow the the instructions above, however; a. Set the Name to Archive Log Repository. b. Set the Role to ArchiveLogRepository. c. Set the Path (e.g. c:\logs\Archive Log Repository). 5. Create the History directory. Follow the the instructions above, however; a. Set the Name to History. b. Set the Role to History. c. Set the Path (e.g. c:\logs\History). Step 3: Test and verify the configuration 1. From the Object Explorer, add a new computer. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 29 Printed Documentation 2. Assign the sample Event Log Consolidation and Monitoring Template. 3. Right-click on the Monitor you just created under your new computer and select Execute Now (Verbose). 4. The Application, System and Security Event Logs are downloaded and saved to the SQL Server Primary Log Repository you just created and configured. 5. From the Object Explorer, expand Log Repositories > Primary Log Repository then navigate to the computer you just downloaded the logs from. 6. Expand the computer to find the Event Logs node. 7. Expand the Event Logs to find the Application, System and Security nodes. 8. Right-click on the Application node and select View Top 10000 Consolidated Log Entries. The Select Display Filters dialog displays. 9. Check the Information, Warning and Error options then, if a filter is selected, click the button to clear the filter. Finally click OK. The Log Viewer displays. 10. Verify entries are displayed in the view. 11. From Windows Explorer, navigate to Primary Log Repository directory. 12. From the list view, you should see a file for each consolidated log. 13. You should now see a new table called [servername]_evt_application.elf where [servername] is the name of the server you downloaded the logs from. If you see this table, you have successfully downloaded the Event Log and saved it to your file system, otherwise the Primary Log Repository is not configured to use this directory. Check the Server Manager configurations and try again. Each log file is consolidated to its own file using the following naming conventions: Log Type Table Event Log [host]_[log].elf Syslog [host].slf Text Log [GUID] - A GUID is used in place of the filename. The text_logs.dat file maps the consolidated text log's filename to the GUID enabling the software to identify which table to read and write entries from. Related Topics Conserve Disk Space Database Settings Log Repository Retention Policy View Logs Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 30 Printed Documentation Conserve Disk Space When saving Event Logs to the Log Repository and using the File System format, new entries are downloaded and saved to a temporary file. Once the download is complete, the previously downloaded entries are appended to the temporary file. If saving data for a long period of time or if a server is generating large Event Logs over a short period of time, such as the Security Event Logs for example, these temporary files may get large (around 20 GB). To optimize Server Manager to conserve disk space: • • • • From the Database Settings properties page, configure Server Manager to use SQL Server. Use Range Schedules to evenly distribute Event Log downloads over time. The end result is a process that regularly downloads Event Logs rather than a process that fires off 90 downloads all at once. The default Event Log Consolidation Template uses an Hourly Range Schedule that automatically distributes Event Log downloads every hour. Limit the log retention policy to a manageable period. For example, save entries for 15 days in the Primary Log Repository and another 45 days in the Archive Log Repository for a total of 60 days. Every month at the end of the month make a database backup of the Archive Log Repository and save it to your organization's archives. When using an Event Log Consolidation and Monitoring Template, limit Post Consolidation Filter use. Instead, use Reports to access data on a daily basis rather than using post consolidation filters, which can result in frequent emails. Related Topics Database Settings Filters Log Repository Retention Policy Schedules Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 31 Printed Documentation Migrate to a New Server When necessary, Server Manager can be moved to a another server. To move your installation of Server Manager to another server: 1. Install the latest version of the software on the current server. a. From the server the Server Manager Service is installed, ensure the latest version of Server Manager is running. From the local Console, select Help > Check for Update. b. Once you have verified the latest version is running, backup the current configuration. From the local Console, select Tools > Backup Configuration. The Browse for Folder dialog displays. c. Select the diretory to backup the current configuration files too. 3. Choose a directory you can access from your new server. 2. a. Click OK. 4. Return the license. a. After purchasing a license from Veriato, you will receive a license key or set of keys via email. b. Install and run Server Manager. c. Select Edit > Server Manager Properties. The Server Manager Properties view displays. d. Select the Licensing tab then click Register License. The Register License Key dialog displays. e. Specify the email address used when purchasing and the license key you received via email. f. Click Submit. 5. Install, register and import the backed up configuration files on the new server. a. From the new server, download and install the latest version from http://www.Veriato.com/support/downloads.asp?ItemID=41. b. Select Edit > Server Manager Properties. The Server Manager Properties view displays. c. Select the Licensing tab then click Register License. The Register License Key dialog displays. d. Specify the email address used when purchasing and the license key you received via email. e. Click Submit. f. If you were previously using local databases to store history and/or log entries, use your database tools to restore the databases to the new server. g. Select Tools > Restore Configuration. When prompted to confirm to overwrite the current configurations, click Yes. The Browse for Folder dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 32 Printed Documentation h. Select the folder that contains the configuration files you previously backed up. i. Click OK. j. If you were previously using local databases to store history and/or log entries, select Edit > Server Manager Properties. The Server Manager Properties view displays. Select the Databases tab. From the Databases drop-down, select each database then click Test Connection. If the test fails, verify the settings and try again. Monitor a Rolling Text Log File (IIS) Many applications such as Internet Information Services (IIS) Manager, log to a daily log file. Each day the application creates a new file that contains the date within the name, for example ex100625.log or 2010 June 25th. This format is simple to implement and enables system administrators to easily archive log files. This tutorial shows you how to monitor rolling text log files by configuring Server Manager to monitor IIS logs. After verifying the requirements, check the location the log files reside on the IIS server, then configure the Text Log Consolidation Template in Server Manager. Requirements: • • Server 2012 Internet Information Services (IIS) version 8.x To check the log file location on the IIS server: 1. Logon to the target server. 2. From the Start menu select Administrative Tools > Internet Information Services (IIS) Manager. 3. From the left pane, select the target web site. 4. From the right pane, double-click Logging. 5. The log file path is listed within the Directory text box. By default the path is: %SystemDrive%\inetpub\logs\LogFiles, which expands to: c:\inetpub\logs\LogFiles. IIS writes the log files to a sub-directory called: W3SVC1 This is the directory you want to monitor. Now that you have the location, you need to configure Server Manager to monitor the directory. To configure the Text Log Consolidation Template: 1. Select File > New > Template. The Select Template Type dialog displays. 2. From the menu tree, expand Log Management > Text Log Management. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 33 Printed Documentation Double-click Text Log Consolidation. The Template Properties dialog displays. From the General tab, set the Name to IIS Log Monitor. Use the default settings. Select the Logs tab. From the Servers/Workstations drop-down, select the server where IIS is installed. From the Available Files tree, select the directory where the log files are located. The path displays in the text box below. 8. From the text box, append: \u_ex>yyMMdd>.log 3. 4. 5. 6. 7. 9. Click . The software checks the target directory for the existence of a file that matches the current date. If a file is not found, verify IIS is running, a daily log file exists and the mask has been entered correctly. If found, a prompt displays listing the discovered file: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 34 Printed Documentation 10. When prompted to add the mask, click Yes. The mask is added to the Assigned Files list. 11. Select the Function tab. 12. Use the Logical Name tab to specify a logical name which to consolidate all discovered log files. If you do not specify a Logical Name, each discovered file is saved to a unique database table. Automated Text Log Reports and Log Repository Retention Policy Templates require masked directory monitors to consolidate to a logical name. 13. Check Use logical filename then type: u_ex.log 14. Use the Entry Pattern tab to define how Server Manager decyphers unique log entries. Since IIS log entries are limited to a single line, leave the Enable entry pattern recognition option disabled. 15. Use the Read Method tab to define how each file is read the first time the file is discovered or updated. Use the default option Beginning of file. This read method will read all current entries in a newly discovered/monitored files, then consecutively read from the last known position. 16. Use the Consolidation, Filters and Actions tab to apply a consolidation filter, Log Repository Retention Policy Template and post consolidation Filters and Actions (e.g. to trigger an email alert when a specific entry is read). Create a filter that passes all "HTTP GET" requests and assign an action. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 35 Printed Documentation a. Click Add. The Assign Filter and Action dialog displays. b. c. d. e. f. g. Click . The Create New Filter dialog displays. Set the Name to HTTP Get Requests. Click New Criteria. From the Value text box, type GET. Check Match case. From the Criteria control group click Apply. The criteria is added to the Group and Criteria Tree. h. Click OK. The Filter is assigned. i. From the Action drop-down, select Actions > Email > Send an Email. j. Click the Edit action button . The Action Properties dialog displays. k. Verify an email address is assigned. If one is not, add a valid email address. Click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 36 Printed Documentation l. Click OK. The Filter and Action are added to the Post Consolidation Filter and Actions list. 17. Click OK. The Template is created and assigned to the localhost. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 37 Printed Documentation 18. Verify the monitor is running. a. From the Object Explorer, expand Computers, Devices and Hosts. b. Locate and expand your localhost. The IIS Log Monitor node displays. c. Right-click and select Explore. The Monitor Detail view displays. d. This view should show the monitor is running and every minute a new history line item should be added showing the monitor's results. e. From the Object Explorer, expand Log Repositories. f. Locate and expand your localhost. The u_ex.log node should now display. If the node is not visible press F5. If the node is still not visible, verify the IIS log contains data and the Log Repositories have been configured correctly. 19. Test the Monitor, Filter, and Action. a. Open your Internet browser then navigate to: http://localhost. b. At the top of the next minute, Server Manager should trigger an email alert that contains the targeted log entries. If the Action fails to email, check your Email Settings and try again. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 38 Printed Documentation Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 39 Printed Documentation Monitor CSV Files Server Manager enables you to monitor string as well as decimal values contained within CSV (comma separated value) files. For example, one of our customers monitors water flow rates through dams. The customer is able to receive notification when water flow rates fall outside expected values. Another more typical example is the monitoring of stock trading files. When monitored, you can receive notification when a stock exceeds or falls below a specific value. To create a CSV file monitor: 1. 2. 3. 4. 5. 6. Select File > New > Template. The Select Template Type dialog displays. From the menu tree, expand Log Management > Text Log Management. Double-click Text Log Monitor. The Template Properties dialog displays. Use the General tab to configure the frequency to scan the file for new entries. Select the Logs tab. From the Servers/Workstations drop-down, select the server the file resides. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 40 Printed Documentation 7. From the Available Files tree, select the file then click Add. The file is added to the Assigned Files list. 8. Select the Monitor tab then select the Filters and Actions tab. 9. Click Add. The Assign Filter and Action dialog displays. Click . The Create New Filter dialog displays. From the Type drop-down, select CSV. Type a unique Name. Use the Comma delimiter drop-down to select the character the column delimiter. The default is COMMA. 14. Click Load then select the target file. The Load CSV Column Headers dialog displays. 10. 11. 12. 13. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 41 Printed Documentation 15. If the file contains a column header, choose File contains a column header then from the list, select the row that contains the column header. 16. Click OK. The file is read and an attempt is made to determine the data type of each column. Each column is added to the Column definition. 17. Assign filter criteria. a. Click New Criteria. The Criteria control group is enabled. b. From the Attribute drop-down, select the column to monitor. c. Use the Operation drop-down to select the comparison operand (e.g. =, !=, <, >, <=, >=, Contains, Does Not Contain). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 42 Printed Documentation d. From the Criteria control group click Apply. The criteria is added to the Group and Criteria Tree. a. When you have finished adding your Filter Criteria, click OK. The Filter is assigned. b. From the Action drop-down, select the target action. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 43 Printed Documentation c. Click OK. The Filter and Action are added to the Filters and Actions list. 18. Click OK. The Template is created and assigned to the localhost. The monitor will start at the top of the next minute. If you chose the default Read Method (e.g. Beginning of File), the first time the monitor runs the assigned actions are triggered once for all entries that pass the Filter. Future scans will only trigger actions when new entries pass the Filter. Actions are only triggered once per scan. Use Gmail as a Backup Email Server You can configure Server Manager to use your Gmail account to send email alerts when your primary email server is unavailable or unable to send. To configure Gmail as a backup email server: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Email tab. 3. Check the Backup Email Server option then click Configure Backup. The Configure Backup Email Server Connection dialog displays. 4. Use the following values: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 44 Printed Documentation Servername smtp.gmail.com TCP Port Use port 465 for SSL/TLS Use port 587 for STARTTLS Username Enter your Gmail email address (e.g. [email protected]) Password Enter your Gmail password 5. From the Send test email to field, enter a non-gmail email address then click Test. A test email is sent. 6. Click OK. 7. From the Server Manager Properties view, click Close. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 45 Printed Documentation Management Console Management Console Server Manager is configured through the Management Console. The Console is a Windows client user interface application that enables you to remotely configure Server Manager, view log entries, view Monitor/Report detail and manually execute Monitors/Reports. Navigation The Console contains several views: Pane Description Object Explorer The central navigation view that contains all of Server Manager's configurable objects. Use the Object Explorer to create objects, assign objects, update objects, view object detail and delete objects. Service Output Tails the Server Manager log file containing errors, triggers, general activity, and verbose output. Use the Service Output pane to watch activity and troubleshoot monitors. Document View Displays object properties, Reports and Monitor detail. Remote Access The Console enables you to remotely connect to multiple Server Manager Services running on various networks. Once connected, both management and interrogation functions are proxied through the Server Manager Service simplifying remote management. The client/server interface is implemented using TCP port 6766. The TCP interface authenticates all incoming connections using Windows authentication. Access will only be granted if the user accessing the service belongs to the Administrators group. For secure environments, the TCP interface can be configured to encrypt all packets using private keys. Object Explorer The Object Explorer is the central navigation view that contains all of Server Manager's configurable objects. Use the Object Explorer to create objects, assign objects, update objects, view object detail and delete objects. These objects include: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 46 Printed Documentation Nodes Description Root Each configured Server Manager connection is added to the root. Computers, Devices and Hosts Contains all of the managed hosts and their monitors. This includes physical computers, hardware devices and network addressable applications (e.g. web sites and SQL Server instances). Monitors From within the Computers, Devices and Hosts node when viewing a host, assigned Templates appear under each host. Assigned Templates are referred to as Monitors. Monitors are a representation of a hostTemplate assignment or the result of a host group or Template groupTemplate assignment. Templates Contains assignable monitor configurations (e.g. ping every 5 seconds and upon 20% failure rate fire an email alert). Monitor Hierarchy Contains Monitor Hierarchy rules (e.g. when a ping monitor triggers, drop all corresponding Monitor error Actions). Reports Contains reports (e.g. daily Summary, Object Access, and Largest Files Reports). Log Repositories Contains consolidated log entries (e.g. domain controller Security Event Logs). Schedules Contains the frequency to execute Monitors, Reports and Auto Configurators (e.g. Daily, Hourly, Every Minute). Filters Contains Active Directory and log monitoring filters (e.g. only show error events). Actions Contains the actions, alerts, and notifications (e.g. email the systems administrators). Auto Configurators Contains the Auto Configurators (e.g. every week scan Active Directory and add newly discovered servers to Server Manager). To search the Object Explorer for a specific object: 1. From the Object Explorer, navigate to the location within the tree you would like to begin your search. 2. Press Ctrl + F. The Find dialog displays. 3. Enter the text you would like to search for. 4. Optionally, select Match case. 5. Optionally, select Use regular expressions (e.g. to search for 2 computers use the following regular expression syntax: (server01|server02). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 47 Printed Documentation 6. Optionally, select Search up. 7. Click Find Next. To continue searching press F3. Or Click Find All. The Find Results view displays. From this view, right-click on a result to view a list of menu items. Related Topics Actions, Alerts and Notifications Auto Configurators Computers, Devices and Hosts Filters Groups Monitor Hierarchy Reports Schedules Templates Options The Options dialog enables you to set user preferences for the Management Console. For example, automatically displaying the dashboard at startup. To modify the Server Manager Options: Select Tools > Options. The Options dialog displays. The following options are available: • • • • Startup Windows: select any of the following to be displayed when a new connection is established: o Dashboard o Service Output o Syslog Viewer o SNMP Trap Viewer o Error Report WMI Proxying: proxy WMI calls through the Server Manager Service Tray Icon: disable the tray icon Log Viewer: configure the log viewer options and fonts Related Topics Log Viewers Server Manager Properties Tray Icon Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 48 Printed Documentation Service Connections Server Manager is implemented using client/server architecture. The Management Console enables you to connect to remote installations of the service. The Connect to Service dialog provides the controls to create these connections. If you are only using the Console and/or Tray Icon, you can disable the Veriato Server Manager service via the Windows Service Control Manager. License key registration is only required on the server the service is running. Neither the Console nor the Tray Icon require a license key registration. To configure the Management Console and Tray Icon to connect to a remote service installation: 1. Install Server Manager on the computer you want to connect from. 2. Once installed, from that computer, select File > New > Server Manager Connection. The Connect to Service dialog displays. 3. Specify a unique Connection name. 4. Specify the Server name or IP address. 5. Specify the TCP port. The default is 6766. For more information see Management Server Settings. 6. Specify a Windows domain administratorUsername, Password and Domain. If the service is installed on another domain or within a workgroup, specify administrator credentials that reside on the target domain or server. If the service is installed on an off-domain computer or within a workgroup either clear the Domain field or within the Domain field specify the computer name where the service is installed. If left blank, your current Windows login credentials are used. 9. Choose to Encrypt packets then specify the private Key. Encryption must first be configured on the server where the service is running. For more information see Management Server Settings. 10. Click Test. If the connection fails, check the settings on both the remote server and the local computer and verify all firewalls are allowing traffic on the configured port. 11. To auto generate a connection name, click Generate Name. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 49 Printed Documentation 12. Click Connect. Related Topics Client Server Architecture Console Management Server Settings Enable and Disable Objects When using Server Manager you will likely find times you need to disable a Monitor, Report or Auto Configurator. For example, if you would like to shutdown all monitoring on a particular server while you apply operating system patches you can disable the host for a pre-determined period of time such as the next 30 minutes. Server Manager enables you to temporarily or permanently disable hosts, Templates, Reports and Auto Configurators. To disable an object: 1. From the Object Explorer, navigate to the target object (e.g. host group, host, Template, Report or Auto Configurator). 2. Right-click then select Disable. The Enable/Disable Properties dialog displays. If the Disable menu item is not available, the object is already disabled. By default objects are set to re-enable after 5 minutes. When disabling multiple objects, use the Selected [Object Type] drop-down to fine tune specific object settings. 5. To permanently disable the object, un-check Enabled. 6. To automatically re-enable the object, check Temporarily disable this object then check Automatically re-enable after. Set the period and units (e.g. 5 minutes). 7. Click Apply. To enable an object: 1. From the Object Explorer, navigate to the target object (e.g. host group, host, Template, Report or Auto Configurator). 2. Right-click then select Enable. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 50 Printed Documentation If the Enable menu item is not available, the object is already enabled. Related Topics Batch Functions Day and Time Exclusions Schedules Monitor Hierarchy Depending on the state of the directly assigned monitors, hierarchy rules enable you to suppress child group trigger and/or recovery Actions. To configure the monitor hierarchy: 1. From the Object Explorer, right-click on the Monitor Hierarchy node and select New Group. The Create New Monitor Group dialog displays. 2. Enter a Name for the group. 3. Optionally, select Suppress child group monitor &trigger actions when all directly assigned monitors have triggered. If any directly assigned monitors have not tiggered, child monitors will continue to trigger. 4. Optionally, select Suppress child group monitor recovery Actions immediately preceding the recovery of any directly assigned monitors. 5. Click OK. 6. From the Object Explorer, drag and drop each Monitor to the parent and child groups where appropriate. Registry Explorer The Registry Explorer allows you to view, modify, create, delete, and search remote registry keys and values. To view the Registry Explorer: 1. From the Object Explorer, navigate to the target computer. 2. Right-click and select Registry Explorer. The Registry Explorer view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 51 Printed Documentation To search for a registry key: 1. From the Registry Explorer, navigate to the location within the tree you would like to begin your search. 2. Press Ctrl + F. The Find dialog displays. 3. Enter the text you would like to search for. 4. Choose to search Keys, Values and/or Data. 5. Optionally, select Match case. 6. Optionally, select Match whole string only. 7. Optionally, select Use regular expressions (e.g. to search for 2 strings use the following regular expression syntax: (string01|string02). 8. Click Find Next. To continue searching press F3. To modify a registry value: 1. From the Registry Explorer, navigate to the target registry key. 2. From the list view, right-click on the value and select Properties. The Set [Type] Value dialog displays. 3. Update the value and click OK. To create a new registry key: 1. From the Registry Explorer, navigate to the target parent registry key. 2. Right-click and select New > Key. The New Key dialog displays. 3. Enter the Name and click OK. To create a new registry value: 1. From the Registry Explorer, navigate to the registry key. 2. Right-click and select New > [Type] Value where [Type] is one of the following: o String Value o Expandable String Value o Multi-String-Value o DWORD Value o QWORD Value o Binary Value 3. Enter the value and click OK. To delete a registry key or value: 1. From the Registry Explorer, navigate to the target registry key or value. 2. Press Del. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 52 Printed Documentation Import a Disk List If you have a list of disks or shares in a spreadsheet, CSV (comma separated values), or text file, you can import your list into Server Manager. When imported disk monitor Templates are created and assigned to each computer, you have the option of creating a single Template per computer or a Template for each disk or share listed in your file. If you have a list of computers, devices and/or hosts you would like to import see Import a Host List. To import a disk list: 1. Select File > Import > Disk List. 2. Follow the instructions found within the wizard. Related Topics Add Computers, Devices and Hosts Import a Host List Filename Masks When configuring some of the directory based Templates (e.g. Directory Cleaner, Directory Watcher or File Consolidation), you have the option to target or exclude specific filenames. Server Manager supports the standard Windows filter criteria (e.g. *.*) as well as our own date and time tag format enabling you to target or exclude files which the names contain the current date and/or time. The following tags are supported: Variable Tag Description Year yy or yyyy Use to replace the current year. Month M or MM Use to replace the current month. Day d or dd Use to replace the current day. Hour h or hh Use to replace the current hour. When specifying date and time tags wrap the tags with <>. For example: *.log <yyyyMMdd>.log Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 53 Printed Documentation Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 54 Printed Documentation Server Manager Properties Server Manager Properties The Server Manager Properties view enables you to configure the Server Manager Service (e.g. configure email server connection settings and backend databases). To view the Server Manager Properties: • Select Edit > Server Manager Properties. The Server Manager Properties view displays. The following tabs are available: o Licensing o Email o Databases o Active Directory o Syslog Server o Web Server Publishing o Management Server o HTML and Email Templates o WMI Email Settings Server Manager supports sending alerts, notifications, and Reports through email. Use the Email properties page to configure the outgoing email server connection settings. To configure the email settings: 1. 