You are here: Home > Products > LANState > Online Help

Adding Monitoring Check to Device

arrow To add new device check, please click the Monitoring Settings... item on the map object's context menu. The devices' monitoring check list will appear (see also: Network Device Monitoring). Click the Add button. You can also select several hosts at a time and configure the a common monitoring check for all the selected hosts.

The Monitoring Settings Wizard will be displayed (Fig. 1).

Event alerts
Fig. 1: The Monitoring Settings Wizard window. Step 1 of 3: the monitoring check parameters. Select a check type and configure its parameters.

 

arrow Select a monitoring check type (ICMP ping, TCP port check, etc) and configure its parameters on the Step 1 of the Wizard (after the greetings page).

Warning! If you are configuring a check for several selected hosts at once, you can use the %A key for substituting a host's network address to the necessary field (for example, to a command line, file or folder path, URL, etc.)

Click Next>> and proceed to the Step 2 of the Wizard.

arrow Configure monitoring dependencies on the Step 2.

dependencies
Fig. 2: The Monitoring Settings Wizard window. Step 2 of 3: dependencies on other checks.

 

1) Dependencies are checks that define the availability of servers (e.g., an ISA Server or Proxy Server) and services (e.g., a DNS Server or the Internet connection) required by a target host check for its normal operation. The specified dependency check(s) must be successfully executed before other monitoring checks depending on them can be executed. E.g., If you access the Internet through a Proxy Server, an ICMP Ping dependency check can be set to check the availability of the Proxy Server, before executing an HTTP monitoring check for your web server. If the dependency check fails, the depending HTTP check will not be tested and will be classified with the “Failed by Dependency” status. The device will get the “Unknown” status (with yellow icon).
TIP: Use dependencies to avoid receiving a flood of alerts, when servers critical for executing your checks can be down (VPN servers, routers, gateways). If your Internet connection is down, you cannot be sure about your web server's status (whether it is online or went down). Without configuring the depending checks, you will receive failed alerts when the connection fails.

2) The program can raise alerts and consider the check as failed if the check's response time (the time spent on the monitoring check execution) is larger than the configured threshold (in ms). If you select the "The check is failed if its response time is larger than"option and set the timeout limit, the program will consider the check as failed even if the check is completed successfully, but the response time is larger than the limit.

3) You can also configure a number of Attempts to execute the check and Delay between the attempts. If the first check fails, the program will run that check again after the configured interval of time. This also helps avoiding of receiving false alerts when a your network connection is lost for a small time. If all the attempts fail, you will finally receive the failed alert.

Then click Next>> and proceed to the Step 3.

Event alerts
Fig. 3: The Monitoring Settings Wizard window. Step 3 of 3: alert's settings. Configure notifications.

 

arrow On the Step 3, you can configure actions which will be taken when alerts are generated according to the check results.

There are several types of actions:

1. Message (send a text notification)

The program generates a message which is shown on the screen, or sent via e-mail or SMS. You can configure the message text on the Settings window (the Alerts section).

  • Screen: The predefined text message can be shown on the local computer's screen. You can specify time duration for displaying message window.
  • SMS: The program can send SMS messages to your cell phone. You should specify mobile phone number in this pattern: <country code><phone number> (for example: 19021235566). Learn more about sending SMS
  • E-mail: The program sends e-mail messages to the addresses that you specify. Mail server settings can be configured on the Settings window (the section E-mail).

2. Run Application

Launches an external application, with parameters if necessary. For instance: if you specify the net command as the application (available in Windows NT, 2000, and XP only) and send <computer name> <message text>, you can receive messages from computers that run the program while you are working on a remote computer.

 

3. Sound Notification

Plays a specified audio file (WAV).

 

4. Log, Event Log

Records a text message to:

1) the program's log file, the name of which you can specify in the program settings, in the Alert section (by default, it is Alert.log in the user documents folder\10-Strike\LANState\Logs\). On the same screen you can view the existing log file as well.

2) Windows Event Log. Select a record type (notification, warning, error). You can view the Event Log by clicking the View log file... button.

3) Syslog. Learn more about what is this and how the program can work with Syslog here: Syslog monitoring.

 

5. Restart

Allows starting/stopping/restarting a specific service on the computer being checked and rebooting/shutting down/turning on the computer being checked. The actions listed on this tab require administrator rights on remote computers.

To configure the service action, select the Service box, click the '<<' button, and then select the required service on the list.

If a current user does not have administrator rights on the remote computer, you will need to provide the remote administrator's credentials in order to complete the service, power up/down, or restart operations successfully. To do that, please select the Authorization required box and fill in the Username and Password fields.

 

6. Execute Script

Allows executing a VBScript or JScript. The script code is to be created in an external text editor and to be loaded into this window by clicking the Load button. Or, you can copy the script to the Source code field. Provide a name of the main function of the script in the appropriate field. You can execute the script for test purposes by clicking the Test button.

 

arrow Once you have configured all properties that are required, you can test out the alert performance by clicking the Test button. All actions selected in the list will be executed.

Click Finish to save the check changes and close the window. To save this check for future sessions, please save your map file.