Professional Documents
Culture Documents
MANUAL
T H E PO W ER OF W HA T SUP G OL D
A D D R E SS CONTACT
The Class
This class provides you with practical knowledge and specific skills
Learning Objectives to maintain a complex network using WhatsUp Gold TotalView Plus,
Which includes Application Monitoring, Virtual monitoring, Network
Traffic Analyzer, as well as Configuration manager.
All of the classes for WhatsUp gold are based on the “Big 5 Tasks” a
network or server administrator. This is what you need to get out from
network monitoring system, to have a successful deployment. These
tasks are
• Discovery is finding all your devices that are on your network. Your
routers, switches, servers and more
• Mapping is showing what devices are connected to what
• Monitoring is determining the state of your devices. Are they up or
down, as well as, the performance of your devices?
• Alerting is making sure you are aware of the status of your devices
and being notified when they are down or performing out of
thresholds.
• Analysis is using WhatsUp Gold reports, Dashboards and more to
help troubleshoot and verify the metrics of your network and its
devices.
This course was designed for Network, Server and system administrators.
Course Audience
ii
For a full list of prerequisites please visit our training site, http://
Prerequisites nm.ipswitch.com/WhatsUp-Gold-Training-Registration.html
The Manual
Each lesson covers a set of related topics that are arranged in order by
Learning Guide task a network administrator will need to accomplish when deploying
WhatsUp Gold, as well as, monitor their network and the devices on it.
The manual contains information that will not be covered in the class.
From the basic getting started to the advanced topics of customizing
WhatsUp Gold. Lastly the manual is not meant to replace the Getting
Started or User’s Guide, please refer to those for full configuration steps.
Any method of instruction is only as effective as the time you are willing
Review Tool to invest in it. While some of the information you will learn in this
class may not be immediately important to you, it may become so in
the future. For this reason we encourage you to spend additional time
reviewing each of the topics and labs.
We have also added additional space in the margins for you to take notes
for future reference. Please add any notes that will help you in the future
recall the feature discussed
Reme m be r: denotes
certain items you will want to
remember.
The ITE
During this class, each Student will have access to a fully functional
Training Environment installation of WhatsUp Gold that exists within a training environment,
complete with an entire network of real-world, operational devices.
Network devices such as routers, switches, wireless access points, and
a firewall, as well as non-network devices such as Windows servers,
Application servers, and File servers all work together to offer you
a realistic and representative network in which to take advantage of
everything WhatsUp Gold and its plug-ins have to offer.
The Ipswitch Training Environment (ITE) fulfils two main roles for
Students attending WhatsUp Gold training:
The ITE allows you to attend WhatsUp Gold training without the need
to use your production WhatsUp Gold server, or install a second copy of
WhatsUp Gold on your network just for training.
The ITE provides Students with an environment rich in the type of
interesting traffic and conditions you will want to see live in WhatsUp
Gold and the plug-in products.
Both of these benefits work together to offer you engaging and relevant
lab exercises with no setup required on your part.
Table of Contents
i.1 About the Course i
The Class i
Learning Objectives i
Course Audience i
Prerequisites ii
The Manual ii
Learning Guide ii
Review Tool ii
Reference ii
Icons iii
i.2 Ipswitch Training Environment iv
The ITE iv
Training Environment iv
Introduction1-1
1.1 What Is WhatsUp Gold 1-2
WhatsUp Gold Editions 1-2
WhatsUp Gold 1-2
The Editions 1-2
Pollers 1-3
WhatsUp Gold Licensing 1-5
Licensing 1-5
System Requirements 1-6
Logic 1-6
Server 1-6
Client 1-7
1.2 Ipswitch Philosophy 1-8
Focus 1-8
Maps 1-8
Web 1-9
Admin Console 1-9
1.3 WhatsUp Gold Installation 1-11
Microsoft SQL and IIS 1-11
Overview 1-11
Microsoft SQL 1-11
Microsoft IIS 1-11
Installing WhatsUp Gold 1-12
Initial Setup 1-12
1.4 Basic Navigation 1-13
Menus Bar 1-13
Menus 1-13
My Network Button 1-13
My Network Button 1-14
Auto -vs- Custom 1-14
Map Tree 1-14
1.5 Translation Groups 1-15
vi
Translation 1-15
Language pack 1-15
Initial Preparation 2-1
2.1 User Administration 2-2
Overview 2-2
Users 2-2
User Groups 2-2
Best Practice 2-2
Password Policy 2-2
User Groups 2-3
Overview 2-3
Best Practice 2-4
User Rights 2-4
External Authentication 2-7
Types 2-7
Advantages 2-7
Integration 2-7
User Rights 2-8
Overview 2-8
Rights 2-9
Default Accounts 2-10
Device Group Access 2-10
2.2 Protocols and Credentials 2-11
Overview 2-11
Whats the Difference 2-11
Supported Protocols 2-11
ICMP 2-11
SNMP 2-12
WMI 2-15
Telnet/SSH 2-16
JMX 2-17
Credentials 2-17
Supported Credentials 2-17
Where to add them 2-18
2.3 Device Roles 2-19
Overview 2-19
What are they 2-19
Sub-Roles 2-20
Advantage 2-21
Configuring Device Roles 2-21
Overview 2-21
Configuration 2-21
Discover39
3.1 Network Discovery 40
Overview 40
What is a Discovery 40
3.2 New Scans 42
Scan Types 42
vii
Overview 42
The Difference 42
When to use/Best Practice 43
IP Address Scan 43
Seed Address Scan 43
Configuration 43
Scan Depth 43
Settings 45
Credentials 47
Schedule 47
Summary 48
Run/Save 49
3.3 Saved Scans 50
Overview 50
Overview 50
Preconfigured 51
Scheduled Refresh 51
Scheduled Discovery 52
Default Discovery 52
3.4 Discover Map 54
Overview 54
The Map 54
Legend 54
Active Scans 55
Map Features 55
Zooming 55
Selecting Device 55
Filters 56
Start Monitoring 57
Grid View 58
Device List 58
My Network 59
4.1 Interactive Map 60
Basic Features 60
The Map 60
Legend 61
Zooming 61
Selecting Device 62
Device List 62
Filters 63
Additional Features 64
Overlays 64
Library Icons 66
Layout 67
Overview 67
Auto Layout 67
Custom Layout 67
4.2 Customizing the Map 68
Device Groups 68
viii
Overview 68
Physical 68
Dynamic 69
Tools 71
Overview 71
Shapes 71
Style 72
Edit Controls 72
4.3 Device Information 74
Information Cards 74
Overview 74
Device Properties 76
Overview 76
Roles 77
Attributes 77
Custom Links 77
Device Information 77
Custom Links 78
Virtual 78
Monitor Setup 79
Overview 79
Credentials 79
Monitors 80
Polling 80
Actions 80
Monitors81
5.1 Monitors 82
Overview 82
Overview 82
Monitor Types 82
5.2 Active Monitors 83
Overview 83
Active Monitors 83
Poll Characteristics 82
Options 82
Hardware, Chassis and Wireless 83
APC UPS 83
Fan 84
Power Supply 85
Printer 85
Temperature 86
WAP Radio 86
Network Management 87
Ping 87
SNMP 87
SNMP Extended 88
WMI 89
WMI Formatted 90
Application 90
ix
JMX 90
Process 92
NT Service 92
PowerShell 93
Telnet 94
SSH 94
SQL Query 95
HTTP Content 97
Active Script 98
TCP/IP 99
File and Folder 100
Files Properties 100
Folder 101
Critical Services 102
Email 102
DNS 104
FTP 105
Network Statistics 105
Others 106
5.3 Passive Monitors 107
Overview 107
Overview 107
Listener 108
SNMP Traps 108
Overview 108
Import Tool 109
Syslogs 110
Overview 110
Windows Event 111
Overview 111
5.4 Performance Monitors 112
Overview 112
Overview 112
Default 113
Overview 113
Custom 114
Overview 114
APC UPS 114
Printer 115
Active Script 115
JMX 117
Power Shell 118
SQL Query 119
SSH 121
SNMP 122
WMI 122
WMI Formatted 123
Thresholds 123
Overview 123
x
1
Introduction
1.1 What Is WhatsUp Gold
WhatsUp Gold Editions
WhatsUp Gold Licensing
System Requirements
1.2 Ipswitch Philosophy
Focus
1.3 WhatsUp Gold Installation
Microsoft SQL and IIS
Installing WhatsUp Gold
1.4 Basic Navigation
Menus Bar
My Network Button
1.5 Translation Groups
Translation
1-2
WhatsUp Gold monitors, reports, alerts, and takes action on the status of
network devices, the system, and services. It installs, discovers, and maps
topology and network connected assets in minutes. Leveraging SNMP
v1/2/3, WMI, JMX and many other protocols to monitor your devices in
combination with powerful alerting and notification capabilities to keep
the network infrastructure running and you informed when issues arise.