2. 3. 4. 5. 6. 7. 8. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Select the Email tab. Enter the Server Information for the email server that will be sending messages. Enter the Login Information to enable relay. If using Exchange Server and left blank, the login information defaults to the account the service is running under. Optionally, modify the From Information to specify the name and from address to appear in outgoing mail. Optionally, set and modify the Email Limiter to limit the number of emails sent over a period of time (e.g. seconds, minutes or hours). Once the limit is reached, messages are dropped for the remainder of the period. Dropped messages are logged to the service log file. Enter an email address to receive a test message then click Test. To use a backup email server when the configured email server is unavailable or unable to send an email, check the Backup Email Server option then click Configure Backup. The Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 55 Printed Documentation Configure Backup Email Server Connection dialog displays. Use the dialog to configure the backup email server (repeat steps 3-7) then click OK. 9. Once you are able to successfully send a test message, click Close. Related Topics Actions, Alerts and Notifications Use Gmail as a Backup Email Server Windows Service Log File Database Settings Database Settings Server Manager uses 5 database schemas to retain data: Schema/Role Description History Contains Monitor, Report and Auto Configurator history (e.g. execution time, state, results such as consumed disk space). Primary Log Repository/LogRepository Contains the LATEST consolidated log entries. (e.g. log entries less than 15 days old). Archive Log Repository/ArchiveLogRepository Contains ARCHIVED consolidated log entries previously saved to the Primary Log Repository (e.g. log entries 15 days and older). Auxiliary Log Repository/AuxiliaryLogRepository Contains AUXILIARY or BACKUP consolidated logs. Typically used to view old database backups for auditing purposes. Undefined This database is not used. The Undefined setting allows you to disable a database while maintaining the connection settings for later use. Server Manager supports SQL Server, MySQL, Oracle as well as our own file system format (Local File System) when a database is not an option. When consolidating log entries you will notice significantly better performance using SQL Server over our file system format. Server Manager has been optimized for SQL Server 2012/8/5. To change the data provider type: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Databases tab. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 56 Printed Documentation 3. From the Databases drop-down, select History or the equivalent entry whose Role is set to History. 4. From the Provider drop-down, select SqlServer or other target data provider. A provider specific view displays. 5. Configure the provider specific properties. For detailed instructions see the appropriate tutorial: o Configure Server Manager to use SQL Server. o Configure Server Manager to use MySQL. o Configure Server Manager to use the file system. 6. Click the button. The database is automatically initialized. 7. Repeat these steps for the LogRepository and ArchiveLogRepository roles. When configuring SQL Server or MySQL, Server Manager will automatically create the database if it does not already exist; however, the default database options are used. To create a database from within the database specific management tools, see Configuring Server Manager to use SQL Server or Configuring Server Manager to use MySQL. When configuring Oracle, you must first create the Oracle databases and access accounts using Oracle client tools. Related Topics Configure Server Manager to use SQL Server Configure Server Manager to use MySQL Configure Server Manager to use the file system. Conserve Disk Space Log Repository Retention Policy Convert Data Server Manager enables you to convert previously consolidated log entries and history from one data type to another. For example, if you are currently consolidating log entries to our file system format and would now like to use SQL Server, Server Manager can move the data from the file system to SQL Server for you. To load previously consolidated log entries to another database: Disable all Templates, Reports and Auto Configurators prior to converting data. 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 57 Printed Documentation 2. Select the Databases tab. 3. Create 3 new databases: Primary Log Repository, Archive Log Repository and History. For each database: 1. Click the button. 2. Set the Role to Undefined. If the Role is not set to Undefined currently running Monitors and Reports will immediately read and write from this database. 3. Enter a Name. 4. Set the Provider to the SqlServer or other provider you would like to use. A provider specific view displays. 5. Configure the provider specific properties. For detailed instructions see the appropriate tutorial: Configure Server Manager to use SQL Server Configure Server Manager to use MySQL. Configure Server Manager to use the file system 4. 5. 6. 7. 8. 6. Click the button. Click the Convert Data button. The Convert Data dialog displays. Under the Source data provider drop-down select the current database. Under the Target data provider drop-down select the new database. Click the Convert button. Please be patient as this process can take several hours. Once completed the Roles will be automatically swapped. Once the process is complete, re-enable your Templates, Reports and Auto Configurators. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 58 Printed Documentation Related Topics Configure Server Manager to use SQL Server Configure Server Manager to use MySQL. Configure Server Manager to use the file system. Enable and Disable Objects Active Directory Settings Configure Active Directory connections for the Auto Configurators and more importantly adding computers to the Object Explorer. The Auto Configurators automatically scan for computers connected to Operational Units (OUs). Once discovered, computers are filtered, added, and then Templates and Reports are assigned. For multiple domains, create a connection for each domain's OU and specify the credentials. When the Auto Configurator runs, the specified credentials are assigned to the newly added computers. By default Server Manager discovers your Active Directory server; however, if the server the service is running on is off-domain or you would like to connect to multiple Active Directory Servers you must configure each connection. When scanning multiple domains, create a connection for each domain's OU and specify the appropriate domain administrator credentials. When the Auto Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 59 Printed Documentation Configurator runs the specified credentials are assigned to all newly added computers. To configure the active directory settings: 1. 2. 3. 4. 5. 6. 7. Select Edit > Server Manager Properties. From the Server Manager Properties view, select the Active Directory tab. Enter the Host (e.g. hostname or IP). Enter the Path. Optionally, check Authenticate then enter the authentication credentials. Click Test Connection to verify you are able to connect. Click Close. Related Topics Add Computers, Devices and Hosts Auto Configurators Syslog Server Settings Server Manager contains both a UDP and TCP Syslog server. These syslog servers can be used to collect, monitor, and consolidate syslog messages from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a message is sent from a device, the receiving Syslog server automatically adds the device's IP or hostname to the Object Explorer. Once added, the message is saved to the Log Repository. Use the Syslog Server Settings properties page to: • • Configure syslog consolidation options Configure the TCP and UDP servers To configure the syslog server settings: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 60 Printed Documentation 2. Select the Syslog Server tab. 3. Select one of the following: Save syslog messages from all sources Saves incoming Syslog messages from all devices to the Primary Log Repository. Use the drop-down to assign a Syslog Consolidation Template. To modify the existing Syslog Consolidation Template, click Require explicit Syslog Consolidation Template assignment to each device prior to saving messages . Only saves incoming Syslog messages from devices with an assigned Syslog Consolidation Template. To assign a Syslog Consolidation Template, from the Object Explorer navigate to Templates > Sample Templates > Syslog Consolidation. Rightclick and select Assign > Computer, Device or Host. 4. Optionally, select Display the syslog viewer at startup. 5. Optionally, select Listen for UDP Syslog Messages. Set the port and bind address. 6. Optionally, select Listen for TCP Syslog Messages. Set the port, bind address and idle timeout and message delimiters. The following message delimiters are available: CRLF (ASCII 13, ASCII 10) a line break type typically used for Windows OS. One line terminator. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 61 Printed Documentation CR (ASCII 13) a line break type typically used for Mac OS. "CR" is known as "return." LF (ASCII 10) PIX Firewall: a line break type typically used for Unix. "LF" is known as "newline." Null (ASCII 00) Netscreen Firewall: a line break type typically used for Notepad. 7. Click Close. Related Topics Syslog Consolidation Template Syslog Monitor Template Web Server Publishing Settings Server Manager can automatically publish a table of contents and group summaries to your web server. By default, this is done once a minute at the top of the minute. Once configured, you can view the current status of any group, host, or monitor through your Internet browser or handheld device such as an iPhone or Android. Server Manager does not include a Web Server. You must install a 3rd party web server such as Internet Information Services (IIS) or Apache. To configure the web server publishing settings: 1. 2. 3. 4. 5. Select Edit > Server Manager Properties. The Server Manager Properties view displays. Select the Web Server Publishing tab. Check Enabled. Enter or select the Path to write HTML documents. If using IIS, this is your virtual directory. Select the Group by option (e.g. Host, Template, Template Type). When grouped by Template or Template Type some Monitors produce Monitor specific data columns and/or graphical images (e.g. disk space, directory size, file count). 6. Click Close. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 62 Printed Documentation An example table of contents: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 63 Printed Documentation An example of a grouped summary, grouped by host: Management Server Settings The Server Manager Service is controlled by the Management Console through a TCP/IP interface. Use the Management Server Settings properties page to configure the port, bind address, and encryption options. Once updated, the service must be restarted before the changes can take effect. To configure the management server settings: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Management Server tab. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 64 Printed Documentation 3. Enter the TCP Port. The default is 6766. 4. Enter the Bind address. The default is 0.0.0.0. 5. Optionally, select to Encrypt packets and enter a private encryption Key. This is the same key used in Service Connections. 6. 7. 8. 9. 10. Click Close. When prompted to restart the service click Yes. The service is restarted. From the Object Explorer, navigate to the root node (e.g. Server Manager). Right-click and select Connection Properties. The Connect to Service dialog displays. Update any values you modified. Click Connect. Related Topics Client Server Architecture Management Console HTML and Email Template Settings When generating HTML files and HTML emails, Server Manager uses HTML templates to generate the appropriate content. HTML templates are HTML files that define the styles and variable content by using special tags. For example, when a low free disk space alert is fired, Server Manager loads the appropriate disk space monitor HTML template, then parses the content and replaces tags such as {FREE_SPACE} with actual values. The primary purpose of HTML templates is to enable you to fully customize the styles and content. The default HTML templates are located in the installation sub-directory, HtmlTemplates. The easiest way to learn how the HTML templates work is to view them within a text editor. Custom HTML templates must reside in the program data sub-directory, HtmlTemplates. The default locations on Server 2012/2008 are: C:\Program Files\Veriato\Server Manager\HtmlTemplates C:\ProgramData\CornerBowl\Server Manager\HtmlTemplates To configure the HTML and email templates: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the HTML and Email Templates tab. 3. Locate then click the HTML template to override, then click browse '...' button. The Select HTML Template dialog displays. 4. Click Open With. 5. Choose an editing application to open the file. 6. Use the editor to make any changes, then save the file to another filename. This is important as changes to the default file will be overwritten the next time you install a new build. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 65 Printed Documentation 7. Once you have created your new HTML template file, from the Select HTML Template dialog, check Override default HTML template then click 8. Select the file you just created, click Open 9. Click OK. . To assign a custom HTML template to a specific HTML file or email action: 1. Create your own custom HTML template as described above; however, do not override the default HTML template. 2. Once you have created your custom HTML template, select File > New > Action. The Create New Action dialog displays. 3. From the Type drop-down select Email or File. 4. Fill out the appropriate fields, then check Override the default HTML template. 5. From the drop-down select the new HTML template you just created. 6. Click OK. Variable Tags For a detailed list of the available variable tags see Action Variable Tags. Object Item Sections Some functionality, such as Event Log Reports, include arrays of items. These HTML templates include <ENTRY_ODD> and <ENTRY_EVEN> tags. See Action Variable Tags for a detailed list of available item variable tags. For free disk space alerts you can define the item variables tags like so: <ENTRY_ODD>\\{HOST}\{DISK} {FREE} {USED} {CAPACITY}</ENTRY_ODD> <ENTRY_EVEN>\\{HOST}\{DISK} {FREE} {USED} {CAPACITY}</ENTRY_EVEN> Image Variable Tags The following HTML specific image tags are also available (not available for text based emails): STATE_IMG Draws the target object's state image. HISTORY_IMG Draws a server monitor history chart. DISK_BAR_IMG Draws a disk utilization horizontal bar image. DISK_PIE_IMG Draws a disk utilization pie chart. DISK_HISTORY_IMG Draws a disk utilization history chart. DIRECTORY_BAR_IMG Draws a directory size horizontal bar image. DIRECTORY_PIE_IMG Draws a directory size pie chart. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 66 Printed Documentation DIRECTORY_HISTORY_IMG Draws a directory size history chart. FILE_COUNT_BAR_IMG Draws a file count horizontal bar image. FILE_COUNT_HISTORY_IMG Draws a file count history chart. FILE_SIZE_BAR_IMG Draws a file size horizontal bar image. FILE_SIZE_HISTORY_IMG Draws a file size history chart. To display the object state image define the variable tag like so: <img src="{STATE_IMG}" border="0" width="16px" height="16px"/> Group By HTML Templates Some Log HTML templates have the capability of grouping entries by host, host then log, log then host, and log. To add grouping to your HTML template wrap the <ENTRY_ODD> and <ENTRY_ODD> tags described above with one or both of the following tags: The following variable tags are available: {GROUP_BY_HOST} Displays the target hostname. {GROUP_BY_LOG} Displays the target log. The type of grouping (host then log, log then host, host, or log) depends on the order you insert the tags. For example, if you add the following section to an Event Log Report HTML Template, the software will group by host then log: <GROUP_BY_HOST><GROUP_BY_LOG> <div class="hostLogTable" >{GROUP_BY_HOST}\{GROUP_BY_LOG}</div> <table class="log"> <tr class="hdr"><td>Level</td><td>Computer</td><td>Log</td><td>Date and Time</td><td>Source</td><td>Event</td></tr> <ENTRY_ODD> <tr class="light"><td>{LEVEL}</td><td>{HOST}</td><td>{LOG}</td><td>{DATE} {TIME}</td><td>{SOURCE}</td><td>{EVENT}</td></tr> <tr class="light"><td colspan="6" class="msg">{MESSAGE}</td></tr> </ENTRY_ODD> <ENTRY_EVEN> <tr class="dark"><td>{LEVEL}</td><td>{HOST}</td><td>{LOG}</td><td>{DATE} {TIME}</td><td>{SOURCE}</td><td>{EVENT}</td></tr> <tr class="dark"><td colspan="6" class="msg">{MESSAGE}</td></tr> </ENTRY_EVEN> </table> </GROUP_BY_LOG></GROUP_BY_HOST> Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 67 Printed Documentation The styles used above are for illustrative purposes only. Related Topics Action Variable Tags WMI Settings Many functions within Server Manager utilize Microsoft's Windows Management Instrumentation (WMI) API (e.g. Event Log management, CPU, memory, services, processes, Access Permissions Reports). Use the WMI properties page to configure the local Authentication level and Block size. To configure the WMI settings: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the WMI tab. 3. Select the Authentication level. The following options are available: None No authentication is performed during the communication between client and server. All security settings are ignored. Connect The normal authentication handshake occurs between the client and server, and a session key is established but that key is never used for communication between the client and server. All communication after the handshake is insecure. Call Only the headers of the beginning of each call are signed. The rest of the data exchanged between the client and server is neither signed nor encrypted. Packet (Default) All data passed via WMI is unencrypted. PacketIntegrity Each packet of data is signed in its entirety but is not encrypted. Because all of the data is signed by the sender, the recipient can be certain that none of the data has been tampered with during transit. PacketPrivacy All data passed via WMI is encrypted. Unchanged Authentication remains as it was before. 4. Set the block size of the grouped results that WMI will return. The default is 25. 5. Click Close. 6. Optionally, configure the WMI Quota to prevent Quota Violation Errors. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 68 Printed Documentation Related Topics Computer, Device and Host Properties Quota Violation Errors Windows Firewall Web Proxy Server Settings For security purposes, many organizations require all HTTP/S packets to pass through a web proxy server. If your organization implements a web proxy server, you must configure Server Manager to forward all HTTP requests through your proxy server. You can configure Server Manager to use your proxy server when: • • Registering your license. Creating a new HTTP/S monitor. To configure when registering your license: 1. 2. 3. 4. Select Edit > Server Manager Properties > Licensing tab. Click the Register License button. The Register License Key dialog displays. Click the Configure Web Proxy button. The Web Proxy Server Properties dialog displays. Continue with the "To enter web proxy server settings" procedure below. To configure when creating a new HTTP/S Monitor: 1. 2. 3. 4. 5. 6. 7. Select File > New > Template. The Select Template Type dialog displays. From the menu tree, expand Internet Server Monitors > Web Monitors Double-click HTTP/S Monitor. The Entry URL dialog displays. Enter the URL then click OK. The Template Properties dialog displays. Select the Monitor tab. Click the Configure Web Proxy button. The Web Proxy Server Properties dialog displays. Continue with the "To enter web proxy server settings" procedure below. To enter the web proxy server settings: 1. Check the My network requires me to use a proxy server when sending HTTP/S packets check box. 2. Specify the proxy server's hostname or IP address and port. 3. If the proxy server requires you to authenticate, check the Authenticate check box and enter the credentials. 4. Click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 69 Printed Documentation SNMP Server Settings Server Manager contains an internal SNMP server. The SNMP server can be used to receive and forward traps from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a trap is sent from a device, the receiving SNMP server automatically adds the device's IP or hostname to the Object Explorer. Once added, the trap is displayed via a message box action. Use the SNMP Server Settings properties page to: • • Configure SNMP trap options Configure the SNMP server To configure the SNMP server settings: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the SNMP Server tab. 3. Select one of the following: Trigger traps from all sources Triggers incoming SNMP traps from all devices. Use the dropdown to assign a SNMP Trap Template. To modify the existing SNMP Trap Template, click Require explicit SNMP Trap Template assignment to each device prior to triggering traps. . Only triggers incoming SNMP traps from devices with an assigned SNMP Trap Template. To assign a SNMP Trap Template, from the Object Explorer navigate to Templates > Sample Templates > SNMP Traps. Right-click and select Assign > Computer, Device or Host. 4. Optionally, select Display the SNMP viewer at startup. 5. Optionally, select Listen for SNMP Traps. Set the port and bind address. 6. Optionally, select Enable DNS lookup. If disabled, devices sending SNMP traps are listed within the Object Explorer using their IP address rather than their hostname. Click Flush Cache when you want to clear the internal IP/Hostname cache. Clearing the cache will trigger the SNMP server to check DNS the next time an SNMP trap is received. 7. Use the Object Identifier Alias view to assign aliases to specific Object Identifiers. 8. Click Close. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 70 Printed Documentation Computers, Devices and Hosts Computers, Devices and Hosts A computer, device or host is defined as a unique IP or other addressable name. This is typically a Windows Server/Workstation, a device (e.g. switch, router or firewall) or a host (e.g. www.Veriato.com). How it works: Once a computer, device or host has been created it must be assigned to a Template. Upon being assigned to a Template, Server Manager immediately calculates and saves the next execution time. The Object Explorer adds a monitor node under the assigned computer. Every minute at the top of the minute Server Manager checks to see if a monitor should be executed. If a monitor is scheduled to execute, Server Manager creates a new thread. The thread then executes the monitor, fires Actions, saves the results to the history database and finally calculates and saves the next execution time. Add Computers, Devices and Hosts Computers, devices (e.g. switches and routers) and hosts (e.g. www.mycompany.com, mail.mycompany.com) can be added to Server Manager the following ways: • • • • • • Type the IP address or hostname Browse your Windows network Browse your Active Directory tree Map a computer, device or host Import a list of computers, devices and hosts from a text or CSV file Import a list of disks from a text or CSV file To add a computer, device or host: 1. From the Object Explorer, select the target host group. If a target host group is not selected, new hosts will be added to the root. 2. Select File > New > Computer, Device or Host. The Add Computers, Devices and Hosts dialog displays. 3. Enter the IP address or hostname (e.g. 10.1.0.100 or mail.mycompany.com). Or From the drop-down, choose a method to select multiple hosts: o Browse Network - Search for computers on your Windows network. This method is similar to viewing your network within Windows Explorer. o Browse Active Directory - Search for computers within your Active Directory tree. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 71 Printed Documentation Map a Computer, Device or Host - Add a computer that requires logon as credentials or cannot be discovered within the Windows network. o Select Localhost - Select the local computer. 4. Click the OK button to add the listed computers, devices or hosts. o To import a computer, device or host list: 1. Select File > Import > Host List. 2. Follow the instructions found within the wizard. For more information see Import a Host List. To import a disk list: 1. Select File > Import > Disk List. 2. Follow the instructions found within the wizard. For more information see Import a Disk List. Related Topics Active Directory Settings Groups Import a Disk List Assign Computer, Device or Host To assign a computer, device or host to a Template: 1. From the Object Explorer, navigate to the computer, device or host you want to assign a Template. 2. Right-click and select Assign > Template. The Select Multiple Templates dialog displays. 3. To filter the tree of Templates, choose the Template type from the drop-down. 4. Check the Templates to assign then click OK. Map Computers, Devices and Hosts When managing Windows servers or workstations in multi-domain or non-domain environments, DNS may not be able to resolve some computer names. This scenario may result in either "The RPC server is Unavailable" or "The network path was not found" errors. Users are also often prompted with "Access Denied" errors. An Access Denied error occurs when the account the service is running under or the account the user is logged in as does not have the required access permissions to execute WMI functions (e.g. downloading Event Logs or monitoring CPU load) or discover administrator disk shares (e.g. c$, d$ and e$). Finally, some server names are complex or uninformative (e.g. SRV0001UT). Mapping hosts enables you to create your own alias for either a hostname or IP address. With the example SRV0001UT, you could Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 72 Printed Documentation assign an alias such as "UTAH Database Server." Once assigned, all displays of SRV0001UT within the Management Console are replaced with the alias. To map a computer, device or host: 1. From the Object Explorer, select the target host group. If a target host group is not selected, new hosts will be added to the root. 2. Select File > New > Computer, Device or Host. The Add Computers, Devices and Hosts dialog displays. 3. From the drop-down, select Map a Computer, Device or Host. The Map Computer, Device or Host dialog displays. 4. Specify the addressable hostname or IP address, Windows username, password and domain that enables you to access the remote computer. If accessing an off-domain server or workstation either clear the domain drop-down or specify the remote computer name. 5. Optionally, use the Alias field to assign a user friendly name. When specified, the Management Console will list the computer using the alias in place of the hostname or IP address. 6. Click OK. The dialog closes. 7. From the Add Computers, Devices and Hosts dialog click OK. Related Topics Access Denied Errors Batch Assign Logon As Credentials The RPC server is unavailable Errors Computer, Device and Host Properties The Computer, Device and Host Properties view enables you to: • • • • Assign logon as credentials Enable and disable a host Configure the WMI quota Enable and configure SNMP To view Computer, Device or Host Properties: 1. From the Object Explorer, navigate to the target computer, device or host. 2. Right-click and select Host Properties. The Host Properties dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 73 Printed Documentation To assign logon as credentials: 1. Select the Logon As tab. 2. Specify the Windows username, password and domain that enables you to access the remote computer. If accessing an off-domain server or workstation either clear the domain dropdown or specify the remote computer name. 3. Optionally, use the Alias field to assign a user friendly name. When specified, the Management Console will list the computer using the alias in place of the hostname or IP address. 4. Click OK. For more information see Assign Logon as Credentials. To enable or disable a host: When disabled, all monitors are shutdown and the host is removed from all Reports. 1. Select the Enable/Disable tab. 2. To disable un-check Enabled option. 3. To configure Server Manager to automatically re-enable the host after a period of time, check Temporarily disable the object then check Automatically re-enable after. Finaly, select the period to wait prior to re-enabling. 4. Click OK. To configure the WMI quota: 1. Select the WMI tab. 2. If you are receiving a Quota Violation error when downloading large Event Logs such as domain controller security logs, double the Memory per host value. If the Memory per host is the same value as Memory all hosts value, double both the Memory per host and the Memory all hosts values. 3. Click OK. To enable and configure SNMP: 1. 2. 3. 4. Select the SNMP tab. Check Enable. Configure the SNMP connection settings. Click OK. To assgin an email address to send notifications when monitors trigger: 1. Select the Contact tab. