Syskit Monitor
Try it for FreeContact UsProduct Site
  • Syskit Monitor
  • Product Updates
    • Syskit Monitor 9.1.0 - Release Note
    • Syskit Monitor 9 – The monster has awoken!
    • Syskit Monitor 8.4.0 - Release Note
    • Syskit 2012 R2 8.3.0 - Release Note
    • Syskit 2012 R2 8.2.0 Release Note
    • Syskit 2016 R2 8.0.1 - Release Note
    • Syskit 2016 R2 – Monitor and script all the things!
  • Requirements
    • System Requirements
    • User Permission Requirements
    • Pre Installation Requirements
  • Installation and Configuration
    • Install Wizard
      • Install Syskit Monitor
      • Install Syskit Monitor Data Collector
    • Configuration Wizard
      • Configure Syskit Monitor
      • SQL Permissions
        • Create a SQL Server Login
        • Create a SQL Server Database
        • Create a Service User Login Permission
        • Connect an Existing Database
    • Upgrade to the Latest Version
    • Uninstall Wizard
  • Editions
    • Editions
  • Activation
    • Activation Privacy Statement
    • Online and Offline Activation
    • Activation FAQ
  • Get to Know Syskit Monitor
    • Quick Start Guide
    • Administration
      • Servers and Groups
      • Monitoring Templates
      • PowerShell Scripts
    • Backstage Screen
      • Manage Data Gathering
      • Help Screen
      • Configuration
        • Configure
        • Options
      • Syskit Monitor Web App
    • Dashboards
      • Sessions Dashboard
      • Performance Dashboard
    • Reports
      • User Reports
      • Application Reports
      • Performance Reports
        • System Overview
        • Computer Performance
        • Application Performance
        • User Performance
      • Gateway Reports
      • License Reports
      • Event Log Reports
      • Inventory Reports
        • Hardware and Software
        • Powershell Reports
        • Compare Wizard
      • Custom Reports
  • Common Tasks with Syskit Monitor
    • Monitoring Windows Server and Application Performance
    • Monitoring and Restarting Stopped Windows Services
    • Real Time Alerting
    • Monitoring User Activities and Application Usage
    • Monitoring RD Gateway Connections
    • File System Auditing
    • Malicious IP Blocking
    • Computer Inventory
  • How To
    • Custom Reports
      • Create Custom Report
      • Create SQL Custom Report
      • Create an Alert
    • Users
      • Add Users Manually
      • Add Users From Active Directory
      • Manage Security Permissions
    • Dashboards
      • Create a Custom Dashboard
      • Edit Dashboards
      • Add Formatting Condition to Metrics
    • Reports
      • Export Report to Excel
      • Configure Cost Overview Report
      • Configure Report Subscriptions
      • Create Customized Report Views
    • Computers
      • Add/Remove or Delete Computer from Monitoring
      • Add Citrix Servers to Monitoring
    • Monitoring Templates
      • Predefined Monitoring Templates
      • Template Wizard
      • Import / Export Monitoring Template
      • Download Templates
    • Powershell Scripts
      • PowerShell Wizard
      • Manage Scripts
      • Import / Export PowerShell Script
      • Import and Use PowerShell Script Modules
      • Download Scripts
    • Service Accounts
      • Add Service User to Local Administrators Group via Group Policy
      • Add Service User to Local Administrators Group Manually
    • Audit Events
      • Enable Folder Auditing
      • Configure Audit Logon Events
      • Configure Syskit Monitor server to support the Block Malicious IP Addresses feature
    • Citrix Xenapp
      • Allow Remote RPC on Xenapp
      • Monitor Citrix Published Applications
      • Configure Syskit Monitor for Citrix XenApp 5 Published Application monitoring
      • Configure Syskit Monitor for Citrix XenApp 6.x Published Application monitoring
      • Configure Syskit Monitor for Citrix XenApp 7.x Published Application monitoring
    • Performance Counters Management
    • Manage Syskit Monitor Data Collector
    • Move database to new server
    • Exclude installation folder from antivirus scanning
  • FAQ
    • FAQ
  • Troubleshooting
    • SQL Server Connection
    • SQL Server Express 2012 LocalDB
    • How to resolve the Offline and Unauthorized computer states
    • Network Ports
    • Fixing WMI to work with Syskit Monitor
    • Enable-PSRemoting for untrusted domains to work with Syskit Monitor
    • Configuring CredSSP for use with PowerShell in Syskit Monitor
    • Installation Issues
    • User States
    • User Connections
    • Miscellaneous
Powered by GitBook
On this page
  • General
  • Report Options
  • Dashboard Options
  • Working Hours
  • Citrix Options
  • Alerts
  • Application Alerts
  • Export
  • Printing Options
  • Network and SharePoint Save Locations
  • System Jobs configuration
  • Send e-mails
  • Outgoing email settings
  • Period
  • Email presentation options
  • Delivery options
  • AD integration
  • AD Integration Settings
  • Period
  • Extract Event Log
  • Configure Event Log Extraction
  • Period
  • Concurrent Usage
  • Concurrent Usage Settings
  • Aggregation
  • Aggregation Settings
  • Data Retention
  • Data Retention Settings
  • Period
  • Inventory Snapshots
  • Snapshots Settings
  • Period
  • Compare
  • Service
  • Collect Interval

Was this helpful?