A small amount of data is sent from the WhatsUp Gold computer across
the network to the device it is watching. If the device is up, it echoes the
data back to the WhatsUp Gold computer. A device is considered down
by WhatsUp Gold when it does not send the data back.
WhatsUp Gold comes with one Poller on the local machine and
additional ones can be purchased. The WhatsUp Gold Poller is an
application used to perform and assign WhatsUp Gold device polling
operations to monitor network devices. Specifically, additional pollers
installed on your WhatsUp Gold system transmit active monitor and
performance monitor data to the WhatsUp Gold server. Extending
polling activity across multiple pollers increases the number of devices
for which WhatsUp Gold can poll and collect data to send back to the
WhatsUp Gold system. This is referred to as clustered polling. Using
clustered polling, WhatsUp Gold can efficiently scale polling operations
to a larger number of network devices, ultimately providing the capacity
to monitor and manage larger networks.
An average poll lag time of a few seconds or more indicates your system
may not be performing optimally. The WhatsUp Gold CPU and memory
utilization reports may also indicate performance issues.
The machine on which the WhatsUp Gold poller is installed must have
the same access to the network as the WhatsUp Gold machine. Polling
data is always reported from the viewpoint of the WhatsUp Gold machine
regardless of which device performed the polling task. Therefore, if a
poller can only access a portion of the network, devices to which the
poller does not have access (even previously discovered by WhatsUp
1-5
All parts of WhatsUp Gold pull from a single licensing pool. Points are
Licensing consumed by various elements in WhatsUp Gold as follows:
Feature Points
Network monitoring: Routers, 1 point per Device
Switches, WLCs, APs, Firewalls
Server Monitoring 1 point per Device
Virtual Monitoring 1 point per Host or Guest
Flow Monitoring 10 point per Device
Application Monitoring 10 point per Device
System Requirements
WhatsUp Gold user interface logic now resides on the client side. This
Logic greatly reduces the performance impact to you and the WhatsUp Gold
Server. The end result is a much more responsive experience for you.
Due to this WhatsUp now has recommended requirements for both
server and any client connecting to the web interface.
For a full list of OS and hardware requirements please see the release
Server notes available from our web site. https://www.ipswitch.com/support/
documentation.
RAM 8 GB 8 GB WUG: 8 GB
SQL: 32 GB
Recommended: 64 GB
Database MS SQL 2014 MS SQL Server 2008, 2012, MS SQL Server 2008, 2012, or
Express or 2014 2014
Hard Drive 25 GB OS/App: 15 GB OS/App: 15 GB
Raid 1 Raid 1
SQL: 4x100 GB Database: 8x250 GB
Raid 10 Raid 10
Log: 2x100 GB
Raid 0
Temp DB: 2x250
Raid 0
For more information about moving SQL server database and log files, see the WhatsUp Gold
database migration and Management Guide
NIC 100 Mbps 100 Mbps 1 Gbps
Proffered: 1 Gbps Preferred: 1 Gbps
Video 1280x1024 or higher 1280x1024 or higher 1280x1024 or higher
1-7
RAM 4 GB 8 GB 8 GB
Focus
Ipswitch changes the way you visualize and monitor you network. Based
Maps on feedback, WhatsUp Gold has an interface that works the way you
want it to and displays the information you need at a glance.
With the move to client side logic, the impact to you and the WhatsUp
Web Gold server is greatly reduced. Resulting in a much more responsive
experience for you. Ipswitch understands a user should be able to do
everything in a single interface, reducing the complexity and the time it
takes to configure WhatsUp Gold. We have moved, and will continue to
move, all configuration and management of WhatsUp Gold to the Web
Interface.
While we still have the Admin console, we have moved most things
Admin Console to the web. The Admin console is now only for administrative
configurations of WhatsUp Gold itself. The WhatsUp Gold console is a
Windows application installed with WhatsUp Gold and is used for the
configuration and management of specific WhatsUp Gold features and
its databases. Following installation, the application is launched from
the Windows Start menu. It provides access to the following menus and
associated functionality:
• File. Open, print, close the current application window or exit
the application.
• Configure. Manage access to WhatsUp Gold with the following
controls:
• Enable FIPS 140-2 mode which requires you to enter valid
WhatsUp Gold user credentials to access the console
application. For more information, see in WhatsUp Gold
Help “About operating WhatsUp Gold in FIPS 140-2 mode’.
• Configure new and edit existing device states available for use
and reported by WhatsUp Gold.
• Test configured active monitors, actions, and recurring
actions.
1-10
Menus Bar
WhatsUp Gold Cleaned up the menu bar with the release of 2017. It now
Menus has a common look and feel across all the Ipswitch products. WhatsUp
Gold currently had 3 different menus and one button. Your menu
options are Discover, Analyse, and Settings.
The Discover Menu allows you to view the map of discovered devices or
perform a discovery from a new scan or a previously saved scan.
The Analyze menu is where you would access any default or custom
dashboards as well as generate reports. This is also where you would
go to see the extensive library of logs containing historical data to aid in
troubleshooting potential network issues.
The last menu is Settings, which allows you to configure everything from
the WhatsUp Gold itself to individual customization of your deployment.
The last item on the menu bar is the My Network Button, which takes
My Network Button you to the interactive network map to monitor you device inventory,
connectivity and status information. This is the default map view you see
when logging into WhatsUp Gold.