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 74 Printed Documentation 2. From the Addresses drop-down to select the email address. If the address does not exist, click Add. 3. Click OK. To exclude specific Templates: 1. Select the Template Exclusions tab. 2. From the Temlates drop-down select the Templates to exclude. 3. Click OK. Related Topics Batch Assign Logon As Credentials Quota Violation Errors Assign Logon As Credentials When managing Windows servers or workstations in multi-domain or non-domain environments users are often prompted with Access Denied errors. An Access Denied error occurs when the account the service is running under or the account the user is logged in as does not have the required access permissions to execute WMI functions (e.g. downloading Event Logs or monitoring CPU load) or discover administrator disk shares (e.g. c$, d$ and e$). To assign or update logon as credentials to multiple computers simultaneously, see Batch Assign Logon As Credentials. To add a new computer and assign logon as credentials: 1. Select File > New > Computer, Device or Host. The Add Computers, Devices and Hosts dialog displays. 2. From the drop-down, select Map a Computer, Device or Host. The Map Computer, Device or Host dialog displays. 3. Specify the addressable hostname or IP address, Windows username, password and domain that enables you to access the remote computer. If accessing an off-domain server or workstation either clear the domain drop-down or specify the remote computer name. 4. Optionally, use the Alias field to assign a user friendly name. When specified, the Management Console will list the computer using the alias in place of the hostname or IP address. 5. Click OK. The dialog closes. 6. From the Add Computers, Devices and Hosts dialog click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 75 Printed Documentation To update or add logon as credentials to an already existing computer: 1. From the Object Explorer, navigate to the target computer. 2. Right-click and select Host Properties. The Host Properties dialog displays. 3. Specify the addressable hostname or IP address, Windows username, password and domain that enables you to access the remote computer. If accessing an off-domain server or workstation either clear the domain drop-down or specify the remote computer name. 4. Optionally, use the Alias field to assign a user friendly name. When specified, the Management Console will list the computer using the alias in place of the hostname or IP address. 5. Click OK. Related Topics Access Denied Errors Batch Assign Logon As Credentials Assign Service Logon As Credentials Copy Assignments Server Manager enables you to copy all assigned Templates from one host to another. To copy assigned Templates: 1. From the Object Explorer, navigate to the source host. 2. Right-click and select Copy Assignments to. The Select the Target Computer, Device or Host dialog box displays. 3. From the drop-down select the target host. Or Enter the name of the host. Or Click the button. The Enter Hostname or IP Address dialog displays. Enter the computer name, device IP or hostname. Click OK. If the computer, device or host does not exist, it is created and added to the root. 4. Click the button to view or edit the host properties. 5. Click the button to clear the drop-down selection. 6. Click the 7. Click OK. button to delete the host from the system. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 76 Printed Documentation Import a Host List If you have a list of computers, devices and/or hosts in a spreadsheet, CSV (comma separated values) or text file you can import your list into Server Manager. When imported, you have the option of assigning logon as credentials, host groups, Template groups, Templates, Report groups, and Reports. If you have a list of disks or shares you would like to import see Import a Disk List. To import a host list: 1. Select File > Import > Host List. 2. Follow the instructions found within the wizard. Related Topics Add Computers, Devices and Hosts Import a Disk List Search for Computers, Devices and Hosts Many functions throughout Server Manager require you to find or select multiple computers. The Search dialog provides a means to search the network, Active Directory or configured hosts depending on the how the dialog was displayed. To display the search dialog: 1. Select File > New > Computer, Device or Host. The Add Computer, Devices and Hosts dialog displays. From the drop-down select Browse Network or Browse Active Directory. The Browse dialog displays. Or Select Edit > Batch > Update/Delete Computers, Devices or Hosts. The Select Multiple Computers, Devices and Hosts dialog displays. 2. Select the node to search. If no node is selected, the entire tree is searched. 3. Click Search. The Search for Computers dialog displays. To search for computers, devices and hosts: 1. From the Search for Computers dialog, specify your search criteria. 2. Use the Select computers that contain the following text text box to search for computers that contain a portion of the specified text. 3. To search for multiple computers by name check Use regular expressions (e.g. (server01|server02)). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 77 Printed Documentation 4. Optionally, create and/or assign an Active Directory computer property filter, which enables you to search your AD tree and filter each discovered computer for specific criteria (e.g. only pass computers that have the word "Server" embedded in the "operatingSystem" property). 5. Choose to search for a specific Computer type (e.g. Servers, Domain Controllers, SQL Servers, or Workstations). 6. Choose to Search in sub-folders. 7. Click Search. The search is preformed. When complete the results are listed. 8. To select all results click Select Computers otherwise multi-select the computers of interest then click Select Computers. Browse Active Directory Dialog The Active Directory dialog enables you to you to navigate and search through your Active Directory tree to select computers. To display the dialog: 1. Select File > New > Computer, Device or Host. The Add Computers, Devices and Hosts dialog displays. 2. From the drop-down, choose Browse Active Directory. The Browse Active Directory dialog displays. To select multiple computers: Check the computers to assign then click OK. Or Click the Search button to search for specific computers. Related Topics Active Directory Settings Browse Network Dialog The Browse Network dialog enables you to you to navigate and search through your network to select computers. To display the dialog: 1. Select File > New > Computer, Device or Host. The Add Computers, Devices and Hosts dialog displays. 2. From the drop-down, choose Browse Network. The Browse Network dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 78 Printed Documentation To select multiple computers: Check the computers to assign then click OK. Or Click the Search button to search for specific computers. Templates Templates When designing Server Manager one of our primary goals was to produce a highly scalable and easily configurable software package. The result was a system that uses what we call Templates. A Template is defined as a configurable object that defines properties for an executable function that is assigned to one or more hosts, host groups, Template groups and Summary Reports. For example: • • A Ping Template that defines the failure rate prior to triggering. An HTTP Template that sends an email alert when any assigned website is down. How it works: Once a Template has been created it must be assigned to a computer, device or host. Upon being assigned to a computer, Server Manager immediately calculates and saves the next execution time. The Object Explorer adds a Monitor node under the assigned computer. Every minute at the top of the minute Server Manager checks to see if a Monitor should be executed. If a Monitor is scheduled to execute, Server Manager creates a new thread. The thread then executes the Monitor, fires Actions, saves the results to the history database and finally calculates and saves the next execution time. To create a Template: 1. Select File > New > Template. The Select Template Type dialog displays. 2. Double-click the Template type to create. The Template Properties dialog displays. Unlicensed Template types appear in gray text. If you would like to create a Template that is not currently licensed, please contact Veriato to upgrade your license. 3. Configure the Template Properties. 4. When applicable, assign target hosts, host groups, and Template groups. 5. When you have finished configuring the Template, click the OK to save the Template. To assign a Template to computers, devices and hosts: 1. From the Object Explorer, navigate to the Template you want to assign a host. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 79 Printed Documentation 2. Right-click and select Assign > Computer, Device or Host. The Select Multiple Computers, Devices and Hosts dialog displays. 3. Check the computers to assign then click OK. Or Click the Search button to search for specific computers. Sample Templates Server Manager includes sample Templates of which several are initially assigned to the localhost. The sample Templates can be modified and assigned to other computers as necessary. To view the sample Templates, from the Object Explorer, expand the Templates node then select Sample Templates. Available Templates Type Description Event Log Consolidation and Monitoring Download, consolidate, filter and alert on Windows Event Log entries. Licensing Log Manager Event Log File Backup Backup, archive, compress, encrypt Log Manager and sign Event Log files (.evt and .evtx files). Event Log Monitor Real-time and poll monitor mission Log Manager critical Event Logs for specific entries. File Consolidation Copies or moves files from one Log Manager directory to another. Includes options to stop and restart services and processes, compress, encrypt and sign. File Size Monitor Monitor a file for maximum size. Log Manager Idle File Monitor Monitor application text log files for inactivity. Log Manager Syslog Backup Backup, archive, compress, encrypt Log Manager and sign consolidated syslog entries. Syslog Consolidation Consolidate syslog messages. Log Manager Syslog Monitor Monitor syslog messages for Log Manager Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 80 Printed Documentation specific entries. Text Log Consolidation Consolidate application text log files. Log Manager Text Log Monitor Monitor application text log files for specific entries. Log Manager Log Repositry Retention Policy Truncates and/or archives Log Manager previously consolidated log entries from the Log Repository. Defragment Disks Schedule the service to remote execute disk defragmentation. Disk Monitor Delete Temporary Files Delete temporary files. Disk Monitor Directory Cleaner Delete files. Disk Monitor Directory Size Monitor Monitor a directory's size. Disk Monitor Directory Watcher Monitor, log and trigger alerts when a directory or file is created, modified, renamed or deleted. Disk Monitor Disk Space Monitor Monitor free disk space. Disk Monitor File Count Monitor Monitor the number of files a directory contains. Disk Monitor SMART Status Monitor Monitor SMART Predictive Failure status. Disk Monitor Active Directory Monitor Verify your Active Directory is up and running. Internet Server Monitor CPU Monitor Monitor CPU load over time. Internet Server Monitor Create Process Schedule a process or batch file to run. Internet Server Monitor Digital Signature Expiration Monitor the expiration date found Internet Server Monitor within digitally signed executables. DNS Monitor Check the availability of a DNS server and the accuracy of a record. DNSBL (DNS Blacklist) Check for the existence of a Internet Server Monitor hostname or IP address in an array Server Manager Guide © 2016 Veriato, Inc., all rights reserved. Internet Server Monitor 81 Printed Documentation of blacklists. Domain Expiration Check a domain's expiration date. Internet Server Monitor FTP Monitor Verify the availability of an FTP server. Internet Server Monitor HTTP/S Monitor Verify a website is available and optionally returning the expected content. Internet Server Monitor IMAP Monitor Verify the availability of an IMAP email server. Internet Server Monitor Memory Monitor Monitor memory load over time. Internet Server Monitor MySQL Monitor Verify a MySQL database is available and able to execute a select statement. Internet Server Monitor ODBC Monitor Verify an ODBC database is available and able to execute a select statement. Internet Server Monitor Oracle Monitor Verify an Oracle database is available and able to execute a select statement. Internet Server Monitor Ping Monitor Use ICMP to ping a remote host. Internet Server Monitor POP3 Monitor Verify the availability of a POP3 email server. Internet Server Monitor Process Monitor Monitor a process. Internet Server Monitor Process Resources Monitor Monitor a process's resources over Internet Server Monitor time. Registry Value Monitor Monitor Windows Registry key values. Internet Server Monitor SMTP Monitor Verify an SMTP email server is available and able to send email. Internet Server Monitor SNMP GET Monitor Monitor SNMP variables. Internet Server Monitor SQL Server Monitor Verify a SQL Server database is available and able to execute a select statement. Internet Server Monitor Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 82 Printed Documentation SSL Certificate Expiration Check an SSL certificate's expiration date. Internet Server Monitor Synchronize Clock Synchronize system clocks with a Network Time Protocol server. Internet Server Monitor TCP Port Monitor Verify a TCP port is accepting connections and optionally returning a packet. Internet Server Monitor Throughput Monitor Uploads and downloads a file to an Internet Server Monitor FTP server then calculates and saves the throughput information. Windows Service Monitor Verify a Windows Service is either running or stopped. Internet Server Monitor Windows SSL Certificate Expiration Monitor SSL certificates installed on Windows servers. Internet Server Monitor Related Topics Batch Update Templates Groups Add Template When designing Server Manager one of our primary goals was to produce a highly scalable and easily configurable software package. The result was a system that uses what we call Templates. A Template is defined as a configurable object that defines properties for an executable function that is assigned to one or more hosts, host groups, Template groups and Summary Reports. To create a Template: 1. Select File > New > Template. The Select Template Type dialog displays. 2. Double-click the Template type to create. The Template Properties dialog displays. Unlicensed Template types appear in gray text. 3. Configure the Template Properties. 4. When applicable, assign target hosts, host groups, and/or Template groups. 5. When you have finished configuring the Template, click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 83 Printed Documentation Assign Template To assign a Template to computers, devices and hosts: 1. From the Object Explorer, navigate to the Template you want to assign a host. 2. Right-click and select Assign > Computer, Device or Host. The Select Multiple Computers, Devices and Hosts dialog displays. 3. Check the computers to assign then click OK. Or Click the Search button to search for specific computers. Template Properties The Template Properties view enables you to view and modify a Template's settings. To view or modify a Template: 1. 2. 3. 4. From the Object Explorer, navigate to the Template or Monitor you want to view or modify. Right-click and select Template Properties. The Template Properties view displays. Use the controls to make any necessary changes. Click Close. Available Properties Property Description Name A unique name that identifies the object. Description A user defined description of the object. Template ID The internal object ID. Use this value when writing custom applications to consume database history. Enabled Enables scheduled execution. Temporarily disable this object Temporarily disables the scheduled Monitors. Optionally, you can set the Template to automatically re-enable after a period of time. Execution frequency The scheduled frequency to execute the Monitors. Retain history for X days The number of days to retain the Monitor execution history. Automatically open at startup The Console automatically opens all Monitors when you connect to the service. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 84 Printed Documentation Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 85 Printed Documentation Reports Reports A Report is a configurable object that enables users to receive summarized data on-demand or on a scheduled frequency. Reports typically output to an HTML file or email. For example: • • A weekly Event Log Error Report that returns all error events from all production servers. A Duplicate Files Report that scans directories on 3 different servers. How it works: Once a Report has been created it must be assigned to a computer, device or host. The Object Explorer adds a Report node under the assigned computer. Every minute at the top of the minute Server Manager checks to see if a Report should be executed. If a Report is scheduled to execute, Server Manager creates a new thread. The thread then executes the Report, fires Actions, saves the results to the history database and finally calculates and saves the next execution time. Available Reports Type Description Licensing Summary Displays details for a list of monitors. None Required Event Log Scans consolidated Event Logs for entries of interest. Log Manager Failed Logons Scans consolidated Security Event Logs for failed logon attempts. Log Manager Success Logons Scans consolidated Security Event Logs for successful Logons. Log Manager Logon Sessions Scans consolidated Security Event Logs for logon sessions. Log Manager Account Lockout Scans consolidated Security Event Logs for locked out user accounts. Log Manager Account Management Scans consolidated Security Event Logs for Account Management audit events. Log Manager New Accounts Scans consolidated Security Event Logs for new Log Manager user accounts. Object Access Scans consolidated Security Event Log entries Server Manager Guide © 2016 Veriato, Inc., all rights reserved. Log Manager 86 Printed Documentation for object access events. Syslog Scans consolidated Syslogs for entries of interest. Log Manager Text Log Scans consolidated text logs for entries of interest. Log Manager File and Directory Access Permission Scans one or more directories and/or files for Disk Monitor user/account and group access permissions (e.g. read, write) and returns summary or item detail. Duplicate Files Scans one or more directories and returns a list Disk Monitor of duplicates files. Largest Files Scans one or more directories and returns a list Disk Monitor of the largest files. Recently Accessed Files Scans one or more directories and returns a list Disk Monitor of the most active or recently accessed files. Least Accessed Files Scans one or more directories and returns a list Disk Monitor of in-active, idle or the least accessed files. Related Topics Batch Update Reports Groups Add Report A Report is a configurable object that enables users to receive summarized data on-demand or on a scheduled frequency. Reports typically output to an HTML file or email. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click the Report type to create. The Report Properties dialog displays. Unlicensed Report types appear in gray text. 3. Configure the Report Properties. 4. When applicable, assign target hosts, host groups, and/or Report groups. 5. When you have finished configuring the Report, click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 87 Printed Documentation Assign Report To assign a Report to computers, devices and hosts: 1. From the Object Explorer, navigate to the Report you want to assign a host. 2. Right-click and select Assign > Computer, Device or Host. The Select Multiple Computers, Devices and Hosts dialog displays. 3. Check the computers to assign then click OK. Or Click the Search button to search for specific computers. Report Properties The Report Properties view enables you to view and modify a Report's settings. To edit a Report: 1. 2. 3. 4. From the Object Explorer, navigate to the Report you want to modify. Right-click and select Properties. The Report Properties view displays. Use the controls to make any necessary changes. Click Close. Available Properties Property Description Name A unique name that identifies the object. Description A user defined description of the object. Enabled Enables scheduled execution. Temporarily disable this object Temporarily disables the scheduled Report. Optionally, you can set the Report to automatically re-enable after a period of time. Execution frequency The scheduled frequency to execute the Report. Retain history for X days The number of days to retain the Report execution history. Automatically open at startup The Console automatically opens the Report when you connect to the service. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 88 Printed Documentation Views Views are synonymous with Reports (e.g. Summary Reports, Security Event Log Reports, a merge of several Event Logs, etc.). To create a view from a log viewer: The level/priority settings (e.g. Information, Warning, Error) are not saved to the view. To filter on level/priority, assign a Filter that includes level/priority criteria. 1. 2. 3. 4. From the log viewer, click the toolbar button. The New Report Name dialog displays. Enter a name then click OK. From the Object Explorer, expand Reports. The new Report is placed directly under the Reports node. To display a view: 1. From the Object Explorer, navigate to the Report you want to view. 2. Double-click the Report to display. To modify a view: 1. 2. 3. 4. From the Object Explorer, navigate to the Report you want to modify. Right-click on the Report and select Properties. The Report Properties view displays. Use the controls to make any necessary changes. Click Close. Related Topics Log Viewers Summary Reports Summary Reports enable you to view the current status of a set of Monitors (e.g. receive a daily CPU load, memory consumption and disk space Summary Report via email). To create a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Summary. The Report Properties dialog displays. Use the General tab to enter a unique Name and configure the frequency to run. Use the Templates tab to assign Templates. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 89 Printed Documentation If you assign a Template but do not assign any hosts, all hosts assigned to the Template are included. 5. Use the Template Options tab to configure Template specific options (e.g. sort disk space summary results by Percent Used in Decending order). Template options are only applied when the Report is grouped by Template or Template Type. 6. Use the Actions tab to: o Assign the Actions to trigger when complete. o Check Only show triggered, failed and errored monitors to create an Error Report. o Check Hide off-line or inaccessible computers and shares to exclude errored Monitors. o Assign the Actions to trigger when the Report errors (e.g. the service fails to save the execution results to the History database). o Select the Group by option (e.g. Host, Template, Template Type). When grouped by Template or Template Type some Monitors produce Monitor specific data columns and/or graphical images (e.g. disk space, directory size, file count). 7. Use the Report Assignments view to assign Hosts, Host Groups and Report Groups. If you assign a host but do not assign any Templates, all Templates assigned to the host are included. 8. Click OK. Account Lockout Reports Account Lockout Reports Server Manager provides 2 different methods to retrieve account lockout status. Method 1: Active Directory and Windows Management Instrumentation (AD/WMI) Scans Active Directory for all locked-out domain user accounts then optionally, using WMI, scans individual servers and/or workstations for local locked-out user accounts. For more information see Account Lockout (AD/WMI) Reports. Method 2: Event Log Scans consolidated Windows Security Event Log entries for locked-out entries. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 90 Printed Documentation Requires Account Management auditing to be enabled on each target server. Use only when the lockout policy requires the system administrator to manually unlock locked accounts. For more information see Account Lockout (Event Log) Reports. Account Lockout (AD/WMI) Reports Use Account Lockout (AD/WMI) Reports to view a list of locked-out domain and local user accounts. This report scans Active Directory for all locked out domain user accounts then optionally, using WMI, scans individual servers and/or workstations for local locked-out user accounts. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Account Management > Account Lockout (AD/WMI). The Report Properties dialog displays. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Account Lockout (Event Log) Reports Use Account Lockout (Event Log) Reports to view account lockout history. This report scans consolidated Security Event Log entries for Account Management events. Use only when the lockout policy requires the system administrator to manually unlock locked accounts. This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. Requires Account Management auditing to be enabled on each target server. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 91 Printed Documentation Windows does not log an event when an account is automatically unlocked resulting in the Report listing accounts automatically unlocked as locked out. Use only when the lockout policy requires the system administrator to manually unlock locked accounts. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Log Monitors > Event Logs > Account Lockout. The Report Properties dialog displays. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 92 Printed Documentation DATE The date the entry was generated. TIME The time the entry was generated. HOST The computer the entry was generated on. LOCKED X or Null where X means locked and Null means unlocked. USER The account name. CALLER_HOST The computer the account was locked out from. UNLOCKED_BY The system admiminstrator that unlocked the locked account. UNLOCK_DATE_TIME The date and time the account was unlocked. LOCK_COUNT The number of times the account has been locked out. UNLOCK_COUNT The number of times the account has been manually unlocked. For example: {NAME} {DATE_RANGE} Date, Time, Host, User, Locked <ITEM>{DATE}, {TIME}, {HOST}, {USER}, {LOCKED}</ITEM> Security Event Log Reports Security Event Log Reports Server Manager includes several Windows Event Log Security Reports that enable you to quickly monitor and audit user and account activity. These Reports are used for auditing requirements, such as PCI DSS and HIPAA. • • • • • • • Failed Logons Success Logons Logon Sessions Account Lockout Account Management New Accounts Object Access Reports Related Topics PCI DSS Compliance Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 93 Printed Documentation Logon Sessions Reports Windows writes many different Event Log entries related to logons. Some of these events are specific to OS versions while others span multiple versions. Logon events embed important information within the message portion of the entry that enable system administrators to track down activity. Server Manager parses these messages and places the results into data tables. The result enables Server Manager to: • • • Create summary Reports that list the number of times a user logs into a domain or computer. Summarize different event ID messages into a single view. Detail all similar events into a single table. This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. Windows does not log always log a logout event resulting in the Report listing open sessions. Select up to 11 different Report sub-types within a single Report: Type Description Domain Logon Summary Parses and summarizes Domain Logon events 672 and Server 4768. 2012/2008/2003 Domain Logon 672 Parses domain logon event 672. Server 2003 Domain Logon 4768 Parses domain logon event 4768. Server 2012/2008 Logon Summary Parses and summarizes logon events 528, 540 and 4624. Server 2012/2008/2003 Logon 528 Parses successful logon event 528. Server 2003 Logoff 538 Parses logoff event 538. Server 2003 Logon 540 Parses successful network logon event 540. Server 2003 Logoff 551 Parses user initiated logoff event 551. Server 2003 Logon 4624 Parses successful logon event 4624. Server 2012/2008 Logoff 4634 Parses logoff event 4634. Server 2012/2008 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. Supported OS 94 Printed Documentation Logoff 4647 Parses user initiated logoff event 4647. Server 2012/2008 To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Log Monitors > Event Logs > Logon Sessions. The Report Properties dialog displays. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: DATE The date the entry was generated. TIME The time the entry was generated. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 95 Printed Documentation HOST The computer the entry was generated on. LOCKED X or Null where X means locked and Null means unlocked. USER The user that logged in. DOMAIN The domain the user logged into. LOGON_TYPE The type of logon (e.g. Interactive or Network). CALLER_HOST The hostname of the computer the user logged in from. CALLER_IP The IP address of the computer the user logged in from. PROCESS_NAME The process that logged in. LOGON_DATE_TIME The date and time the user logged in. LOGOFF_DATE_TIME The date and time the user logged off. DURATION The duration of the session. For example: {NAME} {DATE_RANGE} Date, Host, User, Duration <ITEM>{LOGON_DATE_TIME}, {HOST}, {DOMAIN}\{USER}, {DURATION}</ITEM> Failed Logons Reports Windows writes many different Event Log entries related to logon failures. Some of these events are specific to OS versions while others span multiple versions. Logon events embed important information within the message portion of the entry that enable system administrators to track down malicious activity. Server Manager parses these messages and places the results into data tables. The result enables Server Manager to: Create summary Reports that list the number of times users attempt to logon to a domain or computer. • Summarize different event ID messages into a single view. • Detail all similar events into a single table. Select up to 7 different Report sub-types within a single Report: • Type Description Supported OS Account logon failure summary Parses and summarizes account logon events 672, 675 and 680. Server 2003 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 96 Printed Documentation Account logon failure (672) Parses and displays all 672 event message parameters. The 'Result Code' is replaced with the Kerberos description per RFC 1510. Server 2003 Account logon failure (675) Parses and displays all 675 event message parameters. The 'Result Code' is replaced with the Kerberos description per RFC 1510. Server 2003 Account logon failure (680) Parses and displays all 680 event message parameters. The NTLM 'Error Code' is replaced with a short description. Server 2003 Logon failure summary Parses and summarizes logon events 529, 530, 531, 532, 533, 534, 535, 539 and 4625. Server 2012/2008/2003 Logon failure (2000/XP/2003) Parses and displays all 529, 530, 531, 532, 533, 534, 535 and 539 event message parameters. The 'Logon Type' is replaced with a short description. Server 2003 Logon failure (Vista/2008) Parses and displays all 4625 event message parameters. The 'Logon Type' is replaced with a short description. The NTLM 'Sub Status' is replaced with a short description. Server 2012/2008 This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Log Monitors > Event Logs > Failed Logons. The Report Properties dialog displays. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 97 Printed Documentation TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. Failed Logon Reports do not support item/entry tags. For example: {NAME} {DATE_RANGE} <ITEM></ITEM> Success Logons Reports Windows writes many different Event Log entries related to logons. Some of these events are specific to OS versions while others span multiple versions. Logon events embed important information within the message portion of the entry that enable system administrators to track down activity. Server Manager parses these messages and places the results into data tables. The result enables Server Manager to: • • • Create summary Reports that list the number of times a user logs into a domain or computer. Summarize different event ID messages into a single view. Detail all similar events into a single table. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 98 Printed Documentation Select up to 11 different Report sub-types within a single Report: Type Description Supported OS Domain Logon Summary Parses and summarizes Domain Logon events 672 and Server 4768. 2012/2008/2003 Domain Logon 672 Parses domain logon event 672. Server 2003 Domain Logon 4768 Parses domain logon event 4768. Server 2012/2008 Logon Summary Parses and summarizes logon events 528, 540 and 4624. Server 2012/2008/2003 Logon 528 Parses successful logon event 528. Server 2003 Logoff 538 Parses logoff event 538. Server 2003 Logon 540 Parses successful network logon event 540. Server 2003 Logoff 551 Parses user initiated logoff event 551. Server 2003 Logon 4624 Parses successful logon event 4624. Server 2012/2008 Logoff 4634 Parses logoff event 4634. Server 2012/2008 Logoff 4647 Parses user initiated logoff event 4647. Server 2012/2008 This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Log Monitors > Event Logs > Success Logons. The Report Properties dialog displays. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 99 Printed Documentation DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. Success Logon Reports do not support item/entry tags. For example: {NAME} {DATE_RANGE} <ITEM></ITEM> Account Management Reports Many regulatory agencies require Account Management Reports for compliance purposes. As you are probably already aware, Windows writes many different Event Log entries related to account management. Some of these events are specific to OS versions while others span multiple versions. Account management events embed important information within the message portion of the entry Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 100 Printed Documentation that enables systems administrators to track down activity. Server Manager parses these messages then places the results into a list. This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. To create a Report: 1. Select File > New > Report. The Select Report Type dialog box displays. 2. Double-click Log Monitors > Event Logs > Account Management Report. The Report property pages display. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 101 Printed Documentation LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: DATE The date the entry was generated. TIME The time the entry was generated. HOST The computer the entry was generated on. USER The user or group that was updated. DOMAIN The updated user's domain. CALLER_USER The administrator's username that updated the user or group. CALLER_DOMAIN The administrator's domain that updated the user or group. CALLER_HOST The computer the user or group was updated from. EVENT The entry's ID. DESCRIPTION The entry's parsed description. For example: {NAME} {DATE_RANGE} Date, Time, Host, User, Description <ITEM>{DATE}, {TIME}, {HOST}, {DOMAIN}\{USER}, {DESCRIPTION}</ITEM> New Accounts Reports Use New Accounts Reports to view a summerized list of new accounts. This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 102 Printed Documentation An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Log Monitors > Event Logs > New Accounts. The Report Properties dialog displays. 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: DATE The date the entry was generated. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 103 Printed Documentation TIME The time the entry was generated. HOST The computer the entry was generated on. USER The user or group that was updated. DOMAIN The new user or group's domain. CALLER_USER The administrator's username that created the user account or group. CALLER_DOMAIN The administrator's domain that created the user account or group. For example: {NAME} {DATE_RANGE} Date, Time, Host, User, Locked <ITEM>{DATE}, {TIME}, {HOST}, {USER}, {DOMAIN}</ITEM> Object Access Reports Use Object Access Reports to view user access to files, directories and registry data. For example, receive a daily email Report of users that accessed a specific directory. This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. This Report enables you to limit results to a subset of users you define or are listed in Active Directory. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. Supports Windows Server 2012, 2008 R2 and 2008. Does not support Server 2003. There are 3 steps to create an Object Access Report: 1. Configure the server for Object Access Auditing. 2. Assign the Event Log Consolidation and Monitoring Template to the server. 3. Create an Object Access Report. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 104 Printed Documentation To configure the server for Object Access Auditing: 1. Select Start > Administrative Tools > Local Security Policy. The Local Security Policy view displays. 2. Select Security Settings > Advanced Audit Policy Configuration > Object Access. 3. From the Subcategory list, double-click Audit File System. The Audit File System Propeties view dislpays. 4. Check Configure the following audit events, Success and Failure. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 105 Printed Documentation 5. Click OK. 6. Open Windows Explorer (Windows Key + E). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 106 Printed Documentation 7. Navigate to the folder you want to enable auditing, right-click and select Properties. The Audit File System Propeties view dislpays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 107 Printed Documentation 8. Select the Security tab then click Advanced. The Advanced Security Settings view displays. 9. Select the Auditing tab then click Add. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 108 Printed Documentation The Auditing Entry view displays. 10. Click Select a principal. The Select User or Group dialog displays. Enter Everyone. Click OK. The principal is set. 11. Set the Type to All. 12. From Basic permissions check Full control. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 109 Printed Documentation Click OK. The auditing entry is added. 13. Click OK. The Properties dialog displays. 14. Click OK. For more information see the following Microsoft articles: • • Server 2012: Scenario: File Access Auditing Server 2008 R2: Managing Security Auditing To assign the Event Log Consolidation and Monitoring Template: Each computer you would like to Report on must be configured to download and consolidate the Security Event Log entries. Server Manager includes a sample Template called Event Log Consolidation and Monitoring that has been pre-configured to download Security Event Log entries once an hour. Once assigned to each target computer, Server Manager will automatically download and consolidate the Security Event Log entries every hour. 1. From the Object Explorer, navigate to Templates > Sample Templates. 2. Right-click Event Log Consolidation and Monitoring and click Assign > Computer, Device or Host. The Select Multiple Computers, Devices and Hosts dialog displays. 3. Check the target computers then click OK. The Template is assigned to the checked computers. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 110 Printed Documentation 2. Double-click Log Monitors > Event Logs > Object Access. The Report Properties dialog displays. 3. Use the General tab to specify a unique Name and schedule the frequency to run. 4. Use the Logs tab to optionally add Explicitly Assigned Consolidated Logs. For example, if you have restored an archived database which you would like to run this report against, use this page to add the security logs contained within the target Auxiliary Database. 5. Use the Options tab to: 1. Select Summarize to group similar events. When summarized, an extra column is added that displays the count of entries. 2. Use the Group by drop-down to select the column to group by. 3. Assign a Filter to limit the entries in the Report. 6. Use the Date and Time Range tab to select the date range to include within the Report. 7. Use the Filter Users/Accounts tab configure to include or exclude specific users. 8. Use the Actions tab assign to assign email and/or file output Actions as well as error Actions. 9. Use the Report Assignments view to assign hosts, host groups and Report groups. 10. Click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 111 Printed Documentation STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: DATE The date the entry was generated. TIME The time the entry was generated. HOST The computer the entry was generated on. USER The username of the account that triggered the event. DOMAIN The user's domain. OBJECT_NAME The directory, file or registry data. PROCESS_NAME The full path to executable. ACCESS_FLAGS The access type (e.g. Read, Write, Delete). For example: {NAME} {DATE_RANGE} Date, Time, Object, Process, User, Domain, Access <ITEM>{DATE}, {TIME}, {OBJECT_NAME}, {PROCESS_NAME}, {USER}, {DOMAIN}, {ACCESS_FLAGS}</ITEM> Event Log Reports Use Event Log Reports to view entries of interest (e.g. receive a daily email Report that lists all warning and critical events that occurred yesterday). This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. An Event Log Consolidation and Monitoring Template must be assigned to each targeted computer. To create a Report: 1. Select File > New > Report. The Select Report Type dialog displays. 2. Double-click Log Monitors > Event Logs > Event Log. The Report Properties dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 112 Printed Documentation 3. Follow the instructions found within the property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. TEXT: comma delimited HTML: line feed delimited (<br/>) FILTER The filter name. TEXT: comma delimited HTML: line feed delimited (<br/>) DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. AD_USER When firing an email Report, the tag is replaced with the Active Directory assigned email address for the user listed within the USER column of the entry. If multiple entries pass the post consolidation filter the first entry that contains a non-null value within the USER column is used for the lookup. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 113 Printed Documentation USER When firing an email Report, the email address can be changed to the contents of the USER column within the entry. If multiple entries pass the filter the first entry that contains a non-null value within the USER column is used for the replacement. If the USER column contains a domain name, the domain name is removed. For example: If the Event Log entry USER column contains: LITTLEWATER\jdoe and the email address within the email Action is defined as: {USER}@Veriato.com the actual email address used is: [email protected] The following entry tags are available: HOST The host that generated the entry. NOTE: If an alias has been assigned to the host the alias is used in-place of the actual hostname. IPv4 The IPv4 address of the host that generated the entry. IPv6 The IPv6 address of the host that generated the entry. DATE The date the entry was generated. TIME The time the entry was generated. LOG The log name (e.g. System). LEVEL The Event Log entry level (e.g. Warning or Critical). NOTE: When forwarding entries the to a Syslog server/device the entry level is mapped to an appropriate Syslog priority. SOURCE The entry source. EVENT The entry event ID. CATEGORY The entry category. USER The entry user. MESSAGE The entry message. DATA The entry data in hexadecimal format. DATA_ASCII The entry data in ASCII format. DATA_UNICODE The entry data in Unicode format. FLAG The user set flag (e.g. Flagged, Complete) Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 114 Printed Documentation NOTES Any notes that were set through the log viewers. COUNT When a Report is configured to hide duplicates or display a count of similar entries, the count of entries. For example: {NAME} {HOST} {LOG} Date, Time, Host, Log, Level, Message <ITEM>{DATE}, {TIME}, {HOST}, {LOG}, {LEVEL}, {MESSAGE}</ITEM> Syslog Reports Use Syslog Reports to view entries of interest (e.g. receive a daily email Report that lists all warning and critical events that occurred yesterday). This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. A Syslog Consolidation Template must be assigned to each targeted computer. To create a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Log Monitors > Syslogs > Syslog. The Report Properties dialog displays. Follow the instructions found within the property pages. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 115 Printed Documentation MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. TEXT: comma delimited HTML: line feed delimited (<br/>) FILTER The filter name. TEXT: comma delimited HTML: line feed delimited (<br/>) DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: HOST The host that generated the entry. NOTE: If an alias has been assigned to the host the alias is used in-place of the actual hostname. IPv4 The IPv4 address of the host that generated the entry. IPv6 The IPv6 address of the host that generated the entry. DATE The date the entry was generated. TIME The time the entry was generated. LOG The log name (e.g. System). PRIORITY The Syslog priority (e.g. Warning or Critical). NOTE: When forwarding entries the to an Event Log the priority is mapped to an appropriate Event Log level. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 116 Printed Documentation FACILITY The Syslog facility (e.g. Local1, Kernal, etc.) MESSAGE The entry message. FLAG The user set flag (e.g. Flagged, Complete) NOTES Any notes that were set through the log viewers. COUNT When a Report is configured to hide duplicates or display a count of similar entries, the count of entries. For example: {NAME} {HOST} {LOG} Date, Time, Host, Log, Priority, Facility, Message <ITEM>{DATE}, {TIME}, {HOST}, {LOG}, {PRIORITY}, {FACILITY}, {MESSAGE}</ITEM> Text Log Reports Use Text Log Reports to view entries of interest (e.g. receive a daily email Report that lists all warning and critical messages that occurred yesterday). This Report uses data previously downloaded to the Primary Log Repository or other explicitly assigned Log Repository. A Text Log Consolidation Template must be assigned to each targeted computer. To create a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Log Monitors > Text Logs > Text Log. The Report Properties dialog displays. Follow the instructions found within the property pages. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 117 Printed Documentation DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. TEXT: comma delimited HTML: line feed delimited (<br/>) FILTER The filter name. TEXT: comma delimited HTML: line feed delimited (<br/>) DATE_RANGE The time span to check (e.g. daily). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. The following entry tags are available: HOST The host that generated the entry. NOTE: If an alias has been assigned to the host the alias is used in-place of the actual hostname. IPv4 The IPv4 address of the host that generated the entry. IPv6 The IPv6 address of the host that generated the entry. DATE The date the entry was generated. TIME The time the entry was generated. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 118 Printed Documentation FILENAME The log name (e.g. u_ex.log). LOG FULLNAME The full path and filename (e.g. c:\logs\u_ex.log). MESSAGE The entry message. FLAG The user set flag (e.g. Flagged, Complete) NOTES Any notes that were set through the log viewers. COUNT When a Report is configured to hide duplicates or display a count of similar entries, the count of entries. For example: {NAME} {HOST} {LOG} Date, Time, Host, Log, Message <ITEM>{DATE}, {TIME}, {HOST}, {LOG}, {MESSAGE}</ITEM> Duplicate Files Reports Duplicate Files Reports list all files that have the same name, and/or are the same size, and/or have the same modified date. You have the option to scan a one or more directories contained on one or more computers. All scans are recursive. To generate an on-demand Report: 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Expand the target computer. 3. Select any disk or directory monitor. If one does not exist, create and assign a new Disk Space Monitor Template. 4. Right-click and select Explore. The Monitor Detail view displays. 5. Select the Explorer tab. 6. Select the target disk, share or directory then right-click and select Duplicate Files Report. The Duplicate Files Report Options dialog displays. 7. Choose from the available options then click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 119 Printed Documentation To schedule a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Disk Monitor > Duplicate Files. The Report Properties dialog displays. Follow the instructions found within property pages. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. PATH The full path to the target directory. The following item tags are available: NAME FILENAME The target filename. PATH The path to the target file. FULLNAME The path and filename of the target file. FILE_COUNT The number of duplicate files. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 120 Printed Documentation SIZE The size of the duplicate files. DATE The target file's last modified date. TIME The target file's last modified time. For example: {NAME} {PATH} <ITEM>{PATH}, {FILENAME}, {FILE_COUNT}, {SIZE}, {DATE}, {TIME}</ITEM> File and Directory Access Permissions Reports File and Directory Access Permissions Reports are comprised of a list of directories, files, users, and assigned permissions (e.g. read, write, delete). You have the option to scan one or more directories contained on one or more computers. Scans can recursively scan all sub-directories. When recursively scanned the Report can show detail for each file or summarize by concatenating permissions. This Report enables you to limit results to users listed in Active Directory. When run on-demand within the Management Console you can: • • • • Filter by directory and user. Print the Report. Export the Report to a file. Re-run with different options. To generate an on-demand Report: 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Expand the target computer. 3. Select any disk or directory monitor. If one does not exist, create and assign a new Disk Space Monitor Template. 4. Right-click and select Explore. The Monitor Detail view displays. 5. Select the Explorer tab. 6. Select the target disk, share or directory then right-click and select Access Permissions Report. The Access Permissions Report Options dialog displays. 7. Choose from the available options then click OK. To schedule a Report: 1. Select File > New > Report. The Select Report Type dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 121 Printed Documentation 2. Double-click Disk Monitor > File and Directory Access Permissions. The Report Properties dialog displays. 3. Follow the instructions found within property pages. 4. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. PATH The full path to the target directory. PATH_FILTER When saved to HTML from an on-demand Report, the path filter. USER_FILTER When saved to HTML from an on-demand Report, the user filter. The following item tags are available: NAME FILENAME The target filename. PATH The full path to the target sub-directory. ACCESS_FLAGS The access flags (e.g. ObjectInherit, ContainerInherit, Inherited). ACCESS_TYPES The access types (e.g. Allowed or Denied) Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 122 Printed Documentation PERMISSIONS The permissions (e.g. Read, Write, Delete) USER The user name. For example: {NAME} {PATH} <ITEM>{PATH}, {ACCESS_FLAGS}, {ACCESS_TYPES}, {PERMISSIONS}, {USER}</ITEM> File Extension Reports File Extension Reports list the present extensions, total size and file count. When run on-demand within the Management Console you can: • • • • View extension detail. Drill down into a directory structure. Print the Report. Export the Report to a file. Scheduled execution is not currently supported. To generate an on-demand Report: 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Expand the target computer. 3. Select any disk or directory monitor. If one does not exist, create and assign a new Disk Space Monitor Template. 4. Right-click and select Explore. The Monitor Detail view displays. 5. Select the Explorer tab. 6. Select the target disk, share or directory then right-click and select File Extension Report. The report executes. 7. Once complete, you are prompted with summary of results. To view the report detail click Yes. The File Extention Report dialog displays. Largest Files Reports Largest Files Reports list the largest files on a disk within a directory structure. You have the option to scan one or more directories contained on one or more computers. All scans are recursive. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 123 Printed Documentation To generate an on-demand Report: 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Expand the target computer. 3. Select any disk or directory monitor. If one does not exist, create and assign a new Disk Space Monitor Template. 4. Right-click and select Explore. The Monitor Detail view displays. 5. Select the Explorer tab. 6. Select the target disk, share or directory then right-click and select Largest Files Report. The Largest Files Report Options dialog displays. 7. Choose from the available options then click OK. To schedule a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Disk Monitor > Duplicate Files. The Report Properties dialog displays. Follow the instructions found within property pages. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 124 Printed Documentation Applies to HTML output only. PATH The full path to the target directory. The following item tags are available: NAME The target filename. FILENAME PATH The path to the target file. FULLNAME The path and filename of the target file. LOG SIZE The size of the file. DATE The target file's last modified date. TIME The target file's last modified time. For example: {NAME} {PATH} <ITEM>{PATH}, {FILENAME}, {SIZE}, {DATE}, {TIME}</ITEM> Least Accessed Files Reports Least Accessed Files Reports list files that have not been recently accessed. Although not required by Windows applications, some applications update a file's last accessed time value whenever the application opens a file. This Report scans a directory and sorts all files ascending by last accessed time. The top results are displayed. You have the option to scan a one or more directories contained on one or more computers. All scans are recursive. When run on-demand within the Management Console you can: • • • Print the Report. Export the Report to a file. Re-run with different options. To generate an on-demand Report: 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Expand the target computer. 3. Select any disk or directory monitor. If one does not exist, create and assign a new Disk Space Monitor Template. 4. Right-click and select Explore. The Monitor Detail view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 125 Printed Documentation 5. Select the Explorer tab. 6. Select the target disk, share or directory then right-click and select Least Accessed Files Report. The Least Accessed Files Report Options dialog displays. 7. Choose from the available options then click OK. To schedule a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Disk Monitor > Least Accessed Files. The Report Properties dialog displays. Follow the instructions found within property pages. When you have finished configuring the Report, click OK. Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. PATH The full path to the target directory. The following item tags are available: NAME The target filename. FILENAME Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 126 Printed Documentation PATH The path to the target file. FULLNAME The path and filename of the target file. LOG SIZE The size of the file. DATE The target file's last accessed date. TIME The target file's last accessed time. For example: {NAME} {PATH} <ITEM>{PATH}, {FILENAME}, {SIZE}, {DATE}, {TIME}</ITEM> Recently Accessed Files Reports Recently Accessed Files Reports list recently accessed files. Although not required by Windows applications, some applications update a file's last accessed time value whenever the application opens a file. This Report scans a directory and sorts all files ascending by last accessed time. The top results are displayed. You have the option to scan a one or more directories contained on one or more computers. All scans are recursive. To generate an on-demand Report: 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Expand the target computer. 3. Select any disk or directory monitor. If one does not exist, create and assign a new Disk Space Monitor Template. 4. Right-click and select Explore. The Monitor Detail view displays. 5. Select the Explorer tab. 6. Select the target disk, share or directory then right-click and select Recently Accessed Files Report. The Recently Accessed Files Report Options dialog displays. 7. Choose from the available options then click OK. To schedule a Report: 1. 2. 3. 4. Select File > New > Report. The Select Report Type dialog displays. Double-click Disk Monitor > Recently Accessed Files. The Report Properties dialog displays. Follow the instructions found within property pages. When you have finished configuring the Report, click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 127 Printed Documentation Action Variable Tags The following header tags are available: DATE The date the Report was generated. TIME The time the Report was generated. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The Report name. OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. PATH The full path to the target directory. The following item tags are available: NAME The target filename. FILENAME PATH The path to the target file. FULLNAME The path and filename of the target file. LOG SIZE The size of the file. DATE The target file's last accessed date. TIME The target file's last accessed time. For example: {NAME} Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 128 Printed Documentation {PATH} <ITEM>{PATH}, {FILENAME}, {SIZE}, {DATE}, {TIME}</ITEM> Temporary Files Reports Temporary Files Reports list all System and User temporary directories on any target Windows computer. The total size, file count, and sub-directory count is totaled and listed. When run on-demand within the Management Console you can: Drill down into sub-directories to view the details within each temporary directory. • Delete temporary directory contents including files and sub-directories. • Print the Report. • Export the Report to a file. You can also configure the service to automatically delete temporary files not locked and older than a number of days. • To generate an on-demand Report: 1. From the Object Explorer, navigate to the target computer. 