  1. Get to Know Syskit Monitor
  2. Backstage Screen
  3. Configuration

Options

This article explains how to you configure the available options for Syskit Monitor. Options include General, Alerts, Export and System Jobs configuration.

Options include: General, Alerts, Export, and System Jobs configuration. To edit and configure the available options click on the File tab, select Configuration from the left navigation bar and click the Options button. Another way to access the Options dialog is by clicking the Options button in the reports ribbon.

General

This section describes general options for configuring report and dashboard data.

Report Options

  • Monitor information about applications will monitor the applications users are running on the Remote Desktop Services / Citrix Xenapp server.

  • Enable public IP fetching enables you to get the IP address of the client if he is connecting directly to the server via WAN. If server is sitting on the public IP and your clients are connecting from home or from remote locations, you can monitor the public IP addresses of all the clients that are connecting to your environment.

Please note! Enabling public IP fetching may decrease the network performance. Please consult with our support team for additional information.

  • Anonymous activity tracking means that activities will still be tracked but you will not be able to see the real usernames and profiles. Data already stored will also be converted.

Please note! Use this option wisely, in case you proceed with anonymization you will not be able to revert this process!

  • Use Username instead Full Name changes all full names in the reports to the corresponding usernames.

  • Enable Role-based security allows you to adjust for the each viewer individually which OU’s he can see in the reports.

  • Report user’s state as Idle after X minutes of inactivity will report idle time after this time. This means that if a user is idle for 4 minutes, Syskit Monitor will not mark him as Idle. If the user is idle for 5 minutes or more Syskit Monitor will start calculating that user as Idle.

  • Use only top values option if your charts contain a big number of values and you are only interested in top values. After selecting this, you will have the ability to set the top N values in the charts.

Dashboard Options

  • Automatic refresh dashboard after X seconds allows you to change how often to refresh dashboard data or to disable the automatic refreshing at all.

Working Hours

  • Use the Working hours option to define the working time of users connecting to the computers. After choosing this, you will have the ability to filter reports according to your working hours. This means it will be possible for you to get reports only for the time of the day you have defined as working time. Default working hours are from 9-17 o’clock (9 AM – 5 PM).

Citrix Options

  • Use this option to enable gathering Published Applications information. Here you can:

    • Resolve Published Applications Name – enable this option to use Published Application display name instead of a Full Name.

    • Reset Gather Mode – re-detect Published Application data gathering mode.

Alerts

This section describes the alert types and configuration of the recipients.

Application Alerts

Select which alerts you want to receive and enter the e-mail addresses of the recipients.

  • Send Real-time Alerts – enable this option to receive e-mail notifications for Performance Counters and Services. After selecting this, you will have the ability to exclude Low level alerts from sending.

  • Send Session Alerts – enable this option to receive e-mail notifications if a monitored computer crosses a warning and/or critical session threshold.

  • Send alert if monitored computer goes offline – enable this option to receive e-mail notifications if a monitored computer is offline more than X minutes.

  • Send alert in case of SQL service failure – enable this option to receive e-mail notifications if the Syskit Monitor Service cannot establish a connection to SQL Server.

  • Send alert if database size reaches critical limit – enable this option to receive e-mail notifications if your SQL Express LocalDB database becomes too large.

  • Send alert when inventory changes are detected – enable this option to receive e-mail notifications if differences are detected after taking automatic inventory snapshot.

Export

This section describes appearance modification of the exported reports and save locations for the Subscriptions.

Printing Options

  • These settings allow you to configure the wanted header and footer for your PDF reports. You can also upload an image which represents the company logo and easily brand all the reports that Syskit Monitor generates for you.

Network and SharePoint Save Locations

  • To be able to save various Syskit Monitor reports to File Share and SharePoint, it is necessary to configure the Location settings.

System Jobs configuration

This section describes how to configure System Jobs in Syskit Monitor. System Jobs run periodically and you are able to configure them as you wish. You can access System Jobs by navigating to the File tab, selecting Manage from the left navigation bar, clicking System Jobs to see their current status. Another way to access the System Jobs is by clicking the Options button in the reports ribbon. You can configure each system job according to your preferences and it will run periodically as configured.

The following System Jobs are available:

Send e-mails

This section describes Send E-mails system job and how to configure all of the settings.

Outgoing email settings

  • To be able to deliver various Syskit Monitor reports by e-mail, it is necessary to configure the outgoing SMTP server and the sender e-mail address. To specify these settings double click Send e-mail in the System Jobs dialog. The specified sender will be visible in the e-mails sent to any receiver of the reports.