1-14
My Network Button
While you can see everything in a single map you have two different
Auto -vs- Custom option in viewing the map. You have an Auto Layout or a Custom one.
The Custom Layout allows you to organize your devices where you
want them to be. In essence it gives you finer tuning of your devices and
device groups, including adding shapes, annotations and images to the
map.
To navigate the different device groups, you can click on the down arrow
Map Tree on the Group picker. It will expand the navigation tree. Clicking on the
arrow shrinks it again.
Translation
You can use the Translation Groups dialog to translate content in one of
two ways. You can either export the entire user interface for translation,
or you can translate one page each time.
Overview
You can map WhatsUp Gold user groups to Active Directory groups so
that users can authenticate and be assigned to WhatsUp Gold groups
using their Windows domain credentials
The most efficient order to set up users and groups within WhatsUp
Best Practice Gold is as follow:.
1. Create all you users groups first.
2. To simplify the configuration; Set WhatsUp Gold to authenticate
against an external authentication system, such as Active Directory.
3. Finally create your user accounts and assign them to the correct
groups
Password Policy
Account Lockout Duration Enter the time in minutes that the system should delay
(minutes) before allowing a locked out user from performing a log on
attempt.
2-3
Maximum number of days Enter the minimum number of days required between
between password changes password changes.
Password expires after (days) Enter the number of days before a password expires.
Retain Passwords for at least Enter the number of days to retain previously used
(days) passwords.
Ensure password not reused Enter the number of passwords that are not to be reused
against previous against previous passwords.
Warn when (days) left before Enter the number of days to warn user before password
password expiration expiration.
Minimum complex password Enter the minimum number of characters required for the
length password policy. The default minimum complex password
requirement is one special character, one capital (upper
case) letter, one lower case letter, and one number.
User Groups
Overview By creating and using user groups first allows for a single point of editing
and configuration of user rights. If at any time you need to change the
user rights assigned to a selection of users, doing so at the user group
level requires only a single configuration change, versus changing all
user accounts individually, if no user groups were present.
This also follows best security practice which states to limit user
interaction. Therefor instead of making changes to multiple users it
allows for only making the change one time, while still giving the users
the rights they need to perform their job/duties.
User rights are cumulative when users are assigned to multiple groups.
2-4
You will also want to make sure you use correct naming conventions.
This allows you to see what type of rights a group has by just looking at
the name.
User Rights govern what actions and rights a user can perform in
User Rights WhatsUp Gold. Users inherit rights from group memberships first
then any additional rights given them individually. Similar to Active
Directory, a user can be a member of multiple groups.
User rights are cumulative in nature, meaning they will get all the
rights from every group they are a member of. Plus any additional
rights given to them.
User rights are cached and should refresh within 5 minutes, or when the
user logs off and then back into WhatsUp gold
Access WhatsUp Gold Console Enables users to access the WhatsUp Gold Admin
Console application (NMConsole.exe) when FIPS 140-2 is
enabled. Important: If FIPS 140-2 is disabled, the Access
WhatsUp Gold Console user right does not apply. For
more information, see Program Options - General in the
WhatsUp Gold console application.
Account Administration
Manage Personal Enables Users to add, delete, and copy dashboard views, as
Dashboards well as edit the properties of an owned dashboard view.
System Administration
Manage Users Enables users to create and edit users for the web
interface. This option also allows users to specify
Group Access Rights. Important: Enabling this right
will enable all other rights.
Configure External Enables user to configure external authentication (LDAP
Authentication / MSAD / Cisco ACS) for user authentication in the web
interface.
Translations Enables users to view the translation system as well as
import and export languages.
Manage SNMP MIBs Enables users to download and delete SNMP MIBs through
the SNMP MIB Manager.
System Administration Enables users to edit system configuration items, including
the maximum number of passive monitor records,
maximum dimensions of map and enabling or disabling
mobile access.
Configure Credentials Enables users to configure SNMP and Windows credentials
Access Inventory Reports Enables users to view Layer-2 data including reports and
reporting tools.
Access Tools Menu Enables users to access the tools menu for networking
utilities.
Access Virtual Monitor Event Enables users to access the Virtualization Monitor plug-in
Log event log.
Access Virtual Monitor Map Enables users to access the Virtualization Monitor plug-in
Map.
Monitoring
Configure Active Monitors Enables users to create, edit and remove active monitors on
devices in the groups to which the user has access.
2-6
Configure Passive Monitors Enables users to create, edit and remove passive monitors
on devices in the groups to which the user has access.
Configure Performance Enables users to create, edit and remove performance
Monitors monitors on devices in the groups to which the user has
access.
Configure Actions Enables users to create, edit and remove actions on device
in the groups which the user has access.
Manage Recurring Actions Enables users to create, edit and remove recurring actions
on devices in the groups to which the user has access.
Configure Action Policies Enables users to create, edit and remove action policies on
devices in the groups which the user has access.
Access Group and Device Enables users to view group and device reports for the
reports groups to which the user has access.
Manage Scheduled Reports Enables users to manage and view scheduled reports of
other Network Performance users (Configure & Settings >
Scheduled Reports).
Create Scheduled Reports Enables users to create scheduled reports (Configuration &
Settings > Scheduled Reports).
Email Reports Enables users to email an exported report to a specified
email address.
Administer Alert Center Enables users to resolve or acknowledge Alert Center
Threshold Items threshold alerts
Devices
Manage Device Groups Enables users to create, edit, or remove device groups on
the network.
Manage Devices Enables users to add new device and edit existing devices
in the groups to which the user has access. Important: A
users must have this right to view and hear Web Alarms.
Access Discovery Enables users to access the Discovery console. Granting
users access to this dialog also enables users to discover
network devices, define device roles that help identify
specific device features, and add them to the WhatsUp
Gold database.
APM
Manage Business Hours Enables users to configure Business Hours filters for the
system.
2-7
External Authentication
The biggest advantage is you will no longer have to create user accounts.
When a user logs into WhatsUp Gold for the first time, The user account
will automatically get created with the correct rights according to group
membership.
If are using LDAP and not Active Directory be sure to use the
fully qualified name LDAP server might be CN=%s, OU=Users,
o=yourdomain.net where %s is replaced by the username and
password of the user
User Rights
If you put WhatsUp Gold in FIPS 140-2 Mode, you can restrict
access to the Admin Console
User rights govern what actions users in WhatsUp Gold can perform.
Rights Any user who has been granted the Manage Users right or belongs to
a group that has this right can manage user rights. In the case of a new
WhatsUp Gold user, we recommend that you restrict the account to only
those rights that they will need to gain familiarity with the application.
Grant additional rights as the user gains confidence and application
knowledge.
Device Group Access Device group access rights enable the system administrator of WhatsUp
Gold to allow or deny read and write access to specific physical groups
and devices. These rights can be enabled or disabled by the administrator
and are disabled by default (except for the user’s Home device group, to
which each user has Group Read access). Device group access rights are
useful when users need to view and edit only those groups that matter to
them, as would be the case with a large network with multiple network
administrators. Device group access rights allow an administrator to
grant each user rights to only the devices on the network for which that
user is responsible.
Overview
Protocols are the rules or standards that define the syntax, semantics
Whats the Difference and synchronization of communication and possible error recovery
methods.