2. Right-click and select Temporary Files Report. The report executes. 3. Once complete, you are prompted with a summary message. Click Yes to view the Report detail. The Temporary Files Report dialog displays. To schedule the temporary files to be deleted: Select File > New > Template. The Select Template Type dialog displays. From the menu tree, expand Disk Monitors. Double-click Delete Temporary Files. The Template Properties dialog displays. Use the General tab to enter a unique Name and configure the frequency to run. Use the Options tab to: o Choose to Delete temporary system files o Choose to Delete temporary user files o Choose to Only delete temporary files that are older than X days. 6. Use the Actions tab to assign completion and error actions. 7. Use the Advanced tab to configure the number of days to retain the Monitor history (e.g. number of entries download, filtered, saved and duration) in the History database. 8. Click OK. 1. 2. 3. 4. 5. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 129 Printed Documentation Schedules Schedules A schedule is a configurable object that defines the frequency to execute a Monitor, Report or Auto configurator (e.g. daily at 6:00 AM or every 5 minutes). Server Manager comes pre-installed with sample Schedules. You have the option of using these Schedules, modifying them or if prefer removing all of them and defining your own. How it works: Every time a change is made to the system that could potentially change the execution schedule (e.g. an assignment is made between a computer and a Template), Server Manager re-calculates the next execution time for each dependent object. Load Balancing (Range Scheduling) Imagine a mid-size environment with 100 servers. Your task is to consolidate Event Log entries to a SQL Server database while also monitoring uptime. If you configure Server Manager to download daily at 2:00 AM and each server contains 3 logs of interest, at 2:00 AM Server Manager will create 300 threads and commence downloading of the Event Log entries. Understandably the consolidation database will more than likely bottleneck and timeout while attempting to commit the Security Event Log entries. To alleviate the pressure on the consolidation database as well as the server hosting Server Manager, Server Manager includes range scheduling, a very powerful function to evenly distribute download, monitor and Report execution over time. You can enable range scheduling by setting a Schedule's type to Range. Available Schedules Type Description Fixed Defines a specific time to execute (e.g. every hour at 30 minutes past the hour). Supports seconds, minutes, hourly, daily, weekly and monthly. Range Defines a range of available times which to execute (e.g. at any time but at minimum once an hour). Example: 3 HTTP monitors www.mycompany.com, www.diskmonitor.com and www.networkeventviewer.com with a schedule of once every 15 minutes would result in the Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 130 Printed Documentation following monitor executions: www.mycompany.com: Executing at 0:00, 0:15, 0:30 and 0:45 www.diskmonitor.com: Executing at 0:05, 0:20, 0:35 and 0:50 www.networkeventviewer.com: Executing at 0:10, 0:25, 0:40 and 0:55 Supports minutes, hourly, daily and weekly. Seconds and monthly frequencies are not supported. Add Schedule A Schedule is a configurable object that defines the frequency to execute a Monitor, Report or Auto configurator (e.g. daily at 6:00 AM or every 5 minutes). To create a Schedule: 1. Select File > New > Schedule. The Create New Schedule dialog displays. 2. Type a unique Name or when you have finished configuring the schedule, click Generate to auto-generate a name. 3. From the Type drop-down, choose Fixed Schedule or Range Schedule. Fixed schedules execute at the specific time you configure. Range schedules execute within a time range to facilitate Monitor and Report load balancing. 4. Choose from the Frequency drop-down. Frequency specific controls displays. 5. Configure the properties. 6. When applicable to the Schedule type and frequency use the Day of Week and Time of Day Exclusions controls to add maintenance windows as well as any other days or time ranges you want to exclude from the schedule. For more information see Day and Time Exclusions. 7. Optionally, click Generate to auto-generate a name based on the schedule you have just configured (e.g. every 4 hours). 8. Click OK. Assign Schedule To assign a Schedule to a Template: 1. From the Object Explorer, navigate to the Template or Monitor you want to apply the schedule. 2. Right-click and select Template Properties. The Template Properties view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 131 Printed Documentation 3. From the General tab, where applicable, select the schedule from the Execution frequency drop-down. 4. Click Close. To assign a Schedule to a Report: 1. 2. 3. 4. From the Object Explorer, navigate to the Report you want to apply the schedule. Right-click and select Properties. The Report Properties view displays. From the General tab, select the schedule from the Execution frequency drop-down. Click Close. To assign a Schedule to an Auto Configurator: 1. 2. 3. 4. From the Object Explorer, navigate to the Auto Configurator you want to apply the schedule. Right-click and select Properties. The Auto Configurator Properties view displays. From the General tab, select the schedule from the Execution frequency drop-down. Click Close. Related Topics Auto Configurators Reports Templates Schedule Properties The Schedule Properties view enables you to view and modify a Schedule. To view or modify a Schedule: 1. From the Object Explorer, navigate to the schedule you want to view or modify. 2. Right-click and select Properties. The Schedule Properties view displays. 3. Type a unique Name or when you have finished configuring the schedule, click Generate to auto-generate a name. 4. From the Type drop-down, choose Fixed Schedule or Range Schedule. Fixed schedules execute at the specific time you configure. Range schedules execute within a time range to facilitate Monitor and Report load balancing. 5. Choose from the Frequency drop-down. Frequency specific controls displays. 6. Configure the properties. 7. When applicable to the Schedule type and frequency use the Day of Week and Time of Day Exclusions controls to add maintenance windows as well as any other days or time ranges you want to exclude from the schedule. For more information see Day and Time Exclusions. 8. Optionally, click Generate to auto-generate a name based on the schedule you have just configured (e.g. every 4 hours). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 132 Printed Documentation 9. Click OK. Day and Time Exclusions Day and Time Exclusions When configuring execution schedules some frequency types support day and time exclusions (e.g. execute every hour excluding Sunday between 2 AM and 4 AM). Day and time exclusions enable you to configure maintenance windows. Using day and time exclusions you can also create multiple Monitors for each shift operator (e.g. create a ping Monitor for 12 AM - 12 PM which emails system administrator A then create a ping Monitor for 12 PM - 12 AM which emails system administrator B). How it works: Every time an assignment is made between a host and a Template, Server Manager calculates the next time each dependent Monitor should run. When the next execution time falls within an exclusion period, Server Manager continues to calculate the next time until finally the next time falls outside the exclusion period. Since range Schedules depend on the total count of dependent Monitors and exclusion periods can fall on specific days, every night at midnight (00:00 or 12:00 AM) Server Manager re-calculates the next execution time for each Monitor, Report and Auto Configurator. When re-calculating, Server Manager takes into account exclusion periods enabling the software to properly load balance throughout the day. For example, when an exclusion period is configured to exclude 6:00 PM Saturday through 6:00 AM Sunday and 24 computers are assigned to the Template which this exclusion period is defined, at midnight on Thursday evening Server Manager evenly distributes the next execution time for each Monitor one hour apart. At midnight on Friday evening Server Manager evenly distributes the next execution time for each Monitor 45 minutes apart (18 available execution hours / 24 Monitors = 45 minute intervals) starting at midnight. At midnight on Saturday evening Server Manager evenly distributes the next execution time for each Monitor 45 minutes apart (18 available execution hours / 24 Monitors = 45 minute intervals) starting at 6:00 AM. Add Day and Time Exclusion To add a day or time exclusion: 1. From the Object Explorer, navigate to the target Schedule. 2. Right-click and select Properties. The Schedule Properties dialog displays. 3. If the frequency type (e.g. Hourly) supports exclusion periods the Day of Week and Time of Day Exclusions control is displayed in the view. 4. Click the Server Manager Guide button. The Exclusion Period dialog displays. © 2016 Veriato, Inc., all rights reserved. 133 Printed Documentation 5. Check the days of week, time of day or day and time range to exclude. 6. Click Close. When adding a time of day exclusion, an exclusion is added for each day of the week. For more information see Day and Time Exclusion Properties. Delete Day and Time Exclusion To delete an exclusion from a schedule: 1. From the Object Explorer, navigate to the target schedule. 2. Right-click then select Properties. The Schedule Properties dialog displays. 3. If the frequency type (e.g. Hourly) supports exclusion periods the Day of Week and Time of Day Exclusions control is displayed in the view. 4. Select the exclusion period to edit then click the 5. Click Close. button. To remove all exclusions from a schedule: 1. From the Object Explorer, navigate to the target schedule. 2. Right-click then select Properties. The Schedule Properties dialog displays. 3. If the frequency type (e.g. Hourly) supports exclusion periods the Day of Week and Time of Day Exclusions control is displayed in the view. 4. Click the 5. Click Close. button. Day and Time Exclusion Properties To edit an exclusion: 1. From the Object Explorer, navigate to the target schedule. 2. Right-click then select Properties. The Schedule Properties dialog displays. 3. If the frequency type (e.g. Hourly) supports exclusion periods the Day of Week and Time of Day Exclusions control is displayed in the view. 4. Double-click the exclusion period to edit or select the exclusion period to edit then click the button. The Exclusion Period dialog displays. 5. When you have finished making changes, click the OK button. Available Properties Property Description Exclude days of week Excludes each checked day of the week. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 134 Printed Documentation Exculde time of day Excludes the specified time of day. Exclude day and time range Excludes a specific day of week and time of day. Examples Day Exclusions To exclude specific days such as Saturday and Sunday choose the following option: Time Exclusions To exclude specific time ranges such as every day between the hours of 5 PM and 8 AM choose the following option: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 135 Printed Documentation Day and Time Exclusions To exclude specific days and time ranges such as 5 PM Friday through 8:00 AM Monday choose the following option: Filters Filters A Filter is a configurable object used to target or limit specific log entries or computers from real-time and consolidated log views, Monitors and Reports. Filters can also be used when manually searching computers in Active Directory or through an Auto Configurator. How it works: When viewing log entries you can apply a Filter to the view. Server Manager includes several default log entry Filters; however, you can also create your own Filters by simply right clicking on a log entry and selecting Filter Selected Entries. When a Filter is applied to the log viewer, the viewer re-queries the Log Repository or file being viewed then re-displays the filtered content. When an Auto Configurator runs against your Active Directory tree, Server Manager uses Active Directory Filter criteria to pass specific computers. Server Manager includes several default Active Directory Filters however you can also create your own Filters as well. Most Filters include regular expression support. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 136 Printed Documentation Available Filters Type Description Active Directory A complex computer property Filter that can be applied to recursive Active Directory scans to target or exclude computers. For example, the Filter 'operatingSystem contains server' would return all servers. Event Log Simple A simple Event Log entry Filter. For example, the Filter 'Event ID = 100-200' would return all entries with an Event ID value between 100 and 200. Event Log Complex A complex Event Log entry Filter that provides criteria grouping, nesting and AND, OR and NOT rules. Event Log Account Management A Security Event Log Filter that targets account management entries. Designed for PCI compliance. Event Log Failed Logon A Security Event Log Filter that targets failed logon entries on 2012, 2008 and 2003 servers. Designed for PCI compliance. Event Log Success Logon A Security Event Log Filter that targets success logon entries on 2012, 2008 and 2003 servers. Designed for PCI compliance. Syslog A complex syslog Filter that provides criteria grouping, nesting and AND, OR and NOT rules. Text Log A complex application or text log Filter that provides criteria grouping, nesting and AND, OR and NOT rules. CSV A complex Filter for comma separated value files (CSV) that provides decimal value monitoring, criteria grouping, nesting and AND, OR and NOT rules. For example 'cfs > 3000' would return all entries whose cubic feet per second column value is greater than 3000. Add Filter A Filter is a configurable object used to target or limit specific log entries or computers from real-time and consolidated log views, Monitors and Reports. Filters can also be used when manually searching computers in Active Directory or through an Auto Configurator. To create a Filter: 1. From any log viewer right-click on an entry and select Filter Selected Entries. The Filter Selected Entries dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 137 Printed Documentation Or 2. Choose from the Visibility drop-down. Choose Exclude to filter out these entries or Include to pass these entries. 3. Choose to Create a new filter or Append to an existing filter. 4. Click Create and Review Criteria to create the Filter and review the criteria. The Filter Properties dialog displays. 5. Review the Filter criteria then when finished click OK. The new Filter is applied to the current log viewer. 1. Select File > New > Filter. The Create New Filter dialog displays. 2. Choose from the Type drop-down. A filter specific view displays. For more information see Filters 3. Configure the filter specific criteria. 4. Click OK. Related Topics Log Viewers Assign Filter Filters can be assigned to log viewers, log management Templates and Reports, and Auto Configurators. To assign a Filter to a log viewer: • From the embedded log viewer toolbar, use the drop-down to select the Filter. To assign a Filter to a Report: 1. 2. 3. 4. From the Object Explorer, navigate to the Report you want to assign the Filter. Right-click and select Properties. The Report Properties view displays. Use the Report specific view to assign the filter. Click Close to save your changes. To assign a Filter to a Template: 1. 2. 3. 4. From the Object Explorer, navigate to the Template or Monitor you want to assign the Filter. Right-click and select Template Properties. The Template Properties view displays. Use the Template specific view to assign the filter. Click Close to save your changes. To assign a Filter to an Auto Configurator: 1. From the Object Explorer, navigate to the Auto Configurator you want to assign the Filter. 2. Right-click and select Properties. The Auto Configurator Properties view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 138 Printed Documentation 3. Select the Filters and Exclusions tab. 4. From the drop-down, select the Active Directory Filter to assign. 5. Click Close to save your changes. Related Topics Auto Configurators Log Viewers Reports Templates Filter Properties The Filter Properties view enables you to view and modify a Filter. To view or modify an Filter: 1. 2. 3. 4. From the Object Explorer, navigate to the Filter you want to view or modify. Right-click and select Properties. The Filter Properties view displays. Use the controls to make any necessary changes. Click Close. Available Properties Property Description Name A unique name that identifies the object. Description A user defined description of the object. Import and Export Filters In mulit-service installation environments you may find it quite useful to copy a set of Filters from one installation to another. Although the Management Console enables you to copy and paste individual Filters between connected services you can also export a set of Filters that can be later imported to another inaccessible installation of Server Manager or posted online for support or optimization. To export Filters: 1. From the Object Explorer, expand the Filters tree. 2. Select the Filter group tree or Filter to export, right-click and select Export. The Save As dialog displays. 3. Choose the location and filename to save the Filters. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 139 Printed Documentation The name of the output file is independent of the group or Filter names. 4. Click Save. Filters are saved with a DAT extension. This is a binary format which can only be read by the Console. To import Filters: 1. From the Object Explorer, expand the Filters tree. 2. Select the group which you would like to import the Filters under. If no group is selected the Filters are imported under the Filters node. 3. Select File > Import > Filters. The Select Filter Dat File dialog displays. 4. Locate and select the DAT file that contains the Filter or group of Filters to import then click Open. 5. If the Filter(s) already exist, you will be prompted to either overwrite or rename conflicting new Filters. If you choose to overwrite, the imported groups or Filters will simply be overwritten wherever they occur within the Filters tree. If you choose to rename, the imported groups or Filters will appear within the active area (whatever sub-folder you have selected) under the Filters tree with a number in parentheses. Click OK. Actions, Alerts and Notifications Actions, Alerts and Notifications An Action is a configurable object that executes a function when: A monitor triggers, recovers, errors or completes. • A Report is complete or errors • An Auto Configurator is complete or errors Actions define properties such as the email address to send an alert or the Windows Service to restart. Actions can be created once then applied to many objects (e.g. Templates and Reports) allowing you to quickly implement a configuration change (e.g. an email address update) across all dependent objects. • How it works: When a monitor triggers (e.g. a ping times-out, an Event Log download fails or free disk spaces falls below a critical threshold) or a Report completes, Server Manager checks the configured failure rate if applicable. If the monitor should trigger (e.g. a ping fails 3 times within one minute), Server Manager looks up the assigned Actions. If the monitor was previously working as expected or the Action is configured to re-fire every time the monitor triggers, the Action is executed. Prior to executing, all Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 140 Printed Documentation applied Action Variable Tags are replaced with the appropriate values. Finally, Server Manager executes the Action. Available Actions Type Description Database When monitoring log entries, writes each filtered log entry to a user defined database table. *Error and recovery alerts are not supported. Email Sends a simple text message or a detailed HTML message. Both text messages and HTML messages can be customized using Action Variable Tags or by creating your own HTML Templates. Event Log Writes a custom entry to the Event Log of your choice. When monitoring log entries, writes each filtered log entry. The Event Log Source field supports the following Action Variable Tags: {HOST}, {IPv4}, {IPv6} File Saves results to a file. When monitoring log entries, writes each filtered log entry. Supports: CSV, EVT, HTML and TXT. Manage a Process Restarts, stops or starts a Windows process. The arguments field supports the following Action Variable Tags: {HOST}, {IPv4}, {IPv6}, {MESSAGE} When monitoring log entries, to start a process for each log entry, include one of the following tags within the arguments field: {HOST}, {IPv4}, {IPv6}, {MESSAGE}. These fields are replaced with the appropriate values within each entry prior to the process being started. Manage a Service Restarts, stops or starts a Windows Service. Message Box Displays a message box on any computer that has the Tray Icon installed and running. *Requires TCP port 6766. For more information see Desktop Actions, Alerts and Notifications SMS (Pager) Sends a text message using one of several web SMS online gateway services. SNMP Trap Sends a SNMP trap via Microsoft's SNMP Service. Sound Plays a sound on any computer that has the Tray Icon installed and running. *Requires TCP port 6766. For more information see Desktop Actions, Alerts and Notifications Syslog Writes a message to any syslog server. When monitoring log entries, writes each filtered log entry. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 141 Printed Documentation Related Topics HTML and Email Template Settings Desktop Actions, Alerts and Notifications Desktop Actions are defined as Actions that are executed within a user's Windows desktop (e.g. message box alerts, sound alerts and interactive file execution). Server Manager enables you to receive desktop notifications on any Windows computer that has network access to the Server Manager Service. To configure desktop notifications: 1. From the computer you would like to receive desktop notifications, install Server Manager. 2. Open the Management Console. 3. Select Tools > Server Manager Configuration Wizard. The Server Manager Configuration Wizard dialog displays. 4. Click Next. The Service Credentials page displays. 5. Check Disable the 'Veriato Server Manager Service' then click Next. The service is disabled and the wizard closes. 6. From the Object Explorer, select the root (e.g. Server Manager) then right-click and select Delete. 7. Select File > New Server Manager Connection. The Connect to Service dialog displays. 8. Type a unique Connection name. 9. From the Server name text box, enter the addressable hostname or IP address where the service is installed. 10. Specify credentials that provide administrator access to the server where the service is installed. For more information see Service Connections. 11. Click Connect. The Console connects to the service and adds a new root node (e.g. Server Manager) to the Object Explorer. If the connection fails due to a network error, make sure the hostname is addressable and TCP port 6766 has been opened through your server's Windows Firewall or any other firewall that may be present. 12. From the Object Explorer, expand Actions > Desktop. 13. Right-click on Display Message Box and select Properties. The Action Properties view displays. 14. From the Target control group click . The Add Computer, Devices and Hosts dialog displays. 15. From the drop-down, choose Select Localhost then click OK. The localhost is added to the Target Hosts list. 16. Finally, click the Test button. You should now see the test message box alert on the localhost. Close the test message box alert. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 142 Printed Documentation 17. An informational message box prompts you stating at least one subscriber has been notified. Click OK to close the message box. 18. Click OK. Related Topics Client/Server Architecture Management Server Settings Service Connections Add Action An Action is a configurable object that executes a function when: • • • A monitor triggers, recovers, errors or completes. A Report is complete or errors An Auto Configurator is complete or errors To create an Action: 1. Select File > New > Action. The Create New Action dialog displays. 2. Choose from the Type drop-down. An Action specific view displays. For more information see Actions Alerts and Notifications. 3. Type a unique Name. 4. Configure the Action specific properties. 5. Click OK. Related Topics HTML and Email Template Settings Assign Action Assigning an Action enables Monitors and Reports to respond to completed, triggered, recovered and errored events. To assign an Action to a Template: 1. From the Object Explorer, navigate to the Template or Monitor you want to assign the Action. 2. Right-click and select Template Properties. The Template Properties view displays. 3. Select the Actions tab. 4. Use the Actions drop-down button to assign the Action or group of Actions. 5. Click Close to save your changes. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 143 Printed Documentation Related Topics HTML and Email Template Settings Action Properties The Action Properties view enables you to view and modify an Action. To view or edit an Action: 1. 2. 3. 4. From the Object Explorer, navigate to the Action you want to view or modify. Right-click and select Properties. The Action Properties view displays. Use the controls to make any necessary changes. Click Close. Available Properties Property Description Name A unique name that identifies the object. Description A user defined description of the object. Related Topics HTML and Email Template Settings Database Actions When monitoring log entries, writes each filtered log entry to a user defined database table. Error and recovery alerts are not supported. The configuration process requires 3 steps. 1. Configure the database connection which to write entries. 2. Create a Database Action that uses the database. 3. Assign the Database Action to the log monitor. To configure a database connection: 1. Select Edit > Server Manager Properties. The Server Manager Properties view displays. 2. Select the Databases tab. 3. Click the button. 4. Set the Role to Undefined. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 144 Printed Documentation 5. From the Provider drop-down, select either SqlServer, MySQL or Oracle. The database specific view displays. 6. Configure the database specific properties. 7. Click Test Connection and verify Server Manager is able to connect to the database. 8. Click Close. When prompted to save your changes, click Yes. To create a Database Action: 1. 2. 3. 4. 5. Select File > New > Action. The Create New Action dialog displays. From Type drop-down, select Database. The Database Action specific view displays. Type a unique Name. From the Database drop-down, select the target database. From the Table drop-down, specify the table name or use the available tags. When saving text log entries do not use the {LOG} tag as the entire path and file name are used in place of the tag potentially causing the table name to exceed the maximum table name length supported by the database. 6. Click OK. To assign a Database Action: For more information, see Assign Action. Related Topics Actions, Alerts and Notifications Action Variable Tags Action variable tags are used to insert variable values when firing Actions, generating Reports, and exporting logs. When necessary, each tag is parsed out and replaced with the appropriate value. The available variable tags depend on the current functionality that is running. General Variable Tags DATE The current date. TIME The current time. LOCALHOST The host name of the computer where the software is installed. MESSAGE A detailed message. NAME The object's name. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 145 Printed Documentation OBJECT_TYPE The type of Report. HOST The target host name(s). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv4 The target IPv4 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) IPv6 The target IPv6 address(es). TEXT: comma delimited HTML: line feed delimited (<br/>) LOG The target log name. DATE_RANGE The time span to check (e.g. daily). STATE The object state (e.g. OK, Warning, Critical, Error). STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. TEMPLATE The name of the Template (only applies to Monitors). OBJECT_TYPE The type of object (e.g. the type of Monitor or Report). SHORT_MESSAGE A short descriptive message. MESSAGE A detailed message. General Monitor Item Tags Some functionality, such as disk space alerts, include arrays of items. When firing Actions for these Monitors item content may be customizable. When firing text based Actions, such as text email (versus HTML email) or Message Box alerts, customize item content by wrapping the target Action variable tags within <ITEM> </ITEM> tags. For example, when firing a free disk space alert you can define the item variables to display like so: <ITEM>\\{HOST}\{DISK} {FREE} {USED} {CAPACITY}</ITEM> When firing HTML based Actions, such as HTML email (verses text email) or exporting to an HTML file, customize item content by wrapping the target Action variable tags within <ENTRY_ODD> </ENTRY_ODD> and <ENTRY_EVEN> </ENTRY_EVEN> tags. For more information see, HTML and Email Templates HOST Server Manager Guide The target host name. © 2016 Veriato, Inc., all rights reserved. 