Event Log Management
View and report on event log data in the most convenient and intuitive way possible. Centrally monitor Windows, Unix, Linux, switches, routers, and more by consolidating all of your event logs, syslogs and text-file-based logs in one place, then use filters and multi-level criteria to create powerful reports and receive notifications for events of interest. Templates allow you to quickly configure log management on new servers.
Powerful filtering logic allows you to create complex event filters to target or limit specific log entries or computers from real-time and consolidated log views, monitors and reports including by event type, flagged entries, hosts, log, and messages.
Using built in UDP and TCP syslog servers, you can collect, monitor, and consolidate syslog messages from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a message is sent from a device, the receiving syslog server automatically adds the device's IP or hostname to the Object Explorer. Once added, the message is saved to the Log Repository.
Receive alerts when noteworthy events occur. Alerts can be sent via email, SMS, or SNMP trap. Depending on the type of event you are alerting on, options are available that allow you to require a certain number of events to occur in a specified time period before an alert is generated. For example, if an Event 4726 is detected, indicating that a user account was deleted, that might not necessarily be important enough to alert on. However, if five of those events are detected in a ten minute period, it might be indicative of an issue requiring attention, and can trigger an alert..
React to critical events with multiple types of actions including email notifications, process and service management, and SNMP traps.
- Document Events - Document when specified thresholds are surpassed in a variety of ways. Write the details to a database, an event log, a text file, or a syslog. Create documentation of server and resource exceptions.
- Automated Actions - Automatically respond to changes in your network and server resources. Windows services and processes can be programmed to start, stop, or restart as necessary. You can also write custom scripts to execute in response to events.
- Complex Responses - Issue multiple actions when a condition is triggered, or once the services have recovered to an acceptable state.
Monitor an individual directory’s size and track its change over time. Monitor, log, and trigger alerts when a directory or file is created, modified, renamed, or deleted. You can also monitor the number of files a directory contains to see if it significantly increases or decreases.
With one easy-to-navigate console, all of your disk resources can be viewed in one place. Keep an eye on critical resource information such as disk monitoring for space and changes, disk utilization, directory size statistics, largest file statistics, temporary file information, file/folder permissions and much more.
Effective and efficient utilization of disk resources is key in every department within an organization and ensuring proper management of disk space is critical to your business continuity plan. Running out of disk space can result in a loss of services, unproductive users, and potentially corrupt data.
Monitor your internal and publicly-facing websites to ensure that they are available and responding to requests. You can monitor both HTTP and HTTPS, and even a specific page. Even if your website is responding, it doesn’t mean it is right; Veriato website monitoring has the ability to optionally look for text that the page should or should not contain and also validate your SSL certificate.
Don’t be the guy who lets your company’s domain expire. Automatically query WHOIS servers on a regular basis and check the date of domain expiration, and be proactively notified when the expiration date nears.
Protocol & Internet Monitoring
Monitor your internal and publicly-facing websites to ensure that they are available and responding to requests. You can monitor both HTTP and HTTPS, and even a specific page. Even if your website is responding, it doesn't mean it is right; Veriato website monitoring has the ability to optionally look for text that the page should or should not contain and also validate your SSL certificate.
Don't be the guy who lets your company's domain expire. Automatically query WHOIS servers on a regular basis and check the date of domain expiration, and be proactively notified when the expiration date nears.
Process & Service Monitoring
Monitor individual Windows services and processes, a process’ resource usage over time or even schedule a process or batch file to run.