Credentials are used to control access to information or other
resources.
Supported Protocols
The most basic protocol that we probably all use for network
ICMP troubleshooting is – ping – it is also a very valuable tool for network
discovery. The only configuration information that is needed to run a
ping is the IP address of a
target device.
Therefore, the most information the host device could learn through
ping is that there is a device at a given IP address, because it received
a response. If you intend to use ping for discovery or monitoring in
WhatsUp Gold, make sure every device on your network is allowed to
respond to “echo” packets, which is the default setting unless otherwise
restricted.
To help reduce security risk, allow ICMP traffic only to and from
the WhatsUp gold server and any additional pollers through any
At this point, we will view SNMP at a very high level and only insofar as
to compare and contrast it against ping as a scanning technique.
SNMP can poll networked devices and monitor data such as utilization
and errors for various systems on a host device. SNMP can also be
used for changing the configuration of the host, which enables remote
network management. SNMP is based on the concept of network
management and monitoring as a system of logical elements including
a Network Management System, Managed Devices and SNMP Agents,
which are software modules, on those devices.
2-13
In our case, WhatsUp Gold is the Network Management System, and the
fundamental SNMP architecture is depicted here:
Like ping, SNMP can send out a specific message from one device to
request information from another device, which responds back with the
requested information, and there are specific formats described in the
RFCs for the arrangement of the information within these messages.
between them also must contain this string (passed in clear text),
because any mismatch between the string in the message and
There are many more parameters and settings used by all three versions
of the SNMP protocol operations, but the fundamental operation is
similar among them. We will be describing SNMP often, to address some
of these configuration elements.
Windows Management
WMI Instrumentation (WMI) is
Microsoft’s implementation
of the Web-based
Enterprise Model
technology for unified
monitoring of distributed
environments. It is a set of
extensions that provide an
operating system interface
to collect management
data on Windows-based systems. WMI performance monitors can
supervise Windows servers, desktops, and applications performance and
health. The monitors can proactively identify failures and bottlenecks by
tracking component processes and workloads, and thereby aid in faster
troubleshooting. Administrators can also create custom monitors for any
web-based or virtual domain applications. Additionally, WMI also trends
historical data to chart out application performance over time.
In many cases, the information available via WMI is also available via
SNMP. Oftentimes SNMP requests are more broadly applicable and may
be more efficient than WMI requests. Therefore, Ipswitch recommends
using SNMP, except when SNMP cannot be enabled or does not provide
the same information as WMI.
2-16
Telnet was developed in 1969 beginning with RFC 15, extended in RFC
854, and standardized as Internet Engineering Task Force (IETF) Internet
Standard STD 8, one of the first Internet standards.
The term telnet is also used to refer to the software that implements the
client part of the protocol. Telnet client applications are available for
virtually all computer platforms. Telnet is also used as a verb. To telnet
means to establish a connection with the Telnet protocol, either with
command line client or with a programmatic interface. For example, a
common directive might be: “To change your password, telnet to the
server, log in and run the passwd command.” Most often, a user will be
telnetting to a Unix-like server system or a network device (such as a
router) and obtaining a login prompt to a command line text interface or
a character-based full-screen manager.
Secure Shell (SSH) is a cryptographic network protocol for operating
network services securely over an unsecured network.[1] The best known
example application is for remote login to computer systems by users.
The most visible application of the protocol is for access to shell accounts
on Unix-like operating systems, but it sees some limited use on Windows
as well. In 2015, Microsoft announced that they would include native
support for SSH in a future release.[3]
SSH was designed as a replacement for Telnet and for unsecured remote
shell protocols such as the Berkeley rlogin, rsh, and rexec protocols.
Those protocols send information, notably passwords, in plaintext,
rendering them susceptible to interception and disclosure using
packet analysis.[4] The encryption used by SSH is intended to provide
confidentiality and integrity of data over an unsecured network, such as
2-17
the Internet, although files leaked by Edward Snowden indicate that the
National Security Agency can sometimes decrypt SSH, allowing them to
read the content of SSH sessions.[5]
Credentials
Windows (WMI)
JMX
Overview
selecting from the list of available roles and descriptions that appears.
The ability to change the primary role and/or sub roles can be beneficial
2-20
If you modify any roles assigned to a device, new monitors are not
automatically applied based on the new roles. However, the monitors
associated with the role determined by WhatsUp Gold during discovery
will be reapplied if you:
• Update the device by clicking Update Monitoring from the
information card on the Discovered Network map.
• Request updated information from the device by selecting
Refresh Device Details from the actions menu.
If you have modified any monitors and/or attributes for the device,
performing these functions neither removes, disables, or re-enables
monitors, nor do they update attributes.
WUG will apply all monitors for both roles and sub-roles that apply to
that device. A network admin will be able to change the primary role of
a device that has multiple sub roles
2-21
The Device Role Setting are only located in the Admin console, on the
Overview WhatsUp Gold Server. Once in the Admin console Click Tools > Device
Role Settings. Here you can configure each part of your devices. You can
customize your device roles with different percent variables that will try
to be discovered and pulled automatically during the discovery process.
You can see a full list of variables available for discovery by doing
a search on the help files for “Discovery Percent Variables”
Performance monitors:
Automatically add your performance
monitors to your devices on this tab.
Overview
Prior to initiating a discovery scan, first ensure your network devices can
be discovered and subsequently identified. WhatsUp Gold attempts to
discover devices on your network using ping (ICMP) and by scanning for
open TCP ports. Please check to see if network devices respond to one or
both of these request types before beginning discovery.
Due to SNMP requests being more efficient than WMI requests, Ipswitch
recommends using WMI only when SNMP cannot be enabled or does
not provide the same information as WMI.
From the DISCOVER > New Scan page, select Advanced Setting >
Expand scan to any virtualization environments to control if Hyper-V
or VMware hosts or VMs will be included in the network discovery
process.
• VMware. Valid VMware credentials are used. VMware Tools are
also required.
• Hyper-V. Hyper-V devices are discovered when valid Windows
credentials are used. Groups and users for passing WMI
management objects must be in place. Host OS Application
firewalls must align with default Hyper-V firewall rules.
3-4
Scan Types
In WhatsUp Gold 2017 we have broken the network discovery down into
Overview two types of scans:
• IP address scan: Limit scans to check for specific ranges, subnets
or hosts File
• Seed address Scan: WhatsUp Gold “seeds” or builds an address
list from target device SNMP data. It
then continues to scan for additional
devices based on the SNMP responses
from these seed devices. This powerful
feature can be described as the ‘cast a
wide net’ approach. It also has useful
controls for limiting the expanse of
address boundaries and network hops.
Both scans types discover devices identically. The main difference the
The Difference seed address scan will crawl your devices to find other possible devices to
try and discover, while the IP Address scan is limited to the IP Addresses
you have configured in the scope of the scan.
3-5
An IP address scan is best used when you need to limit the scope of
IP Address Scan the scan. Many times you may only want to scan a single subnet or IP
address without the fear of going beyond that
Configuration
Your network may have been divided into many sub-networks, and
Scan Depth WhatsUp Gold can be configured to discover all devices on all your
subnets. The Seed address Scan will scan subnets recursively, starting
with the configured seed addresses.