146 Printed Documentation IPv4 The target IPv4 address. IPv6 The target IPv6 address. NAME The name of the Monitor, Report or Auto Configurator (e.g. [HOSTNAME] ([TEMPLATE NAME])) STATE The item state (e.g. OK, Warning, Critical, Error). MESSAGE SHORT_MESSAGE A short descriptive message including the item name or key (e.g. C$). ITEM_MESSAGE A short descriptive message excluding the item name or key (e.g. C$). TRIGGER_MESSAGE When the object state is Warning, Critical or Error a short descriptive message, otherwise an empty string. START_TIME The time the Monitor item started. END_TIME The time the Monitor item completed. DURATION The total time required to complete. CPU Monitors Summary Report item variable tags CPU_NAME The CPU name. * HTML only. CPU_ARCHITECTURE The CPU architecture. * HTML only. CPU_AVERAGE The average CPU load across all CPUs/cores. * HTML only. CPU_CLOCK_SPEED The maximum CPU clock speed. * HTML only. CPU_CORES The number of CPU cores. * HTML only. CPU_FREE The average free CPU across all CPUs/cores. * HTML only. CPU_MAXIMUM The maximum CPU load of any CPU/core. * HTML only. CPU_USED The average CPU load across all CPUs/cores. * HTML only. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 147 Printed Documentation DATE_RANGE The CPU history's date range. * HTML only. CPU_BAR_IMG Displays the last known CPU load in a horizontal bar gauge. * HTML only. HISTORY_IMG Displays the CPU load history chart. * HTML only. Defrag Monitors Item variable tags DISK The disk key (e.g. C$) Directory Cleaner Monitors Item variable tags PATH The full path of the target directory. FILE_COUNT The number of files deleted. DIRECTORY_CLEANER_NUMBER_OF_FILES_DELETED SIZE DIRECTORY_CLEANER_SIZE_OF_FILES_DELETED The total size of files deleted. DIRECTORY_CLEANER_SIZE_OF_FILES_BEFORE The size of directory prior to cleaning the directory. DIRECTORY_CLEANER_SIZE_OF_FILES_AFTER The size of the directory after cleaning the directory. DIRECTORY_CLEANER_NUMBER_OF_FILES_BEFORE The number of files prior to cleaning the directory. DIRECTORY_CLEANER_NUMBER_OF_FILES_AFTER The number of files after cleaning the directory. Directory Size Monitors Item variable tags SIZE The size of the disk. USED_SPACE The used disk space. USED_SPACE_PERCENT The percent of used disk space. FREE_SPACE The free disk space. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 148 Printed Documentation FREE_SPACE_PERCENT The percent of free disk space. PATH The full path of the target directory. DIRECTORY_SIZE The size of the directory. DIRECTORY_SIZE_PERCENT The percent of disk space the directory is consuming. FILE_COUNT The number of files. SUB_DIRECTORY_COUNT The number of sub-directories. LAST_KNOWN_USED_SPACE The size of the directory when the Monitor was previously executed. DELTA_SIZE The change in directory size between Monitor executions. DELTA_PERCENT The percent change in directory size between Monitor executions. THRESHOLD The triggered threshold (e.g. 10 GBs). Summary Report item variable tags SIZE The size of the disk. USED_SPACE The used disk space. USED_SPACE_PERCENT The percent of used disk space. FREE_SPACE The free disk space. FREE_SPACE_PERCENT The percent of free disk space. NET_NAME The network name of the disk (e.g. C$). PATH The full path of the target directory. DIRECTORY_SIZE The size of the directory. DIRECTORY_SIZE_PERCENT The percent of disk space the directory is consuming. FILE_COUNT The number of files. SUB_DIRECTORY_COUNT The number of sub-directories. DATE_RANGE The target date range. * HTML only. CONSUMPTION_RATE_HOURLY Given the target date range, the calculated hourly consumption rate. * HTML only. CONSUMPTION_RATE_DAILY Given the target date range, the calculated daily consumption rate. * HTML only. CONSUMPTION_RATE_WEEKLY Given the target date range, the calculated weekly consumption Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 149 Printed Documentation rate. * HTML only. CONSUMPTION_RATE_MONTHLY Given the target date range, the calculated monthly consumption rate. * HTML only. CONSUMPTION_RATE_QUARTERLY Given the target date range, the calculated quarterly consumption rate. * HTML only. CONSUMPTION_RATE_YEARLY Given the target date range, the calculated yearly consumption rate. * HTML only. Directory Watcher PATH The full path of the target directory. FILENAME The full path and filename of the target file. CHANGE_TYPE The change type (e.g. Created, Deleted, Changed, or Renamed) NEW_NAME When a file is renamed, the new name of the file otherwise an empty string. Disk Space Monitors Item variable tags DISK The caption or if unavailable the network name of the disk (e.g. OS (C:)). NET_NAME PATH (deprecated) The network name of the disk (e.g. C$). SIZE The size of the disk. USED_SPACE The used disk space. USED_SPACE_PERCENT The percent of used disk space. FREE_SPACE The free disk space. FREE_SPACE_PERCENT The percent of free disk space. LAST_KNOWN_USED_SPACE The used disk space when the Monitor was previously executed. DELTA_SIZE The change in used disk space between Monitor executions. DELTA_PERCENT The percent change in used disk size between Monitor executions. THRESHOLD The triggered threshold (e.g. 10 GBs) Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 150 Printed Documentation Summary Report item variable tags SIZE The size of the disk. USED_SPACE The used disk space. USED_SPACE_PERCENT The percent of used disk space. FREE_SPACE The free disk space. FREE_SPACE_PERCENT The percent of free disk space. DATE_RANGE The target date range. * HTML only. CONSUMPTION_RATE_DAYS_REMAINING Given the target date range, the calculated number of days until the disk is out of space. * HTML only. CONSUMPTION_RATE_ESTIMATED_FULL_DATE Given the target date range, the calculated date the disk will run out of space. * HTML only. CONSUMPTION_RATE_HOURLY Given the target date range, the calculated hourly consumption rate. * HTML only. CONSUMPTION_RATE_DAILY Given the target date range, the calculated daily consumption rate. * HTML only. CONSUMPTION_RATE_WEEKLY Given the target date range, the calculated weekly consumption rate. * HTML only. CONSUMPTION_RATE_MONTHLY Given the target date range, the calculated monthly consumption rate. * HTML only. CONSUMPTION_RATE_QUARTERLY Given the target date range, the calculated quarterly consumption rate. * HTML only. CONSUMPTION_RATE_YEARLY Given the target date range, the calculated yearly consumption rate. * HTML only. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 151 Printed Documentation File Count Monitors Item variable tags PATH The full path of the target directory. DIRECTORY_SIZE The size of the directory. FILE_COUNT The number of files. SUB_DIRECTORY_COUNT The number of sub-directories. LAST_KNOWN_FILE_COUNT The number of files when the Monitor was previously executed. THRESHOLD The triggered threshold (e.g. 5000 files). File Size Monitors Item variable tags MASK The Template mask used to search for the file (e.g. \\SERVERNAME\c$\logs\*.txt). LOG FULLNAME The full path and filename. NAME FILENAME The filename. PATH The full path of the target directory. FILE_SIZE The size of the file. DELTA_SIZE The change in size between Moniitor executions. DELTA_PERCENT The percent change in size between Moniitor executions. LAST_KNOWN_FILE_SIZE The size of the file when the Monitor was previously executed. THRESHOLD The triggered threshold (e.g. > 10 GBs). Idle File Monitors Item variable tags MASK The Template mask used to search for the file (e.g. \\SERVERNAME\c$\logs\*.txt). LOG The full path and filename. FULLNAME NAME FILENAME The filename. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 152 Printed Documentation PATH The full path of the target directory. TIME_SPAN The time span since the last file modification. Memory Monitors Summary Report item variable tags MEMORY_USED The average CPU load across all CPUs/cores. * HTML only. MEMORY_FREE The average CPU load across all CPUs/cores. * HTML only. DATE_RANGE The CPU history's date range. * HTML only. BAR_IMG Displays the last known memory load in a horizontal bar gauge. * HTML only. HISTORY_IMG Displays the memory load history chart. * HTML only. Performance Counter Monitors Summary Report item variable tags VALUE The performance counter value. * HTML only. DATE_RANGE The performance counter history's date range. * HTML only. HISTORY_IMG Displays the performance counter history chart. * HTML only. Ping Monitors Summary Report item variable tags ROUND_TRIP_TIME The ping response time. * HTML only. DATE_RANGE The ping history's date range. * HTML only. HISTORY_IMG Displays the ping history chart. * HTML only. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 153 Printed Documentation SMART Monitors Item variable tags DISK The network name of the disk (e.g. C$). NET_NAME SMART The SMART status (e.g. OK, Degraded). Event Log Alerts Header variable tags LOG The name of the log (e.g. Application, System, Security). FILTER The applied filter name. AD_USER When firing an email alert for an Event Log entry that passes a Monitor's filter, the tag is replaced with the Active Directory assigned email address for the user listed within the USER column of the entry. If multiple entries pass the post consolidation filter the first entry that contains a non-null value within the USER column is used for the lookup. USER When firing an email alert for an Event Log entry that passes a Monitor's filter, the email address can be changed to the contents of the USER column within the entry. If multiple entries pass the filter the first entry that contains a non-null value within the USER column is used for the replacement. If the USER column contains a domain name, the domain name is removed. For example: If the Event Log entry USER column contains: LITTLEWATER\jdoe and the email address within the email Action is defined as: {USER}@Veriato.com the actual email address used is: [email protected] Item variable tags HOST The host that generated the entry. * If an alias has been assigned to the host the alias is used in-place of the actual hostname. IPv4 The IPv4 address of the host that generated the entry. IPv6 The IPv6 address of the host that generated the entry. DATE The date the entry was generated. TIME The time the entry was generated. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 154 Printed Documentation LOG The name of the log (e.g. Application, System, Security). LEVEL The Event Log entry level (e.g. Warning or Critical). * When forwarding entries the Syslog message priority is automatically set to each Event Log entry's level. SOURCE The entry source. EVENT The entry event ID. CATEGORY The entry category. USER The entry user. MESSAGE The entry message. DATA The entry data in hexadecimal format. DATA_ASCII The entry data in ASCII format. DATA_UNICODE The entry data in Unicode format. Entry Not Found Alert Item variable tags MASK The Template mask used to search for the file (e.g. \\SERVERNAME\c$\logs\*.txt). * Text Log Monitors only. LOG The name of the log (e.g. System, Syslog, myapp.log). FILENAME The full path and filename. FILTER The name of the filter that was applied. DATE_RANGE The threshold's time span (e.g. 2 Hours). EXPECTED_COUNT The expected number of entries per time span. COUNT The actual number of entries found during the time span. Event Log Consolidation Item variable tags LOG The name of the log (e.g. Application, System, Security). DOWNLOADED_COUNT The number of entries downloaded. DUPLICATE_COUNT Server Manager Guide The number of entries previously downloaded. This value is typically 1; however, if an application writes several entries to the Event Log at the same millisecond this value may be greater than 1. © 2016 Veriato, Inc., all rights reserved. 155 Printed Documentation FILTERED_COUNT When a consolidation filter is assigned, the number of entries that passed the consolidation filter. SAVED_COUNT The number of entries saved to the Log Repository. FROM The oldest date to download. File Consolidation Item variable tags PATH The full path of the target directory. FILE_COUNT_COPIED The number of files copied. FILE_SIZE_COPIED The size of the files copied. FILE_COUNT_DELETED The number of files deleted. FILE_SIZE_DELETED The size of the files deleted. DIRECTORY_SIZE The size of the directory. Output directory tags DATE The current date. TIME The current time. PATH The source path. * All special characters are replaced with an underscore. Output filename tags DATE The current date. TIME The current time. LOG The full path to the source file. FULLNAME * All special characters are replaced with an underscore. NAME The source filename. FILENAME * All special characters are replaced with an underscore. PATH The source path. * All special characters are replaced with an underscore. Text Log Consolidation FILENAME The target log's filename. LOG The target log's full path and filename. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 156 Printed Documentation MASK The full path and filename or mask. DOWNLOADED_COUNT The number of entries downloaded. FILTERED_COUNT When a consolidation filter is assigned, the number of entries that passed the consolidation filter. SAVED_COUNT The number of entries saved to the Log Repository. FROM The position within the file data was read from. This value is typically the last known length. SIZE The size or length of the data read. SNMP Traps Item variable tags OID The object identifier. NAME The name or alias associated with the object identifier. VALUE The variable's value. DATA_TYPE The variable's data type. Related Topics HTML and Email Template Settings Auto Configurator Properties Reports File Output Options When running on-demand Reports (e.g. Failed Logons, Largest Files, etc.), you have the option to save the Report results to file. HTML, TXT, CSV and PDF file formats are supported. By default, HTML, TXT and PDF files are saved using UTF-8 encoding allowing any language to display as expected, however, if your primary language requires Unicode (e.g. Japanese), Reports may be reduced in size by saving to Unicode format. To save files using Unicode format, check Unicode. If generating CSV files and your data includes non-ASCII and/or Unicode characters (e.g. Japanese), check UTF-8. When saved, previously generated Reports can be: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 157 Printed Documentation Overwritten Deletes the old file and replaces with the new file. Backed up Moves the previously generated file to a backup sub-directory and renames the file using a combination of the current filename and current date. Appended to Text and CSV only. Appends the Report to the previous file. Tray Icon The Tray Icon is client application that enables your Windows desktop to display system status, receive desktop notifications (e.g. message box alerts, sound alerts and interactive file execution) and launch the Management Console. The Tray Icon can be installed on any Windows computer then configured to connect to the Server Manager Service (multiple if necessary). Once connected, your desktop is ready to display the system status, message box alerts and play sound alerts. The Tray Icon displays the following system status icons: Icon Description The Tray Icon has connected to the service and there are no triggers. The Tray Icon has connected to the service and there is at least one warning trigger. The Tray Icon has connected to the service and there is at least one critical trigger. The Tray Icon has connected to the service and there is at least one error trigger. The service is not running. To configure your workstation, laptop or home computer to receive desktop notifications: See Desktop Actions, Alerts and Notifications To open Server Manager from the tray: Double-click the Tray Icon or right-click and select Open Veriato Management Console. If the Tray Icon is displaying a warning, critical or error icon, the Console automatically opens the last triggered Monitor. To clear the Tray Icon alert icon: From the Tray Icon, right-click and select Clear Tray Alert. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 158 Printed Documentation To view the message box alert history: From the Tray Icon, right-click and select View Message Box Alert History. To temporarily close the Tray Icon: From the Tray Icon, right-click and select Exit. Desktop Actions will no longer fire. To restart the Tray Icon: From them Console, select Tools > Start Tray Icon. To disable the Tray Icon: 1. From them Console, select Tools > Options. The Options dialog displays. 2. From the User Preferences tab, check Disable the tray icon. Desktop Actions will no longer fire. To enable the Tray Icon: 1. From them Console, select Tools > Options. The Options dialog displays. 2. From the User Preferences tab, un-check Disable the tray icon. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 159 Auto Configurators Auto Configurators An Auto Configurator is a configurable object used to monitor new servers and workstations. When utilized in large environments, Auto Configurators can be a very powerful tool enabling Server Manager to automatically monitor new and renamed servers without any interaction. How it works: When executed, an Auto Configurator scans your Active Directory tree or targeted organizational unit (OU) for computers. Once found, each computer is filtered through an optional property Filter (e.g. operatingSystem contains Server) and an exclusion list. Once filtered, each computer is then added to the system. Finally, targeted Templates and Reports are assigned to each computer. When executed, any computer that has already been added to Server Manager will be updated with the latest assignments. Previous assignments are left unmodified. For example, if you have previously configured a server and have modified the Auto Configurator to include a new Template such as a Disk Space Monitor Template, the Template will be assigned to all computers that reside in both the Active Directory tree and Server Manager. If an assignement is removed from the Auto Configurator, computers previously added by the Auto Configurator are uneffected. Related Topics Active Directory Settings Batch Update Auto Configurators Add Auto Configurator An Auto Configurator is a configurable object used to monitor new servers and workstations. When utilized in large environments, Auto Configurators can be a very powerful tool enabling Server Manager to automatically monitor new and renamed servers without any interaction. To create an Auto Configurator: 1. Select File > New > Auto Configurator. The Select Active Directory Entry dialog displays. 2. Select the target organizational unit (OU). The Auto Configurator Properties view displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 161 Printed Documentation 3. Type a unique Name. 4. Configure the properties. 5. Click OK. Auto Configurator Properties The Auto Configurator Properties view enables you view and modify configuration settings. To view or edit an Auto Configurator: 1. From the Object Explorer, expand the Auto Configurators node. 2. Navigate to the target Auto Configurator. 3. Right-click then select Properties. The Auto Configurator Properties view displays. Available Properties Property Description Name The friendly name of the object. Description A user description of the object. Active Directory path The full path to the target organizational unit. Recurse OU Option to recursively scan the organizational unit. Append domain name Option to append a domain name so computers can be accessed using their FQDN. Enabled Enables the scheduled execution. Temporarily disabled Temporarily disables scheduled execution. Execution frequency The frequency to execute. Object assignment The groups and objects to assign discovered computers (e.g. Templates). Exclusion filters Complex Active Directory computer property filters (e.g. operatingSystem contains 'Server') and computer name exclusion list with import function. History retention policy The number of days to retain execution results in the history database. Complete Actions Actions and notifications to execute when complete (e.g. receive a daily Report that shows a detailed list of updates). Error Actions Actions, alerts and notifications to fire when there is an execution error (e.g. the Active Directory path cannot be found). Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 162 Printed Documentation Action Variable Tags The following tags are available: Tag Description Supports Single Line Display (e.g. email subject) DATE The current date. X TIME The current time. X LOCALHOST The host name of the computer where the software is installed. X NAME The object's name. X OBJECT_TYPE The type of object (e.g. Auto Configurator). X STATE The object state (e.g. OK, Warning, Critical, Error). X STATE_IMG The object state image (e.g. OK, Warning, Critical, Error). Applies to HTML output only. SHORT_MESSAGE A short descriptive message. X MESSAGE A detailed message. PATH The Active Directory path. X DURATION The total time it takes the function to execute. X STS A list of all informational messages. ERR A list of all error messages. Auto Configuator results do not support item tags. Related Topics Action Variable Tags HTML and Email Template Settings Assign Templates to Auto Configurator Assigning a Template to an Auto Configurator enables Server Manager to automatically assign Templates to newly discovered computers. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 163 Printed Documentation To assign Templates to an Auto Configurator: 1. 2. 3. 4. 5. 6. 7. 8. From the Object Explorer, expand Auto Configurators. Navigate to the Auto Configurator you want to assign the Template. Right-click and select Properties. The Auto Configurator Properties view displays. Select the Templates tab. Optionally, use the Host Groups drop-down button to assign a host group. Use the Template Groups drop-down button to assign a Template group. Use the Templates drop-down button to assign the Template or group of Templates. Click Close to save your changes. Select Active Directory Organizational Unit When adding a new Auto Configurator you are prompted to select an organizational unit (OU) within your Active Directory tree. To display the select dialog: 1. Select File > New > Auto Configurator. The Auto Configurator Properties dialog displays. 2. The Select Active Directory Entry dialog immediately displays. To select an organizational unit: 1. Select the target organization unit. 2. Click Select. Related Topics Active Directory Settings Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 164 Printed Documentation Groups Groups Systems management is made easier through grouping. Grouping provides you with the ability to group similar or related objects into smaller more manageable collections while also offering inheritance (e.g. when assigning a host to a host group, all templates assigned to the host group are applied to the host). Server Manager supports hierarchical grouping as well as multi-assignment. A simple example Let's say we have 3 servers (coalville, kamas, and marion) of which all provide internal HTTP interfaces on port 8080. A SQL Server database is hosted on coalville, kamas provides public HTTP interfaces for www.mycompany.com and www.diskmonitor.com and marion provides SMTP, IMAP and POP3 interfaces for mail.mycompany.com. In this example the goal is to ping all physical machines and monitor all HTTP, database, and email interfaces. To implement these monitoring requirements: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Create 4 groups: Database Servers, Mail Servers, Physical Servers and Web Servers. From the Web Servers group, create 2 sub-groups named External and Internal. Add coalville to the Database Servers group. Add mail.mycompany.com to the Mail Servers group. Add coaville, kamas and marion to the Physical Servers group. Add www.mycompany.com and www.diskmonitor.com to the Web Servers > External group. Add coaville, kamas and marion to the Web Servers > Internal group. Create the database, email, ping, external HTTP and internal HTTP Templates. Assign the database Template to coalville. Assign the email Templates to mail.mycompany.com. Assign the ping Template to the Physical Servers group. Assign the public HTTP Templates to the External group. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 165 Printed Documentation 13. Assign the internal HTTP Templates to the Internal group. Here is an example of how it should look: Assign generic Templates (e.g. ping) to groups and host specific Templates (e.g. Templates that contain logon as information) directly to the appropriate host. Related Topics Batch Assign Computers Devices and Hosts to a Group Batch Assign Templates to a Group Monitor Hierarchy Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 166 Printed Documentation Add Group To create a group: 1. From the Object Explorer, navigate to the object collection node (e.g. Computers, Devices and Hosts, Templates or any user defined groups). 2. Right-click then select New Group. The New Group dialog displays. 3. Enter the group name, then click OK. Related Topics Batch Assign Computers Devices and Hosts to a Group Batch Assign Templates to a Group Assign Group Server Manager enables you to move or link objects (e.g. hosts, host groups, Templates, Template groups) to groups of hosts, Templates and Reports. To assign an object to a group: From the Object Explorer, use drag and drop. Upon dropping, if prompted, select from one of the following popup menu item options: Move Unassigns the object from the current object and moves it to the target object. Link Links the object to the target object creating an assignment to multiple objects. Cancel Cancels the drag and drop operation. To assign a Template to hosts, host groups and Template groups: 1. From the Object Explorer, navigate to the target Template. 2. Right-click and select Template Properties. The Template Properties view displays. 3. Use the Template Assignments view to assign the Template to hosts, host groups and Template groups. To assign a Summary Report to hosts, host groups and Report groups: 1. From the Object Explorer, navigate to a Summary Report. 2. Right-click and select Properties. The Report Properties view displays. 3. Use the Report Assignments view to assign the Report to hosts, host groups and Report groups. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 167 Printed Documentation To move a host group: Host groups cannot be assigned or linked to multiple parent host groups. 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Use drag and drop to move a host group to another host group. Or 3. Right-click on the host group that you want to assign to. 4. Select Assign > Group. The Assign Group to (x) Group dialog displays. 5. Under Group Type, select Host. 6. Under the Select Host Group drop-down, select the host group you want to move. 7. Click Assign. The group from step 6 is moved to the group from step 3. To assign a host group to a Template group: Host groups can be assigned or linked to multiple Template groups. 1. From the Object Explorer, expand Computers, Devices and Hosts. 2. Use drag and drop to assign a host group to a Template group. Or 3. Right-click on the host group that you want to assign to. 4. Select Assign > Group. The Assign Group to (x) Group dialog displays. 5. Under Group Type, select Template. 6. Under Assignment Options, select Link or Move. If you choose Move, the host group is unassigned from all other Template groups. 7. Under the Select Template Group drop-down, select the Template group you want to assign. 8. Click Assign. The group from step 7 is assigned to the group from step 3. To move a Template group: Template groups cannot be assigned or linked to multiple parent Template groups. 1. From the Object Explorer, expand Templates. 2. Use drag and drop to move a Template group to another Template group. Or 3. Right-click on the Template group that you want to assign to. 4. Select Assign > Group. The Assign Group to (x) Group dialog displays. 5. Under Group Type, select Template. 6. Under the Select Template Group drop-down, select the Template group you want to move. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 168 Printed Documentation 7. Click Assign. The group from step 6 is moved to the group from step 3. To assign a Template group to a host group: Template groups can be assigned or linked to multiple host groups. 1. From the Object Explorer, expand Templates. 2. Use drag and drop to assign a Template group to a host group. Or 3. Right-click on the Template group that you want to assign to. 4. Select Assign > Group. The Assign Group to (x) Group dialog displays. 5. Under Group Type, select Host. 6. Under Assignment Options, select Link or Move. If you choose Move, the Template group is unassigned from all other host groups. 7. Under the Select Host Group drop-down, select the host group you want to assign. 8. Click Assign. The group from step 7 is assigned to the group from step 3. Related Topics Batch Assign Computers Devices and Hosts to a Group Batch Assign Templates to a Group Log Management Log Management Email Logs Encrypt and Sign Files Event Log to Syslog EVT and EVTX Files Export Logs Log Repository Retention Policy Search for Logs Syslog Consolidation Template Syslog Monitor Template Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 169 Printed Documentation Email Logs Server Manager includes the capability to email consolidated logs as well as filtered log entries to other co-workers. You can email multiple consolidated logs as well as an entire page or selected entries from any of log viewers. To email multiple consolidated logs: Select Logs > Email Logs. The Select Log Type dialog displays. Select the log type then click OK. The Select Multiple Logs dialog displays. Check the logs to email then click OK. The Email Consolidated Logs dialog displays. Use the To drop-down to select the target email address or type the email address. Use a comma to separate multiple email addresses. 5. Use the Subject and Message to text boxes to customize the subject and message. 6. Select the File type (e.g. CSV, HTML, PDF, TXT, ELF, SLF). ELF and SLF files are Veriato Software's binary file format (ELF: Event Log File, SLF: Syslog File). Email recipients must use their own installation of the Management Console to view ELF and SLF files. 1. 2. 3. 4. If generating CSV files and your data includes Unicode characters (e.g. Japanese), check UTF-8 7. To compress the output files to a single ZIP file, check Compress to ZIP format. 8. If emailing HTML files and you would like to apply your own HTML Template, check Override the default HTML Template, click the Browse button then select your custom HTML Template. 9. Click Send. To email an entire page of log entries: 1. From any of the log viewers, right-click then select Email. The Email Current Page dialog displays. 2. Use the To drop-down to select the target email address or type the email address. Use a comma to separate multiple email addresses. 3. Use the Subject text box to customize the subject. 4. To send the current page as an attachment, check Send as attachment. 5. If sending as an attachment, select the File type (e.g. CSV, HTML, TXT, ELF, SLF). ELF and SLF files are Veriato Software's binary file format (ELF: Event Log File, SLF: Syslog File). Email recipients must use their own installation of the Management Console to view ELF and SLF files. If generating CSV files and your data includes Unicode characters (e.g. Japanese), check UTF-8 6. To compress the output files to a single ZIP file, check Compress to ZIP format. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 170 Printed Documentation 7. If emailing HTML and you would like to apply your own HTML Template, check Override the default HTML Template, click the Browse button then select your custom HTML Template. 8. Click Send. To email selected log entries: 1. From any of the log viewers use the Shift and/or Ctrl key along with the mouse to select multiple entries. 2. Once you have selected the entries to email, right-click then select Email Selected Entries. The Email Selected Entries dialog displays. 3. Use the To drop-down to select the target email address or type the email address. Use a comma to separate multiple email addresses. 4. Use the Subject text box to customize the subject. 5. To send the selected entries as an attachment, check Send as attachment. 6. If sending as an attachment, select the File type (e.g. CSV, HTML, TXT, ELF, SLF). ELF and SLF files are Veriato Software's binary file format (ELF: Event Log File, SLF: Syslog File). Email recipients must use their own installation of the Management Console to view ELF and SLF files. If generating CSV files and your data includes Unicode characters (e.g. Japanese), check UTF-8 7. To compress the output files to a single ZIP file, check Compress to ZIP format. 8. If emailing HTML and you would like to apply your own HTML Template, check Override the default HTML Template, click the Browse button then select your custom HTML Template. 9. Click Send. Related Topics Email Settings HTML and Email Template Settings Log Viewers Encrypt and Sign Files Many compliance regulations, such as PCI DSS Requirement 10.5.3 state IT must "Verify that current audit trail files are promptly backed up to a centralized log server or media that is difficult to alter". To fulfill this requirement Server Manager includes functions to encrypt, password protect digitally sign and centrally backup log files. When Server Manager encrypts a file the filename extension is replaced with .cbx. CBX files can only be decrypted using a valid password through the Management Console. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 171 Printed Documentation To backup, encrypt and sign Event Log files: Select File > New Template. The Select Template Type dialog displays. From the menu tree, expand Log Management > Event Log Management. Double-click Event Log File Backup. The Template Properties dialog displays. Use the General tab to enter a unique Name and configure the frequency to run. Use the Logs tab to target Event Log files. Use the Event Log File Backup tab to configure the backup options: o To compress backed up logs, check Compress to ZIP format. o To encrypt backed up logs, check Encrypt and password protect then type a password. o To digitally sign backed up logs, check Digitally sign, click the Browse button to select the digital certificate you would like to sign the files with, then the certificate password or private key. o To clear the remote Event Log file contents, check Clear the remote .evtx or .evt file contents. o To delete old backed up files, check Delete files in the target directory older than x days then type the maximum number of days to retain. 7. Use the Template Assignments view to assign hosts, host groups and Template groups. 8. Click OK. 1. 2. 3. 4. 5. 6. To backup, encrypt and sign application log files: 1. 2. 3. 4. 5. 6. 7. Select File > New Template. The Select Template Type dialog displays. From the menu tree, expand Log Management. Double-click File Consolidation. The Template Properties dialog displays. Use the General tab to configure the frequency to download and backup the remote files. Use the Directories tab to select the directories to backup. Use the Exclusions tab to configure sub-directories to exclude. Use the Control tab to configure Server Manager to stop services and processes prior to backing up files. Services and processes are stopped in the order listed and restarted in the reverse order. 8. Use the Function tab to configure the backup options: o Use the Filename Masks controls to select the files or file types to backup as well as the files or file types to exclude. o Choose to copy or move files. o To delete files in the source directory, check Once copied, delete files in the source directory older than x days then type the maximum number of days to retain. o Specify the Target output directory. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 172 Printed Documentation To prepend backed up files with a tag, from the Tag output filenames with text box type the tag. o To compress backed up files, check Compress to ZIP format. o To encrypt backed up files, check Encrypt and password protect then type a password. o To digitally sign backed up files, check Digitally sign, click the Browse button to select the digital certificate you would like to sign the files with, then the certificate password or private key. o To delete old backed up files, check Once consolidated, delete files in the target directory older than x days then type the maximum number of days to retain. 9. Use the Template Assignments view to assign hosts, host groups and Template groups. 10. Click OK. o Related Topics Batch Functions Day and Time Exclusions Schedules Event Log to Syslog Server Manager comes pre-installed with 2 sample Actions that forward Event Log entries to another Syslog server or device. The Actions are called: Event Log to Syslog • Event Log to Customizable Syslog The Actions are located in the Object Explorer under Actions > Logs. • To prepend each Syslog entry with a constant string: 1. From the Object Explorer, navigate to one of the Event Log to Syslog Actions. 2. Right-click then select Properties. The Action Properties view displays. 3. From the Message text box, type the constant value preceding the current value. For example: WINEVT: {ENTRY} To customize the Syslog message: 1. From the Object Explorer, navigate to Actions > Logs > Event Log to Customizable Syslog. 2. Right-click then select Properties. The Action Properties view displays. 3. From the Message text box, type the constant value or variable tags within the <ITEM> </ITEM> tags. For example: Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 173 Printed Documentation <ITEM>'{HOST}' '{LOG}' '{LEVEL}' '{DATE}' '{TIME}' '{SOURCE}' '{EVENT}' '{CATEGORY}' '{USER}' '{MESSAGE}' '{DATA}'</ITEM> Action Variable Tags The following entry tags are available: HOST The host that generated the entry. NOTE: If an alias has been assigned to the host the alias is used in-place of the actual hostname. IPv4 The IPv4 address of the host that generated the entry. IPv6 The IPv6 address of the host that generated the entry. DATE The date the entry was generated. TIME The time the entry was generated. LOG The log name (e.g. System). LEVEL The Event Log entry level (e.g. Warning or Critical). NOTE: When forwarding entries the to a Syslog server/device the entry level is mapped to an appropriate Syslog priority. SOURCE The entry source. EVENT The entry event ID. CATEGORY The entry category. USER The entry user. MESSAGE The entry message. DATA The entry data in hexadecimal format. DATA_ASCII The entry data in ASCII format. DATA_UNICODE The entry data in Unicode format. EVT and EVTX Files The Windows operating system stores Event Log entries to binary EVT and EVTX files. EVT files contain each entry's information, however; these files may not contain each entry's actual message but rather replacement tags (e.g. %1). Prior to displaying an entry, the Windows Event Viewer loads an associated message DLL then, using the event ID, loads the appropriate replacement values. This format limits the size of Event Logs; however, if you are using Server 2008 when viewed on another computer, the entry message may not load because the EVTX files optionally contain each entry's full message. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 174 Printed Documentation How do EVT and EVTX Files relate to Event Log Consolidation, Archiving and Compliance? Many compliance regulations require Event Logs be maintained for several years so disk space may be a concern. Heavily loaded domain controllers can easily require several terabytes to store one or more years of data. Server Manager provides 2 methods for backing up and archiving Event Logs. These methods are referred to as Event Log Consolidation and Event Log File Backup. When Server Manager consolidates (downloads and saves to a database) entries, each entry's entire message is saved to the Log Repository database. This method is preferred but requires the most disk space, CPU and memory. Consolidation is required to automate Event Log Reports such as Failed Logon Attempts and Account Management. This method provides the fastest data retrieval method ideal for Event Log analysis. When Server Manager backs-up Server 2008 Event Log files we have opted to always save the full message. When Server 2003 EVT files are backed-up, only the replacement tags are included in the EVT files, however, like the Windows Event Viewer, the Management Console includes functions to attempt to load the actual messages from the local system. Server Manager not only provides an easy method to backup EVT/X files to a central location but also includes compression, encryption and file signing functions enabling you to minimize disk footprint while guaranteeing file integrity a common compliance requirement. Backing up EVT/X files is the most efficient method to fulfill log retention compliance requirements. It is a best practice to have redundant systems in place by implementing both Event Log Consolidation and Event Log File Backup functions. The end result provides a method to quickly select database records for on-demand and scheduled weekly auditing while also saving log files in their native format ensuring your organization is not permanently tied to a software vendor. To consolidate Event Logs to the primary Log Repository database: 1. Select File > New > Template. The Select Template Type dialog displays. 2. From the menu tree, expand Log Management > Event Log Management. 3. Double-click Event Log Consolidation and Monitoring. The Template Properties dialog displays. 4. Use the General tab to enter a unique Name and configure the frequency to run. 5. Use the Logs tab to target Event Log files. 6. Use the Consolidation and Monitoring tab to configure the template specific options. 7. Use the Template Assignments view to assign hosts, host groups and Template groups. 8. Click OK. To backup and archive EVT and EVTX files: 1. Select File > New Template. The Select Template Type dialog displays. 2. From the menu tree, expand Log Management > Event Log Management. 3. Double-click Event Log File Backup. The Template Properties dialog displays. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 175 Printed Documentation 4. Use the General tab to enter a unique Name and configure the frequency to run. 5. Use the Logs tab to target Event Log files. 6. Use the Event Log File Backup tab to configure the backup options: o To compress backed up logs, check Compress to ZIP format. o To encrypt backed up logs, check Encrypt and password protect then type a password. o To digitally sign backed up logs, check Digitally sign, click the Browse button to select the digital certificate you would like to sign the files with, then the certificate password or private key. o To clear the remote Event Log file contents, check Clear the remote .evtx or .evt file contents. o To delete old backed up files, check Delete files in the target directory older than x days then type the maximum number of days to retain. 7. Use the Template Assignments view to assign hosts, host groups and Template groups. 8. Click OK. Related Topics Database Settings Configure Server Manager to use SQL Server Configure Server Manager to use MySQL Conserve Disk Space Log Repository Retention Policy Export Logs Server Manager enables you to export consolidated logs to the following formats: File Type Description CSV Comma separated values document for Microsoft Excel or other spreadsheet program. HTML HTML document for Intranet viewing. PDF PDF document. TXT Plain text document. ELF Veriato Event Log File. A binary file format that must be viewed within the Management Console. Supports notes and flags. SLF Veriato Syslog File. A binary file format that must be viewed within the Management Console. Supports notes and flags. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 176 Printed Documentation To export previously consolidated logs: 1. From the Object Explorer, navigate to the target computer, log group or log, right-click then select Save Logs As. Or Select Logs > Save Logs As. The Select Log Type dialog displays. Select the log type then click OK. The Select Multiple Logs dialog displays. Check the logs to export then click OK. 2. The Save Logs As dialog displays. 3. Select the target path. 4. Select the File type. If generating CSV files and your data includes Unicode characters (e.g. Japanese), check UTF-8 5. If generating HTML files and you would like to apply your own HTML Template, check Override the default HTML Template, click the Browse button then select your custom HTML Template. 6. To compress output files to a single ZIP file, check Compress to ZIP format. 7. To encrypt output files, check Encrypt and password protect then type a password. 8. To digitally sign output files, check Digitally sign, click the Browse button to select the digital certificate you would like to sign the files with, then the certificate password or private key. 9. Click Save. Related Topics HTML and Email Template Settings Log Repository Retention Policy The Log Repository Retention Policy Template allows you to automatically manage how long data is stored in the Log Repositories. This Template defines the length of time to retain entries in the Primary Log Repository prior to either removing them from the system or moving them to the Archive Log Repository. Finally, this template defines how long to retain entries in the Archive Log Repository. To create and assign a Log Repository Retention Policy Template: 1. 2. 3. 4. 5. Select File > New > Template. The Select Template Type dialog displays. From the menu tree, expand Log Management. Double-click Log Repository Retention Policy. The Template Properties dialog displays. Use the General tab to enter a unique Name and configure the frequency to run. Use the Retention Policy tab to configure the policy. For large environments we suggest archiving entries older than 15 days and removing archived entries older than 45 days resulting in 60 days of retained Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 177 Printed Documentation entries. To retain entries indefinitely, use your database tools to backup your archive database once a month. 6. Use the Actions tab to assign completion and error actions. 7. Use the Advanced tab to configure the number of days to retain the Monitor history (e.g. number of entries download, filtered, saved and duration) in the History database. 8. Click OK. Related Topics Conserve Disk Space Configure Server Manager to use MySQL Configure Server Manager to use SQL Server Database Settings Log Viewers Search for Logs Many functions throughout Server Manager require you to find or select multiple logs. The Search dialog provides a means to search the Log Repositories. To display the search dialog: 1. Select Logs > Merge. The Select Log Type dialog displays. 2. Select the log type then click OK. The Select Multiple Logs dialog displays. 3. Click Search. The Search for Consolidated Logs dialog displays. To search for logs: 1. From the Search for Computers dialog box, specify your search criteria. 2. Use the Select computers that contain the following text text box to search for computers that contain a portion of the specified text. 3. To search for multiple computers by name check Use regular expressions (e.g. (server01|server02)). 4. Optionally, create and/or assign an Active Directory computer property filter, which enables you to search your AD tree and filter each discovered computer for specific criteria (e.g. only pass computers that have the word "Server" embedded in the "operatingSystem" property). 5. Choose to search for a specific Computer type (e.g. Servers, Domain Controllers, SQL Servers, or Workstations). 6. If searching for Event Logs, use the Select the following logs drop-down to select from the known list of available Event Logs. 7. Click Search. The search is performed. When complete the results are listed. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 178 Printed Documentation 8. To select all results click Select Logs otherwise multi-select the logs of interest then click Select Logs. Log Viewers Log Viewers Server Manager enables you to view consolidated log files (Primary and Archive Log Repositories), backed up log files, and text log files. The log viewers page content enabling you to view large log files without consuming large amounts of memory or time to load. To view consolidated logs: 1. From the Object Explorer, expand the Log Repositories. The Primary and Archive Log Repository nodes display. 2. Navigate to the host, computer, or device of interest then expand until you find the target log. 3. Right-click on the log and select one of the following options: View Top 10000 Consolidated Entries Displays the latest 10,000 entries from the Log Repository. The log viewer displays log entries in pages of 10,000 entries. View Consolidated Log Entries Displays today's entries. The log viewer displays log entries in pages of one day. Merge Merges today's entries from multiple logs. The log viewer displays log entries in pages of one day. To view logs in real-time: 1. From the Object Explorer, expand the Computers, Devices and Hosts node. 2. Navigate to the host, computer or device of interest then expand and locate the target monitor or, in the case of Event Logs or Text Logs, the target log. 3. Right-click and select Watch. To view text log files: 1. Select File > Open. Choose the type of file to open. The following options are available: Event Log files *.evtx, *.evt Text log files *.log, *.txt Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 179 Printed Documentation Log Repository files *.elf, *.slf Encrypted files *.cbx Signed files *.signed Zipped files *.zip 2. Click Open. Event Log Viewer Server Manager provides the following Event Log viewers. Viewer Description .ELF Displays ELF files. ELF files are consolidated Event Logs that have been saved using Server Manager's binary file format. Supports flags and notes. Does not support merging. Page by Day Displays consolidated log entries paged by day(s). Supports merging, flags and notes. Page by Rows Displays the top 10,000 consolidated log entries. Supports flags and notes. Does not support merging. Real-Time Displays in real-time received Event Log entries. Does not support merging, flags or notes. Report Displays consolidated log entries paged by day(s). Supports merging, flags and notes. Syslog Log Viewer Server Manager provides the following Syslog Log viewers. Viewer Description .SLF Displays SLF files. SLF files are consolidated syslogs that have been saved using Server Manager's binary file format. Supports flags and notes. Does not support merging. Page by Day Displays consolidated log entries paged by day(s). Supports merging, flags and notes. Page by Rows Displays the top 10,000 consolidated log entries. Supports flags and notes. Does not support merging. Real-Time Displays in real-time received syslog messages. Does not support merging, flags or notes. Report Displays consolidated log entries paged by day(s). Supports merging, flags and notes. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 180 Printed Documentation Text Log Log Viewer Text Log Log Viewer Server Manager provides the following Text Log viewers. Viewer Description Page by Day Displays consolidated log entries paged by day(s). Supports merging, flags and notes. Page by Rows Displays the top 10,000 consolidated log entries. Supports flags and notes. Does not support merging. Real-Time Displays and optionally tails the actual log file. Does not support merging, flags or notes. Report Displays consolidated log entries paged by day(s). Supports merging, flags and notes. Goto Line When watching or tailing a text log file the Real-Time Text Log Viewer enables you to quickly jump to a specific line number. To goto a specific line number 1. From the Real-Time Text Log Viewer press Ctrl + G. The GoTo Line dialog displays 2. Enter the line number to jump to, then click OK. The viewer navigates to the line number. Windows Service Windows Service Syslog Server Assign Service Logon As Credentials Windows Service Log Run the Service in Verbose Mode Assign Service Logon As Credentials The Server Manager Service executes all configured functionality using the account the service is logged on as. In order for the service to access network resources (e.g. downloading Event Logs, scanning disk space, sending email through Exchange Server or connecting to SQL Server databases that require Windows Authentication), the service must run with either domain or local administrator credentials. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 181 Printed Documentation If you are monitoring servers on another domain or off-domain computers you may need to also assign target computer logon as credentials. To change the service logon as credentials: 1. From the computer the service is installed, open the Management Console. 2. Select Service > Change Service Logon. 3. Specify a domain administrator username, password and domain. If the service fails to start because of a logon failure, check the credentials and try again. Related Topics Access Denied Errors Assign Logon As Credentials Windows Service Log The Server Manager Service logs errors, triggers, general activity, and verbose output to a text log file called smsrv.log. You can view the log file from the Management Console or from any text editor to verify activity or troubleshoot the system. To tail the service log from the Console: Select View > Service Output. The Service Output view displays. To view the entire service log from the Console: Select Service > View Service Log. The Service Log History dialog displays. To open the service log file from Notepad: 1. From the computer the service is installed, open Notepad. 2. Select File > Open. 3. Open the service log file from the following directory: Server 2012 and c:\programdata\cornerbowl\server manager\cbsmsrv.log 2008 Windows 8, 7 and Vista Server 2003 Windows XP Server Manager Guide C:\documents and settings\all users\application data\cornerbowl\server manager\smsrv.log © 2016 Veriato, Inc., all rights reserved. 182 Printed Documentation To email the service log from the Console to Veriato Support: Select Service > Email Service Log File. The Email Service Log File view displays. Run the Service in Verbose Mode The Server Manager Service logs errors, triggers, and general activity to a text log file called smsrv.log. If you are not receiving the results you expect and have already reviewed the service log file you may be able to gain insight by temporarily running the service in verbose mode. When run in verbose mode, the service logs additional debug messages enabling you to identify executing functions (e.g. executing Monitors and schedule updates). To run the service in verbose mode: 1. 2. 3. 4. From the computer the service is installed, open the Management Console. Select Service > Stop. Once you are prompted the service has stopped, click OK. Select Service > Start Verbose. To return the service to normal mode: 1. 2. 3. 4. From the computer the service is installed, open the Management Console. Select Service > Stop. Once you are prompted the service has stopped, click OK. Select Service > Start. Syslog Server Server Manager contains both a UDP and TCP Syslog server. These syslog servers can be used to collect, monitor, and consolidate syslog messages from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a message is sent from a device, the receiving Syslog server automatically adds the device's IP or hostname to the Object Explorer. Once added, the message is saved to the Log Repository. Syslog Monitoring Template Consolidation Filter topic (if available) Related Topics Syslog Server Settings Log Repository Retention Policy Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 183 SNMP SNMP Server Server Manager contains an internal SNMP server. The SNMP server can be used to receive and forward traps from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a trap is sent from a device, the receiving SNMP server automatically adds the device's IP or hostname to the Object Explorer. Once added, the trap is displayed via a message box action. SNMP Server Server Manager contains an internal SNMP server. The SNMP server can be used to receive and forward traps from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a trap is sent from a device, the receiving SNMP server automatically adds the device's IP or hostname to the Object Explorer. Once added, the trap is displayed via a message box action. SNMP Trap Viewer Server Manager includes a SNMP trap viewer enabling users to watch all incoming traps. To display the viewer: 1. From the View menu select SNMP Traps. Related Topics SNMP Server Settings Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 185 Printed Documentation Batch Functions Batch Functions Server Manager provides you with several batch update functions enabling you to update multiple objects at once. • • • • • • • • Batch Assign Logon As Credentials Batch Update Computers, Devices and Hosts Batch Assign Computers Devices and Hosts to a Group Batch Delete Computers, Devices and Hosts Batch Update Templates Batch Assign Templates to a Group Batch Update Reports Batch Update Auto Configurators Batch Assign Computers, Devices and Hosts to a Group Server Manager enables you to easily move or link a set of hosts to a host or Template group. For more information on grouping see Groups. To assign multiple Computers, Devices and Hosts to a group: 1. Select Edit > Batch > Assign Computers, Devices and Hosts to Group. The Select Multiple Computers, Devices and Hosts dialog displays. 2. Check the computers to assign then click OK. Or Click the Search button to search for specific computers. 3. The Assign Multiple Computers, Devices and Hosts to Group dialog displays. 4. Under Assignment Options choose to Move or Link the hosts to the target group. Move Unassigns the object from the current object and moves it to the target object. Link Links the object to the target object creating an assignment to multiple objects. 5. Under Group Type choose to assign to a host group or Template group. 6. Select the target group from the Select Target Group drop-down then click Assign Or To create a new group directly under the target root collection node (e.g. Computers, Devices and Hosts or Templates), type a unique name then press Enter. Related Topics Computers, Devices and Hosts Groups Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 186 Printed Documentation Batch Assign Logon As Credentials When managing Windows servers or workstations in multi-domain or non-domain environments users are often prompted with Access Denied errors. An Access Denied error occurs when the account the service is running under or the account the user is logged in as does not have the required access permissions to execute WMI functions (e.g. downloading Event Logs or monitoring CPU load) or discover administrator disk shares (e.g. c$, d$ and e$). To batch assign logon as credentials: 1. Select Edit > Batch > Assign Logon As Credentials. The Select Multiple Computers, Devices and Hosts dialog displays. 