The scan depth allows the user to define how deep into the network
the scan will go. WhatsUp allows a scan depth of
1-6. Setting the scan depth to 1 will scan for devices
that are 1 physical hope from the seed addresses.
So if you used a single seed address it would be
everything connected to that device.
3-6
A scan depth of 2 would discover all devices that are within 2 physical
hops into the network of all the seed addresses
Moving the scan depth to 2, would allow WhatsUp Gold to look for
any additional devices that are within 2 physical hops from the seed
addresses.
Now, increasing the scan depth to 3 would allow WhatsUp Gold to look
even further into your Network, to find further unique devices.
You can fine tune and customize your scan by modifying the
Settings configuration of the scan. There are three areas you can configure if you
are running an IP Address scan. A Seed Address scan has one additional
to fine tune your scan configuration.
Include
This section allows you to specify what IP address will be included in the
scan. By default the scan will include the Gateway and the local subnet
of the WhatsUp Gold.
Clicking on the (i) will display the information about that section.
(i.e. the gateway of your WhatsUp Gold server). This is what is listed
on the NIC configuration.
Exclude
This area is similar to the include text box, allowing you to enter single
IPs or ranges you want to exclude from your scan
Limit
This section only appears when running a Seed Address scan. In
this area is where you can set it to scan only private networks. It
also allows you to limit the scan to subnets that you are currently
monitoring. To further restrict what IPs to discover you have a
text box similar to the Include and Exclude sections. It will keep
WhatsUp Gold from discovering any devices that are not included in
the limit area.
3-8
Advanced Settings
The last set of configuration options you have is under the Advanced
Settings. Most of the options are checked by default but you may change
them if needed.
The Data Collection Settings lets you Expand scan to any virtualization
environments as well as wireless environments. Letting you discover
your VMware and Hyper-V guest and host association. Then it lets you
start collecting Wireless information from your Wireless infrastructure.
This is also where you determine the Ping Timeouts and the number of
attempts WhatsUp Gold will ping the device.
After you have set up the configuration of your Discovery scan you need
Credentials to move on to the second task of the configuration; that is deciding what
credentials you want to use. You can get to this task by clicking next in
the upper right hand sight or just clicking 2. Credentials on the left.
You can edit any existing credentials by clicking on the pencil icon.
There are a couple ways to select your credentials and deciding what
order to use them. At the top you will see a check box that allows you to
“Use all current and future credentials. This option allows you to use all
the credentials. Even if the scan is ran at a later date and you have added
additional credentials it will attempt to use them as well.
You can determine the order to check credential by checking them in the
order you want.
If you have not decided to use all credentials placing a check next to a
credential will allow you to use that credentials. To specify an order you
can move them up or down in the list. Using the arrow keys
After you have optimized the discovery settings for your network,
Schedule you can schedule discovery to run periodically. Either click next or
3. Schedule to go to the schedule configuration settings. Each time
discovery runs, it detects new devices on your
network and checks for changes on existing
devices to update. You can also configure email
notifications that distribute information about the
results of the scheduled discovery.
3-10
Once in the Schedule area tab, place a check in the box next to schedule
to configure your settings. The scan can be configured to run Daily,
Weekly, Monthly, or a custom time frame. Under the daily
option it can be configure to run every weekday or recur every
so many days. Weekly allows you to determine what days of
the week it will run, with the ability to fine tune the scan to
run every so many weeks. Monthly allows the scan to run on
a certain day every so many months. The last option, custom,
lets the scan to be ran every so many minutes, hours, or days.
In this area there is also the ability to configure the scan to send an email
when the discovery is finished. There are 2 buttons letting you configure
the Email settings and even test the email.
If you have configured your Email setting under Settings > System
Settings > Email Settings, it will automatically fill in the appropriate
settings by clicking on the
Email settings button.
The last step is to review your settings, click next or 4. Summary. This
Summary tab allows you to reviews the Settings, Credentials, and Schedule options
of the scan. If you need to make changes click on the pencil icon
to the right of the applicable section. This is also where you can
enter a name and a description for the scan.
3-11
There are 2 options always available any time during the configuration of
Run/Save a discovery scan. Allows the scan to either be Save or Ran from a click of
a button upper right hand side.
Overview
Under the Discover Menu you have an option labeled Saved Scan Setting
Overview (Discover > Saved Scan Settings). By highlighting a saved scan you have a
variety of option available to you.
Run Now: Launches the selected scans. You can have up to 4 scans
running at the same time.
New: Create a new scan that starts with the default discovery
template.
Modify: Edit existing saved scan. This button will not be active if
more than one scan is selected.
Copy: Copies the information from selected scan and put into a
new scan with the default name of “Copy of...” Again the button will
not be active if more than one scan is selected.
Set as Default: Selected scan becomes the default template when
all new scans are created. Like Modify and Copy this Button will not
be active if more than one scan is selected
3-13
Preconfigured
WhatsUp Gold installs with 3 preconfigured scan the first being the
Scheduled Refresh Schedule Refresh. This scan goes out and rescans all of the current
discovered devices. As long as the devices have the “Keep Details
Current” checked, this scan will automatically update any devices being
monitored. If it is not checked it will keep the updated information in
the discovery portion of WhatsUp Gold. This allows for the ability to
update the device manually, at any given time.
So what does this scan update? It looks for new or better information
about a device, including but not limited to better fitting device roles,
device attributes and device properties.
If this is a clean install of WhatsUp gold and not an upgrade this scan is
scheduled by default to run every night at 1 am.
The second of the preconfigured scans is the Scheduled Scan. This scan
Scheduled Discovery is a seed address scan with a scan depth of 3, using all current and future
credentials. This scan is not set to refresh and details of your monitored
devices
If this is a clean install of WhatsUp gold and not an upgrade this scan is
scheduled by default to run every night at 3 am.
If you need different scan settings for your template you can
either modify the Default template or set a different scan as the
default. Just highlight the scan and click Set as Default.
3-15
3-16
Overview
The legend on the discovery map is found in the lower left hand corner.
Legend It explains the map icons:
• UnMonitored: Devices discovered but not monitored
• Monitored, Up
• Monitored, Down:
• Monitored, Maintenance
• Monitored Unknown
The legend can also be minimized by clicking on the down arrow ; click
the Up arrow to restore it to full size.
3-17
Map Features
The Discover Map has multiple way to zoom in and out. There are Map
Zooming controls in the lower right corner. Use the Plus sign to zoom in and
the Minus to zoom out. The Next Icon is the Zoom to Fit, Forces
the entire map to fit inside the displayed area. The Map also allows
you to zoom in and out with a simple turn of a wheel mouse. When
using the mouse it will center the zoom on the location of the map.
The Select Tool allow WhatsUp to toggle between pan and select
Selecting Device modes. Pan mode allows for moving the map around. In this mode
you can select single devices. To select multiple you will need to
hold the shift Key down while selecting each device
WhatsUp Gold allows for applying filters to the map so you can see\
Filters select just the devices you need. To access the filter you click on the
funnel icon in the upper left hand corner. Once it is selected the
menu will appear.
You can apply as many filters as you want until you run out of room on
the web page.
Hiding devices allows for removing devices from the discover map
without permanently deleting them. To hide a device(s), select the
device(s) you want hidden and click the down arrow and bar icon
in the information card. To unhide any device, Click Hidden
Devices Icon in upper left corner under filters.
Once a discovery has been run, any devices in the discover map can
Start Monitoring be promoted to start monitoring in WhatsUp gold. To promote your
device, select the devices you want to monitor then click Update\Start
Monitoring in the information card in the upper right hand corner.
If you delete devices out of the Discover Map, any devices that you are
currently monitoring will repopulate in the discover map.
3-20
Grid View
Basic Features
WhatsUp Gold 2017 has one Integrated Interactive Map, allowing for
The Map a quick overall view of what devices are connected to what as well as a
state of the network. This is the first thing you see anytime you login to
WhatsUp gold. It is very similar to the discover map; the legend is almost
identical, filter, zooming, selecting options, along with the grid viewing
options all work exactly the same as the Discover Map
The legend on the interactive map is very similar to the legend on the
Legend Discovery map. It is found in the lower left hand corner. It explains the
map icons:
Monitored, Up
Monitored, Down:
Monitored, Maintenance
Monitored Unknown
The legend can also be minimized by clicking on the down arrow ; click
the Up arrow to restore it to full size.
Like the Discover Map, the interactive map has multiple way to zoom in
Zooming and out. There are Map controls in the lower right corner. Use the Plus
sign to zoom in and the Minus to zoom out. The Next Icon is
the Zoom to Fit , Forces the entire map to fit inside the displayed
area. The Map also allows you to zoom in and out with a simple turn of
a wheel mouse. When using the mouse it will center the zoom on the
location of the map.
4-4
The Select Tool allows WhatsUp to toggle between pan and select
Selecting Device modes. Pan mode allows for moving the map around. In this mode
you can select single devices. To select multiple you will need to
hold the shift Key down while selecting each device
The interactive map’s filters work exactly as they did in the discovery
Filters map, except you no longer have the option to filter on the Discovery
Status. To access the filter you click on the funnel icon
in the upper left hand corner. Once it is selected the
menu will appear.
As filters are applied, the devices that do not match will remain on the
map but are subdued nor are they selectable. All the devices matching
the filter will remain normal, non-subdued, and selectable. To remove
the filters by clicking the X next to the filter name or click the Clear All to
remove all the filters.
4-6
Additional Features
One of the biggest changes between the Discovery Map and the My
Overlays Network interactive map is the ability to use overlays. Overlays give
the ability to enhance the level of map detail by applying the different
overlays. There are four overlay options available:
• Device Connectivity
• Dependency and Link Status
• Wireless
• Virtual
You can have anywhere from 1-4 overlays selected. You must have at
least one overlay selected.
Icon Description
Network Connections Overlay displays devices
with their network connections, showing what devices
are connected to what devices. This is the default
overlay
Dependency and Link Status overlay actually
shows 2 different items. It will display the status of any
link that is being monitored. The line will show as Blue
for up, Red for down and Yellow for maintenance
Icon Description
Virtual overlay displays virtual environment(s).
This includes virtual devices with both VMWare and
Hyper-V, their hosts and guests. When you zoom into
the map with the overlay enabled, there are additional
icons (called badges), that appear next to the device
icons. These badges depict the roll the device has
within the virtual environment.
Icon Description
VMWare VCenter
VMWare Cluster
VMWare Host
HyperV Host
At top right corner of the map are icons used to access the most
Library Icons common libraries used for WhatsUp Gold device management.
From here, you can not only access, but also apply both
credentials and monitors to devices displayed on the current
map. Simply select one or more existing credentials or monitors
along with any icon or icons shown, then click Apply to selected
devices to complete the assignment. With either the credentials or
monitors dialog open, click the plus icon to add a new credential or
monitor to the respective library directly from the Monitor map or the
library icon to open that library in full screen mode.
4-9
Layout
Auto Layout is the default view and is the one you see when
Auto Layout you first log into WhatsUp Gold. The devices is automatically
arranged according to connectivity and other factors. Anytime
you re-click the Auto Layout icon the map will attempt to redraw the
map keeping any links lines from overlapping.
This layout gives you the option to view all the devices in subgroups.
This option is checked by default. When selected, the view shows
devices in the group selected and all of its subgroups, but will not show
any groups. When unselected the view shows only what is in the group
selected, be it devices and\or groups.
Device Groups
When WhatsUp Gold starts monitoring the devices it places them into 2
types of groups.
• Physical Groups (non-dynamic)
• Dynamic groups
The Physical Groups icon, will show the worst state of any device
with in that group, in the lower right hand corner. This allows you
to get an indication of the status of your devices before even going into
the group.
Physical Groups also make use a group access rights allowing you to
restrict read and write access to the group and devices.
All devices discovered on your network are placed into a single dynamic
Dynamic group named ‘All devices’ by default. Additional groups are created
automatically when SQL queries search for devices based on user-
specified criteria during discovery. These are referred to as dynamic
groups because group membership can change automatically based on
the data WhatsUp Gold receives from the devices therein.
There are two types of dynamic groups that exist in WhatsUp Gold:
• Layer 2 dynamic groups
• WhatsUp Gold dynamic groups.
The WhatsUp Gold Dynamic Group Icon will not show the worst
state of the devices with in the group.
You can find dynamic groups built by other WhatsUp Gold users in the
forums. https://community.whatsupgold.com/library/dynamicgroups
Layer2 Groups currently use the same Icon as a physical group and
will show the worst state of any device within that group. During
the discovery process WhatsUp Gold gathers Layer 2 data: information
related to the physical connectivity between your network nodes.
Detailed information about your devices, their interfaces, connection
speeds, and addressing is all compiled into a set of results that allow
WhatsUp Gold to automatically generate integrated topology maps
showing both Layer 2 connectivity and Layer 3 addressing information.
With auto-discovery and dynamic mapping, you get accurate up-to-date
port-to-port connectivity and topology information at all times. This
helps in troubleshooting by making it easier to determine data paths. It
also helps ensure compliance with audits, such as PCI DSS, FIPS, and
HIPAA, by gathering and storing inventory information about your
devices.
You can use Map Devices and Connected Devices to build customized
Layer2 Groups. The filtering options allow you to dynamically choose
4-12
Physical Groups and Layer2 map groups show the worst state of any
device in the group on the Icon; they also make use of access rights to
control read and write access to the group.
At any time you can refresh the device details and its connectivity.
Just select the device(s) or group click on the Action Menu and select
refresh device Details or Refresh Connectivity.
4-13
Tools
If you are still on “Auto Layout” the pencil will not be displayed
Icon Description
Line Segment: Use the mouse to draw a line. Grab
the end of a selected line to rotate the line.
Style controls allow for changing the options of a selected Shape or text.
Style Many controls can be seen with any shape, while a few are dedicated to
certain shapes or Text.
Icon Description
Fill: Allows for changing of the fill
color of the shape
The controls in this area allow the shape, image or text to brought to the
Edit Controls front, sent to the back , locked, unlocked, cloned, or deleted.