2. Check the computers to assign then click OK. Or Click the Search button to search for specific computers. 3. The Host Properties dialog displays. By default any changes are applied to all selected computers, devices and hosts, however; you can use the use the Host drop-down to select a single computer, device or host. 4. Specify the Windows username, password and domain that enables you to access the remote computer. If accessing an off-domain server or workstation either clear the domain dropdown or specify the remote computer name. 5. Use the Alias field to assign a user friendly name to a hostname or IP address. When specified, the Object Explorer will list the computer using the alias in place of the hostname or IP address. Related Topics Access Denied Errors Assign Logon as Credentials Assign Service Logon As Credentials Batch Assign Templates to a Group Server Manager enables you to easily move or link a set of Templates to a Template or host group. For more information on grouping see Groups. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 187 Printed Documentation To assign Templates to a group: 1. Select Edit > Batch > Assign Templates to Group. The Select Multiple Templates dialog displays. 2. To filter the tree of Templates, choose the Template type from the drop-down. 3. Check the Templates to update. 4. Click OK. The Assign Multiple Templates to Group dialog displays. 5. Under Assignment Options choose to Move or Link the hosts to the target group. Move Unassigns the object from the current object and moves it to the target object. Link Links the object to the target object creating an assignment to multiple objects. 6. Under Group Type choose to assign to a host group or Template group. 7. Select the target group from the Select Target Group drop-down then click Assign Or To create a new group directly under the target root collection node (e.g. Templates or Computers, Devices and Hosts), type a unique name then press Enter. Related Topics Templates Groups Batch Delete Computers, Devices and Hosts Server Manager provides you with a batch delete function enabling you to search and delete multiple hosts at once. To delete multiple computers, devices and hosts: 1. Select Edit > Batch > Delete Computers, Devices and Hosts. The Select Multiple Computers, Devices and Hosts dialog displays. 2. Check the computers to delete then click OK. Or Click the Search button to search for specific computers. 3. When you are prompted to confirm the delete, click Yes. Related Topics Computers, Devices and Hosts Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 188 Printed Documentation Batch Update Auto Configurators Server Manager provides you with a batch update auto configurator function enabling you to update several auto configurators at the same time. To update multiple auto configurators: 1. Select Edit > Batch > Update Auto Configurators. The Select Multiple Auto Configurators dialog displays. 2. Check the auto configurators to update. 3. Click OK. The Auto Configurators Properties dialog displays. 4. Use the controls to update any settings. By default any changes are applied to all selected auto configurators, however; you can use the use the Auto Configurators drop-down to select a single auto configurator. 5. Click OK. Related Topics Auto Configurators Batch Update Computers, Devices and Hosts Server Manager provides you with a batch update host function enabling you to update several hosts at the same time. To update multiple computers, devices and hosts: 1. Select Edit > Batch > Update Computers, Devices and Hosts. The Select Multiple Computers, Devices and Hosts dialog displays. 2. Check the computers to assign then click OK. Or Click the Search button to search for specific computers. 3. The Host Properties dialog displays. 4. Use the controls to update any settings. By default any changes are applied to all selected computers, however; you can use the use the Host drop-down to select a single computer. 5. Click OK. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 189 Printed Documentation Related Topics Computers, Devices and Hosts Batch Update Reports Server Manager provides you with a batch update Report function enabling you to update several Reports at the same time. To update multiple Reports: 1. Select Edit > Batch > Update Reports. The Select Multiple Reports dialog displays. 2. To filter the tree of Reports, choose the Report type from the drop-down. 3. Check the Reports to update. You can only batch update Reports that are the same type. 4. Click OK. The Report Properties dialog displays. 5. Use the controls to update any settings. By default any changes are applied to all selected Reports, however; you can use the use the Report drop-down to select a single Report. 6. Click OK. Related Topics Reports Batch Update Templates Server Manager provides you with a batch update Template function enabling you to update several Templates at the same time. To update multiple Templates: 1. Select Edit > Batch > Update Templates. The Select Multiple Templates dialog displays. 2. To filter the tree of Templates, choose the Template type from the drop-down. 3. Check the Templates to update. You can only batch update Templates that are the same type. 4. Click OK. The Template Properties dialog displays. 5. Use the controls to update any settings. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 190 Printed Documentation By default any changes are applied to all selected Templates, however; you can use the use the Template drop-down to select a single Template. 6. Click OK. Related Topics Templates Select Multiple Auto Configurators Server Manager provides you with the ability to quickly re-configure multiple Auto Configurators at the same time (e.g. assign a different Schedule or complete Action). The Select Multiple Auto Configurators dialog displays when batch updating Auto Configurators. To display the select dialog: 1. Select Edit > Batch > Update Auto Configurators. The Select Multiple Auto Configurators dialog displays. To select multiple Auto Configurators: 1. Check the Auto Configurators. 2. Click OK. Select Multiple Computers, Devices and Hosts Many functions throughout Server Manager require you to select multiple configured computers, devices and hosts. The Select Multiple Computers, Devices and Hosts dialog provides the controls to batch select previously configured computers, devices and hosts. To display the select dialog: 1. Select Edit > Batch > Update Computers, Devices and Hosts. Or Select Edit > Batch > Delete Computers, Devices and Hosts. 2. The Select Multiple Computers, Devices and Hosts dialog displays. To select multiple computers: 1. Check the computers, devices and hosts to select then click OK. Or Click the Search button to search for specific computers. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 191 Printed Documentation Select Multiple Logs When merging consolidated logs to a single log viewer the Select Multiple Logs dialog provides the controls to batch select logs contained within the Log Repositories. To display the select dialog: 1. Select Logs > Merge. The Select Log Type dialog displays. 2. Select the log type then click OK. The Select Multiple Logs dialog displays. To select multiple logs: • Check the logs to select then click OK. Or Click the Search button to search for specific logs. Select Multiple Reports Many functions throughout Server Manager require you to select multiple Reports. The Select Multiple Reports dialog provides the controls to batch select Reports. To display the select dialog: 1. Select Edit > Batch > Update Reports. 2. The Select Multiple Reports dialog displays. To select multiple Reports: You can only select Reports that are the same type. 1. Optionally, use the Filter by configured report types drop-down to only list Reports of a specific type (e.g. Object Access). 2. Check the Reports to select then click OK. To delete multiple Reports: 1. Select Edit > Batch > Update Reports. The Select Multiple Reports dialog displays. 2. Optionally, use the Filter by configured report types drop-down to only list Reports of a specific type (e.g. Object Access). 3. Check the Reports to delete then click Delete. The Reports are deleted. 4. Click Cancel to close the dialog. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 192 Printed Documentation Select Multiple Templates Many functions throughout Server Manager require you to select multiple Templates. The Select Multiple Templates dialog provides the controls to batch select Templates. To display the select dialog: 1. Select Edit > Batch > Update Templates. 2. The Select Multiple Templates dialog displays. To select multiple Templates: You can only select Templates that are the same type. 1. Optionally, use the Filter by configured template types drop-down to only list Templates of a specific type (e.g. Ping Monitor). 2. Check the Templates to select then click OK. To delete multiple Templates: 1. Select Edit > Batch > Update Templates. The Select Multiple Templates dialog displays. 2. Optionally, use the Filter by configured template types drop-down to only list Templates of a specific type (e.g. Ping Monitor). 3. Check the Templates to delete then click Delete. The Templates are deleted. 4. Click Cancel to close the dialog. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 193 Printed Documentation Troubleshooting Troubleshooting The following troubleshooting topics are available: • • • • • Access Denied Errors Quota Violation Errors The RPC server is unavailable Errors Windows Service Log File Run the Service in Verbose Mode Forum If none of these topics help, please see our online forum at: http://spectorlive.com/phpbb3/ Screencasts Veriato offers several video screencast tutorials to help you learn how to use Server Manager. The screencasts can be found at: http://www.Veriato.com/products/server-manager/tutorials.asp Access Denied Errors An Access Denied error is typically thrown by the local WMI Service when an attempt is made to access WMI functions from a computer that is either not logged into the domain or when the Server Manager Service is not running with domain administrator credentials. Verify the error: 1. Open a command-prompt and type: Wbemtest the Wbemtest application opens. 2. Once loaded, click Connect. 3. From the Namespace text box, type \\SERVERNAME\root\cimv2 where SERVERNAME is the name of the remote server throwing the error. If either computer resides on a different domain or within a workgroup, specify administrator credentials that reside on the remote computer or domain. 4. Click Connect. You should receive the Access Denied error. If you do not receive the error, verify the service is running under the same credentials as the account you are logged into Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 194 Printed Documentation the server with or Server Manager is configured to logon to the remote computer as the account you are logged into the server with. Verify service credentials: 1. From the Management Console, select View > Dashboard. 2. From the Summary tab locate the Service Status. Verify the Logon as value is set to either a domain or local administrator account. If the value is SYSTEM or an non-administrator account, click the account. The Change Service Logon dialog displays. Enter administrator credentials then click OK. Verify target computer credentials: 1. 2. 3. 4. From the Object Explorer, expand the Computers, Devices and Hosts node. Right-click on the target computer or a group of computers then select Host Properties. Verify the credentials are correct then click Test. Once you have been able to successfully test the credentials, click OK. Resolution Checklist: • Ensure WMI permissions have been set correctly. From the remote computer throwing the error, open a command-prompt and type: wmimgmt.msc. Right-click on the WMI Control (local) node and select Properties. Select the Security tab and navigate to root/CIMV2. Click the Security button. Grant the account you and the service are using to access logs Remote Enable and Read Security rights. • If access is denied to a Windows Server 2003 log, grant the account you are logged in as and the account the service is running under access to each event log. For more information read the following MSDN article: How to set event log security locally or by using Group Policy in Windows Server 2003 • When accessing a Windows 7 or Vista computer that has joined a workgroup rather than a domain, the remote computer must disable User Access Control (UAC). To disable UAC on a Windows 7 or Vista computer, search for Turn UAC off within the Windows help system. • If the remote computer is running Windows XP Pro, make sure remote logons are not being coerced to the GUEST account. From the computer you are unable to download logs from, open a command-prompt and type: secpol.msc. Expand the Local Policies node and select Security Options. Scroll down to the setting titled Network access: Sharing and security model for local accounts. If this is set to Guest only, change it to Classic and restart your computer. • From the computer you are unable to download logs from, open a command-prompt and type dcomcnfg. Expand the Component Services/Computers/My Computer node. Right-click My Computer and then select Properties. Select the COM Security tab. From the Launch and Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 195 Printed Documentation Activation Permissions, select Edit Limits. Add the appropriate account and assign all permissions. • Check that DCOM is enabled on both the local and the remote computer. Check the following registry value on both computers: Key: HKLM\Software\Microsoft\OLE, value: EnableDCOM, should be set to 'Y'. • Check that WMI is installed on both the local and remote computer. WMI is present by default in all flavors of Windows 2000 and later operating systems, but must be installed manually on NT4 systems. To check for the presence of WMI, open a command-prompt and type: wbemtest. If the WMI Tester application starts up, WMI is present, if not, it must be installed. Consult Microsoft for more information. • Verify the Windows Management Instrumentation is running on both the local and target computers. Related Topics Assign Service Logon As Credentials Assign Logon as Credentials Batch Assign Logon As Credentials Quota Violation Errors A Quota Violation is thrown by the WMI Service running on the target machine when Server Manager requests the contents of a large Event Log (e.g. 400 MB) for the first time. This error can also be triggered when the WMI Service has run out of total allowed memory. You have 3 options to resolve this error: • • • Increase the WMI quota Backup and clear the event log Limit the download to a smaller date range To increase the WMI quota: From the Object Explorer, navigate to the computer throwing the Quota Violation error. Right-click and select Host Properties. The Host Properties dialog box displays. Select the WMI tab. Double the Memory per host value. If the Memory per host is the same value as Memory all hosts value, double both the Memory per host and the Memory all hosts values. 5. Click OK. 1. 2. 3. 4. For more information see the following Microsoft article: WMI Error: 0x8004106C Description: Quota violation, while running WMI queries Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 196 Printed Documentation To backup and clear the event log: 1. From the Object Explorer, expand the Log Repositories node. 2. Navigate to the desired log, right-click and select Properties. The Log Properties view displays. 3. Select the Event Log File (.evtx/.evt) tab. 4. Click Backup Log. To limit the download date range: 1. 2. 3. 4. 5. 6. From the Object Explorer, navigate to the computer throwing the Quota Violation error. Expand the computer and locate the Event Log Consolidation and Monitoring Template. Right-click and select Template Properties. The Template Properties view displays. Select the Consolidation and Monitoring tab. Set the Limit the initial download to the previous to 1 day of log entries. Click OK. Related Topics Computer, Device and Host Properties WMI Settings The RPC server is unavailable Errors The RPC server is unavailable error is thrown by the local WMI Service when an attempt is made to access WMI functions from a computer that is blocking WMI requests or has a firewall between the computers. Verify the error: 1. Open a command-prompt and type: Wbemtest the Wbemtest application opens. 2. Click Connect. The Connect dialog displays. 3. From the Namespace text box, type: \\SERVERNAME\root\cimv2 where SERVERNAME is the name of the remote server throwing the error. 4. If either computer resides on a different domain or within a workgroup specify administrator credentials that reside on the remote computer or domain. 5. Click Connect. You should receive The RPC server is unavailable error. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 197 Printed Documentation Resolution Checklist: 1. Open TCP port 135 and all TCP ports above 1024. For more information read the following Microsoft article: Connecting to WMI Remotely Starting with Windows Vista Many virus protection solutions such as McAfee and Symantec contain their own firewalls and may offer a function to allow WMI packets. 2. Configure the WMI Service on each Server 2008, Windows 7 or Vista computer to run on a specific port then open TCP port 135 and the specified port. Please note this is not an option for Server 2003 or Windows XP computers. For more information read the following Microsoft article: Setting Up a Fixed Port for WMI 3. Install Server Manager on each sub-net then push Event Log entries directly to a central database. Please note this requires you to open the necessary database ports. In the case of SQL Server this is TCP port 1433 by default. 4. When accessing a Windows 7 or Vista computer that has joined a workgroup rather than a domain, the remote computer must disable User Access Control (UAC). To disable UAC on a Windows 7 or Vista computer, search for Turn UAC off within the Windows help system. 5. If the remote computer is running Windows XP Pro, make sure remote logons are not being coerced to the GUEST account. From the computer you are unable to download logs from, open a command-prompt and type secpol.msc. Expand the Local Policies node and select Security Options. Scroll down to the setting titled Network access: Sharing and security model for local accounts. If this is set to Guest only, change it to Classic and restart your computer. 6. From the computer you are unable to download logs from, open a command-prompt and type dcomcnfg. Expand the Component Services/Computers/My Computer node. Right-click My Computer and then select Properties. Select the COM Security tab. From the Launch and Activation Permissions, select Edit Limits. Add the appropriate account and assign all permissions. 7. Check that DCOM is enabled on both the local and the remote computer. Check the following registry value on both computers: Key: HKLM\Software\Microsoft\OLE, value: EnableDCOM, should be set to 'Y'. 8. Check that WMI is installed on both the local and remote computer. WMI is present by default in all flavors of Windows 2000 and later operating systems, but must be installed manually on NT4 systems. To check for the presence of WMI, open a command-prompt and type wbemtest. If the WMI Tester application starts up, WMI is present, if not, it must be installed. Consult Microsoft for more information. 9. Verify WMI is running on both the local and target computers. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 198 Printed Documentation Windows Firewall The Windows Firewall may block WMI traffic. If WMI traffic is blocked, Server Manager will typically throw The RPC server is unavailable error. To configure the Windows Firewall: Enable Windows Management Instrumentation (WMI) or Remote Administration. The simplest way to do this is to open up a command prompt and type the following: For Windows Server 2012: Configure-SMRemoting.exe -enable For Windows Server 2008/8/7/Vista: netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes For Windows Server 2003/XP: netsh firewall set service RemoteAdmin enable The effect is immediate and there is no need to restart. For more information follow the links below: Server 2012 Server 2008/8/7/Vista Server 2003/XP Related Topics The RPC server is unavailable Errors Troubleshooting Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 199 Printed Documentation About Veriato About Veriato Veriato is the global leader in activity monitoring. More than 36,000 companies, schools, and government entities worldwide use Veriato solutions to gain insight into the user activity on their network, and enjoy the security and productivity increases that come with it. As a result, Veriato has made the prestigious Inc. Magazine List of the Fastest Growing Private Companies in the U.S. eight times consecutively. Veriato award-winning solutions include the world's leading employee investigation tool (Investigator), enterprise-grade Insider Threat detection and employee activity reporting (Veriato 360), and robust Event and Security Log Management (Server Manager). We provide the visibility. Our customers become more secure and productive. Contact Us When sending email, please include your company name, city, and state to ensure your request is handled as promptly as possible. General Contact Veriato Corporation 1555 Palm Beach Lakes Blvd West Palm Beach, FL 33401 USA World Wide Web: www.Veriato.com U.S. & Canada: 888-598-2788 International: 772-770-5670 Sales Contact Monday - Friday: 9:00 AM to 10:00 PM EST Saturday & Sunday: 10:00 AM to 6:00 PM EST Web: www.Veriato.com Email: [email protected] U.S. & Canada: 888-598-2788 International: 772-770-5670 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 200 Printed Documentation Technical Support Web: www.Veriato.com/support.aspx Email: [email protected] U.S. & Canada: 888-598-2788 International: 772-770-5670 Third Party Software Notices and/or Additional Terms and Conditions Component License (and link to full license terms) Source Code Storage Address Aqua Gauge Controls The Code Project Open License (http://www.codeproject.com/info/cpo l10.aspx) http://www.codeproject.com/Articles/20341 /Aqua-Gauge Be.HexEditor The MIT License (http://opensource.org/licenses/MIT) http://sourceforge.net/projects/hexbox/ Circle Animation The Code Project Open License (http://www.codeproject.com/info/cpo l10.aspx) http://www.codeproject.com/Articles/14841 /How-to-write-a-loading-circle-animation-inNET DotNetOpen Mail BSD License http://dotnetopenmail.sourceforge.net Double Buffered Tree and Listviews The MIT License (http://opensource.org/licenses/MIT) http://www.codeproject.com/Articles/37253 /Double-buffered-Tree-and-Listviews Heijden.DNS The Code Project Open License (http://www.codeproject.com/info/cpo http://www.codeproject.com/Articles/23673 /DNS-NET-Resolver-C Microsoft Public License (http://dotnetzip.codeplex.com/license http://dotnetzip.codeplex.com/ l10.aspx) Ionic.zip ) MIL.Html None http://www.codeproject.com/Articles/6477/ MIL-HTML-Parser Network Shared and UNC Paths The Code Project Open License (http://www.codeproject.com/info/cpo http://www.codeproject.com/Articles/2939/ Network-Shares-and-UNC-paths l10.aspx) Ookii.Dialogs See below http://www.ookii.org/software/dialogs/ Pie Chart http://www.codeproject.com/Articles/7321/ The zlib/libpng License Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 201 Printed Documentation Component License (and link to full license terms) Source Code Storage Address (http://opensource.org/licenses/zlib- license.php) 3D-Pie-Chart SharpSnmpLi The MIT License b (http://opensource.org/licenses/MIT) http://sharpsnmplib.codeplex.com/ SNTP Client The Code Project Open License (http://www.codeproject.com/info/cpo http://www.codeproject.com/Articles/1005/ SNTP-Client-in-C XPTable None http://www.codeproject.com/Articles/11596 /XPTable-NET-ListView-meets-Java-s-JTable ZedGraph GNU Lesser General Public License (http://www.gnu.org/licenses/lgpl- http://sourceforge.net/projects/zedgraph/ l10.aspx) 2.1.html) Copyright Notices, Disclaimers and License Agreements Aqua Gauge Controls; Heijden.DNS; Network Shared and UNC Paths; SNTP Client THIS WORK IS PROVIDED "AS IS", "WHERE IS" AND "AS AVAILABLE", WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS OR GUARANTEES. YOU, THE USER, ASSUME ALL RISK IN ITS USE, INCLUDING COPYRIGHT INFRINGEMENT, PATENT INFRINGEMENT, SUITABILITY, ETC. AUTHOR EXPRESSLY DISCLAIMS ALL EXPRESS, IMPLIED OR STATUTORY WARRANTIES OR CONDITIONS, INCLUDING WITHOUT LIMITATION, WARRANTIES OR CONDITIONS OF MERCHANTABILITY, MERCHANTABLE QUALITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY WARRANTY OF TITLE OR NON-INFRINGEMENT, OR THAT THE WORK (OR ANY PORTION THEREOF) IS CORRECT, USEFUL, BUG-FREE OR FREE OF VIRUSES. YOU MUST PASS THIS DISCLAIMER ON WHENEVER YOU DISTRIBUTE THE WORK OR DERIVATIVE WORKS. Be.HexEditor Copyright (c) 2011 Bernhard Elbl Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 202 Printed Documentation LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Circle Animation Copyright © 2006 Martin R. Gagne THIS WORK IS PROVIDED "AS IS", "WHERE IS" AND "AS AVAILABLE", WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS OR GUARANTEES. YOU, THE USER, ASSUME ALL RISK IN ITS USE, INCLUDING COPYRIGHT INFRINGEMENT, PATENT INFRINGEMENT, SUITABILITY, ETC. AUTHOR EXPRESSLY DISCLAIMS ALL EXPRESS, IMPLIED OR STATUTORY WARRANTIES OR CONDITIONS, INCLUDING WITHOUT LIMITATION, WARRANTIES OR CONDITIONS OF MERCHANTABILITY, MERCHANTABLE QUALITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY WARRANTY OF TITLE OR NON-INFRINGEMENT, OR THAT THE WORK (OR ANY PORTION THEREOF) IS CORRECT, USEFUL, BUG-FREE OR FREE OF VIRUSES. YOU MUST PASS THIS DISCLAIMER ON WHENEVER YOU DISTRIBUTE THE WORK OR DERIVATIVE WORKS. DotNetOpenMail Copyright © 2005 Mike Bridge ([email protected]) Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Double Buffered Tree and Listviews Copyright © Display Networks 2009 Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 203 Printed Documentation THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Ionic.zip Copyright © Dino Chiesa 2007, 2008, 2009 This license governs use of the accompanying software. If you use the software, you accept this license. If you do not accept the license, do not use the software. 1. Definitions The terms "reproduce," "reproduction," "derivative works," and "distribution" have the same meaning here as under U.S. copyright law. A "contribution" is the original software, or any additions or changes to the software. A "contributor" is any person that distributes its contribution under this license. "Licensed patents" are a contributor's patent claims that read directly on its contribution. 2. Grant of Rights (A) Copyright Grant- Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants you a non-exclusive, worldwide, royalty-free copyright license to reproduce its contribution, prepare derivative works of its contribution, and distribute its contribution or any derivative works that you create. (B) Patent Grant- Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants you a non-exclusive, worldwide, royalty-free license under its licensed patents to make, have made, use, sell, offer for sale, import, and/or otherwise dispose of its contribution in the software or derivative works of the contribution in the software. 3. Conditions and Limitations (A) No Trademark License- This license does not grant you rights to use any contributors' name, logo, or trademarks. (B) If you bring a patent claim against any contributor over patents that you claim are infringed by the software, your patent license from such contributor to the software ends automatically. (C) If you distribute any portion of the software, you must retain all copyright, patent, trademark, and attribution notices that are present in the software. (D) If you distribute any portion of the software in source code form, you may do so only under this license by including a complete copy of this license with your distribution. If you distribute any portion of the software in compiled or object code form, you may only do so under a license that complies with this license. (E) The software is licensed "as-is." You bear the risk of using it. The contributors give no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this license cannot change. To the extent permitted under your local laws, the contributors Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 204 Printed Documentation exclude the implied warranties of merchantability, fitness for a particular purpose and noninfringement. Ookii.Dialogs Copyright (c) Sven Groot (Ookii.org) 2009 All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the ORGANIZATION nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Pie Chart Copyright (c) 2004-2006 by Julijan Sribar This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 205 Printed Documentation SharpSnmpLib Copyright (c) 2008-2016 Malcolm Crowe, Lex Li, and other contributors. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. XPTable Copyright (c) 2005, Mathew Hall. All rights reserved. ZedGraph Copyright (c) 2003-2007 John Champion This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNULesser General Public License for more details. 1922160.1 Server Manager Guide © 2016 Veriato, Inc., all rights reserved. 206
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
advertisement