Icon Description
Bring to Front: Brings the Selected Shape forward
Icon Description
Clone: makes a duplicate of the selected shape. This
control will not clone a device.
Information Cards
Select any device icon on either map layout to display its Device
Overview Information card. When viewing the My Network map, the card displays
extensive information about the device’s identity, status, role, attributes,
group membership, and assigned monitors without obscuring the map
view. It also provides controls for accessing dialog screens for:
Device Properties
Device Status
Device Monitor
Action Menu gives a dropdown or basic actions related to a device.
Choosing an action from this menu performs that action to each selected
device.
4-17
Device Properties
Any device on the network will have certain properties associated with it,
Overview such as the configuration stored locally on the device and data associated
with the device’s hardware and software. In WhatsUp Gold, the concept
of device properties encompasses a wide array of information, including
generalized data pertaining to name, vendor, serial number, release
version, etc. provided by the vendor, as well as IP address, location,
contact, etc. configured by the network or server Administrator. In
addition, WhatsUp Gold assigns credentials, monitors, tasks, etc., as
configured by the WhatsUp Gold Administrator.
The Device Properties interface displays available data about the selected
device itself and its assignments. Upon accessing Device Properties,
identifying information for the selected device as well as its current
status and notes about its initial discovery can be seen at the center of the
interface.
More detailed information about specific areas of the selected device can
be found by expanding the sections at the bottom or navigating between
views at the top of the interface. The sections displayed are dependent
upon the device role and information gathered during discovery and do
not appear if not applicable to the selected device.
Device Summary lists basic information about the device. Clicking the
pencil icon allows for editing the aspect the pencil was next to (Display
Name or Notes). Use the following controls for common functions
applicable to device monitoring, located on the right:
Click to access Device Status.
Click to access Device Monitor Setup.
Click to access the Action Menu giving a dropdown or basic actions
related to a device.
Primary and Sub Roles lists the monitoring category, or role, in which
Roles the selected device was automatically placed by WhatsUp Gold based
on specific data gathered during discovery as well as any more tightly
defined categorization, or
sub roles, assigned during
discovery or defined by
the end-user. See Module
2, Lesson 3 for more
information on Device Roles
Monitor Setup
The Device Monitor Setup interface displays all available data about how
Overview WhatsUp Gold gathers information from and reacts to status changes for
the selected device. Upon accessing Device Monitor Setup, identifying
information for the selected device can be seen at the center of the
interface.
5.1 Monitors
Overview
While the discovery process learns what devices are on your network, the
Overview next step is to monitor the condition, state and/or performance of devices
that make up your network. WhatsUp Gold has tools that accomplish
that task, which are referred to as monitors.
Each monitor type offers unique functionality, with different options and
configuration needs, and the data you collect with each monitor type can
be used in a distinctly different way
5-3
Overview
Many of the monitors in the Critical service area are better suited to
monitor as an application, instead of on individual devices.
5-4
For Active monitors to determine the state of the target device it must
Poll Characteristics first poll that device. Polling is the active watching, or monitoring, of
your network by WhatsUp Gold. In the polling process, WhatsUp Gold
sends a message to the device, and expects an appropriate response.
If a response is either not received or is not the expected response, the
monitor is considered down. When an Active monitor reports down it
will initiate a state change. No other type of monitor can initiate a state
change. Meaning only active monitors determine if a monitor or device
is up or down
When adding a monitor to your device there are multiple option you
Options have to configure each monitor to fit the environment. The first option is
which interface the monitor should be applied to. By default this is the
primary or default interface. If a device has multiple IPs make sure it is
assigned to monitor on the correct one.
5-5
There are multiple options available Under the Advanced Button, which
brings up the active monitor advanced properties
• Argument. Enter text to append to the OID for the interface on
the selected device. By default, it identifies the number used by
the SNMP interface.
• Comment. Enter user defined text to appear in the Active
Monitors list.
• Use independent poll frequency for this monitor. Select this
option to have the selected device polled based on the Poll
frequency.
• Poll frequency. Enter the amount of time (in seconds) between
polls for the selected device. This setting is not displayed unless
you select the Use independent poll frequency for this monitor
option.
Network Management
• Import. Click to select the desired .xml file from the list
containing applicable OIDs to monitor, then click OK to return
to the monitor configuration dialog. The Thresholds to monitor
section of the dialog displays the OIDs from the imported .xml
file as parameters.
• Configure. Click to specify the request type for the selected
parameter.
• value is. When monitoring for a specific value, determine when
the monitor should the report the device as Down by specifying
if the response is greater than, less than, equal to, or contains the
entered numer-ic or string value.
• value is outside the range of. When monitoring a range, enter the
minimum and maximum values the re-sponse must fall within
for the monitor to report the device as Down.
5-11
• rate of change between two polls is. When monitoring for a range
of change, determine when the monitor should the report the
device as Down by specifying if the response is
greater than, less than, or equal to the entered
value in seconds.
Application
• Port. Enter the port number on the server that WhatsUp Gold
should use to communicate with the JMX service.
• Use SSL with RMI Registry. Enable this option to use the JMX
active monitor secured by SSL.
• Click Add to launch the JMX Credentials dialog.
• Enter the IP address or host name of the target device to browse.
5-13
You can also click the Browse button (...) to select a device from
the device list.
• Ensure the Port and Use SSL with RMI Registry settings reflect
your selections made in the previous dialog.
• If needed, select an existing JMX credential from the list or click
the Browse button (...) to access the Credentials Library, then
create a new one.
• Click OK to proceed to the JMX Browser which you can use
to select the target device, domain/path, and attribute(s) to
monitor. The monitor configuration dialog should now display
the attributes you selected in the JMX Browser.
• Select one or more attributes, then click Configure to launch the
Comparison Definition dialog.
Prerequisites:
• WhatsUp Gold uses a 32-bit (i.e. x86) PowerShell engine.
Therefore, only 32-bit PowerShell snap-ins are supported and
64-bit only snap-ins will not function properly. Snap-ins that
work on both 32-bit and 64-bit operating systems are configured
for 64-bit systems by default and must be manually con-figured
for 32-bit PowerShell engine to function properly with WhatsUp
Gold.
• The PowerShell Scripting active monitor requires the use of
windows credential
Configure
• Timeout (Seconds). Enter the length of time
WhatsUp Gold attempts to connect to the selected
de-vice. When the time you enter is exceeded
without connecting, a timeout occurs and
WhatsUp Gold stops trying to connect to the SMTP
server. This is considered a failed connection.
Although the de-fault timeout is 60 seconds, you
are discouraged from using a timeout longer than
10 seconds. Use the shortest timeout possible.
• Run under device credentials. Enable this
check box to execute the script using the Windows
credentials for the affected device.
• Script text. Enter your monitor code.
5-16
Click Add, Edit, and Delete as needed to create, modify, and remove
database column values and conditions, respectively.
• URL. Location to check for HTTP content. The URL must begin
with a proper URI, such as http:// or https://. The URL can
include the full path to the document including the document’s
file name and any query string parameters. For example, http://
www.example.com/reports.htm?ReportID=100.
• Authentication username. Username the web site uses for
authentication if applicable.
• Authentication password. Password that coincides with the
username the web site uses for authentication if applicable.
browsers. The user agent from the latest version of the browser is
populated for the browser you select.
• Custom headers. Specify any headers for which you want to
check. Enter a header as Field:Value.
• Network type. Select the network type for the FTP (File Transfer
Protocol) service is TCP; the network type for the RADIUS
(Remote Authentication and Dial-In User Service) service is
UDP; the HTTPS monitor uses the SSL type.
• Port number. Enter the TCP or UDP port that you want to
monitor.
• Timeout. Enter the length of time WhatsUp Gold attempts
to connect to the selected device. When the specified time is
exceeded without connecting, a timeout occurs and WhatsUp
Gold stops trying to connect to the server. This is considered a
failed connection.
• Script. Enter your script using as many Send, Expect,
SimpleExpect, and Flow Control keywords as you would like. For
more information, see Script Syntax.
• Click Expect to open the Rules Expression editor if desired. Any
text placed in the Expression box appends to the end of the script
as an Expect expression.
5-22
The File Properties monitor only checks files that are accessible from
the WhatsUp Gold server.
The Folder monitor only checks files that are accessible from the
WhatsUp Gold server.
Critical Services
You must use a separate email account for every email monitor created.
Failure to do so will result in false negatives. For example, if you want to
check both IMAP and POP3 on the same server, and create two instances of
the monitor, one configured with POP3 and one with IMAP, you must use two
separate email accounts. Otherwise, one monitor deletes all emails previously
sent from both instances of the monitor and incorrectly reports the mail server
as Down.
Outgoing mail
• SMTP server. Enter the address of the server on which
SMTP is running. Use the default, %Device.Address, to use
the device IP address on which the monitor is attached.
• Port. Enter the port on which the SMTP service is listening.
The standard SMTP port is 25.
• Mail to. Enter the address to which the Email Monitor sends
email.
• Mail from. Enter the address you want listed as “From” in
the email sent by the Email Monitor.
•
• Incoming mail
• Mail server. Enter the address of the server on which the
POP3 or IMAP service is running.
• Account type. Enter the protocol (POP3 or IMAP) you want
the monitor to use to check for correct email delivery.
• Username. Enter the username of the account in which the
monitor uses to log in.
• Password. Enter the password for the account in which the
monitor uses to log in.
• Click Advanced to set the following additional advanced properties for the
monitor if desired:
• FTP Server. Enter the device address of the FTP server for
which the FTP monitor is configured and on which the monitor
performs associated tasks.
• Port. Enter the port the monitor should use to communicate with
the FTP server.
• Username. Enter the username used to access the FTP server for
which the monitor is configured.
• Password. Enter the password used to access the FTP server for
which the monitor is configured.
• Use Passive Mode. Enable this option to use passive (PASV) mode
rather than active mode when attempting to connect to the FTP
server and to perform the subsequent tasks.
• Upload. Enable this option to have the active monitor upload a
file to the designated FTP server. Please note, this option must be
enabled to use the Download and/or Delete tasks.
• Download. Select this option to have the active monitor
download a file from the designated FTP server.
• Delete. Select this option to have the active monitor delete a file
from the designated FTP server.
• Timeout. Enter the length of time WhatsUp Gold attempts
to connect to the selected device. When the specified time is
exceeded without connecting, a timeout occurs and WhatsUp
Gold stops trying to connect to the server. This is considered a
failed connection.
Protocol (UDP) and alerts you when configured thresholds are met or
exceeded.
While there are Active monitors for Exchange, and SQL server
Others these type of applications are best monitored with the Application
Monitor feature
5-29
Overview
Passive monitors are useful because they gather information that goes
beyond simple Up or Down by listening for a variety of events.
Although passive monitors are useful, you should not rely on them
solely to monitor a device or service—passive monitors should be used in
conjunction with active monitors. When used together, active and passive
monitors make up a powerful and crucial component of 360-degree
network management.
In the case of Syslog and SNMP Trap passive monitors you can also
choose to accept and log unsolicited events, which do not require a
matching passive monitor to be assigned to a device and are stored
immediately to the database upon receipt. Take care when implementing
this option, however, as collecting too many unsolicited events can very
quickly lead to a large database table.
SNMP Traps
The easiest and simplest way to get your SNMP trap passive monitors
Import Tool created is using the “Trap Definition Tool” found in the Admin console
(Tools > Import Trap Definitions). It will allow you to search for a
specific trap you need WhatsUp Gold to listen for, and then import it into
the Passive Monitor library. After you have imported the trap, you can
make and configuration changes to the monitor in the Passive Monitor
Library using the Rules Expression Editor dialog.
Syslogs
Windows Event
Windows devices make use of event logs to store and track information,
Overview warning, and error events logged by the local operating system. These
event logs can also be monitored from a remote location, allowing a
network administrator to browse the Windows Event Logs on a remote
server on their network. Windows events include many different
parameters in a single event, including an event ID, description, type, and
source.
Overview
Default
• CPU utilization
• Disk utilization
• Interface utilization
• Memory utilization
• Ping Latency and Availability
Custom
• Hardware
• APC UPS
• Printer
• Application/OS
• Active Script
• JMX
• PowerShell Scripting
• SQL Query
• SSH
• Windows Performance Counter
• Hyper-V Event Log
• Hyper-V Host VM
• Network Management and Instrumentation
• SNMP
• WMI
• WMI Formatted
• Disk I/O and Throughput
• VMWare Datastore IOPS
• Hyper-V Disk Activity
Please note, all SNMP objects may or may not be supported by the
specific printer being monitored depending on its manufacturer and
model.
Keep in mind that although you can poll multiple values using the
feature, only one value will be stored to the database: the outcome of
your scripted calculation.
variable.
• Select WMI from the Object Type list.
• Click browse (...) next to Instance. The Performance Counters
dialog appears.
• Enter the Name or IP address of the computer you are trying to
connect. You can click browse (...) to select a device from a list.
• Select the Windows Credential used to connect to the device.
You can also click browse (...) to access the Credentials Library to
create a new credential.
• Click OK to connect to the computer.
• Use the performance counter tree to navigate to the Performance
Counter you want to monitor.
• Select the specific Performance Instance you want to monitor.
• Click OK to add the variable to the Performance counter field in
the Add New Reference Variable dialog.
• Click OK to add the variable to the Reference variable list on the
Add Active Script Performance Monitor dialog.
• Enter your monitor code into the Script text field.
• Click OK to save changes.
The first time that you poll a WMI reference variable that requires two
polls in order to calculate an average (such as “Processor\% Processor
Time”), it returns “Null.”
The first time that you poll a WMI reference variable that requires two
polls in order to calculate an average (such as “Processor\% Processor
Time”), it returns “Null.”
The difference between the WMI and WMI formatted monitors is the
formatted monitor will be rounded, instead of using a floating point
decimal. It may also be in Gigabyte or Megabyte instead of byte
Thresholds
You can set Threshold on any of your performance monitors and more
Overview with in Alert Center. Alert Center has five major types of thresholds
available out of the box: Performance, Passive, System, Wireless and
Network Traffic Analysis. Each category includes a number of different
thresholds.