  • Before saving these settings, it is possible to test the specified configuration by clicking the Test email settings button (a test e-mail will be sent to the e-mail address of the sender specified on this screen).

Period

  • Set the Period for how often this job will be executed.

Email presentation options

  • Customize reports footer and add text that will be sent when there is no report data.

Delivery options

  • Configure delivery options from the drop-down menus. Available intervals are Daily, Weekly, Monthly, and Quarterly. Every delivery interval has its own options. Delivery options for all intervals will be saved by clicking on the Save button.

AD integration

This section describes AD Integration system job and how to configure all of the settings. Information is periodically retrieved from the Active Directory, as set in the period options (the recommended interval is once a day). The Active Directory Integration gathers the following data for each user:

  1. Membership in Organizational units (name and description)

  2. Memberships in Security and distribution groups (name and description)

  3. User personal data, such as e-mail, first name, last name, etc.

Integration only gathers data about groups and OUs that have members in the server farm. To improve the performance, it will not gather data about users that are not logged in as RDS users.

AD Integration Settings

After installing Syskit Monitor, all available domains are automatically discovered and ready to be monitored. However, in some environments, you will need to perform additional steps to configure the Active Directory (AD) integration. Here are some things you might need to check:

  • If you do not want to monitor computers from auto-discovered domains or if Syskit Monitor did not automatically detect some trusted domains, you can add the desired domain by specifying a valid domain name, domain controller name, or IP address of the domain controller. This can happen when you create a trust relationship with an existing or new domain after installing Syskit Monitor.

  • You can manually add an untrusted domain by entering the domain name, domain controller, or IP address of the remote AD domain controller.

  • Make sure your account has the necessary privileges to query the AD. It is common in multiple domain environments for each domain to have its own set of specified domain admins and for users from other domains to be restricted from accessing its servers. With that use case in mind, we added a dialog that lets you specify credentials for each of the domains in your environment.

In the Add/Edit Domain dialog, you can manage and configure the following settings:

  • Enter a valid domain name, domain controller name, or IP address of the domain controller;

  • Enable or disable the selected domain; and

  • Modify the credentials for the selected domain.

Please note! If the trust relationship was established with newly created or existing domains, they will be discovered and shown in the AD integration dialog after the AD integration system job execution.

Period

  • Set the Period for importing data from the Active Directory. AD Integration will run periodically depending on period options.

Extract Event Log

This section describes how to configure the Extract Event Log system job and Block malicious IP addresses feature. Turn this system job on if you want to collect auditing of the files and folders, who is accessing which files and when exactly, and if users have deleted/written/appended any data to the existing or new files.

Configure Event Log Extraction

  • You can enable the Block malicious IP addresses feature. After selecting this, you will have the ability to configure the following:

    • After how many failed attempts to block certain IPs.

    • After how many hours to unblock these IP addresses.

    • If you want to perform unblocking of the computers with blocked IPs immediately, click the Unblock blocked IP Addresses button.

Period

  • Set the Period for how often this job will be executed.

Concurrent Usage

This section describes how to configure the Concurrent Usage system job.

If you notice that your concurrent usage reports are incomplete, or you have just updated the product to the latest release from a release that did not have concurrent usage reports, use this option to reset aggregation and let the product recalculate data.

Concurrent Usage Settings

  • Here you can view the date when the last data recalculation was completed.

  • You can enable the application concurrent usage summarization.

Aggregation

This section describes how to configure the Aggregation system job.

This feature is used for loading balanced Citrix farm environments. If you are not using the farm environment, do not enable this option. If you have issues with farm reports please use the Reset button to reset states in the Syskit Monitor.

Please note! This will not erase your data, your data will be recalculated from the beginning. Idle states shorter than X minutes will not be included.

Aggregation Settings

  • Here you set the length of Idle states which will be disregarded.

Data Retention

This section describes how to configure Data Retention in order to save space on the SQL Server.

Data Retention Settings

Here you can modify the length options for the period after which the product will automatically delete data from the product database. By default, all retention options are set as follows:

  • Delete log entries older than 5 years;

  • Delete performance counter data older than 30 days;

  • Delete PowerShell script data older than 30 days.

Period

  • Set the Period for how often this job will be executed.

Inventory Snapshots

This section describes how to configure the Inventory Snapshots system job.

Snapshots Settings

Here you can choose which Inventory data Syskit Monitor will collect when taking a snapshot:

  • Enable the collection of hardware and software inventory components, such as CPU, RAM, available hard disk space, installed programs, Windows updates, and local administrators on the servers.

  • Enable the execution of PowerShell scripts on the defined computers or computer groups. This means the created PowerShell scripts will be scheduled to run on every Inventory Snapshots system job triggered.

Please note! When Printers option is enabled, user printer information will be collected on every service triggering along with the other user options. This can slow down data gathering and application performance. We strongly recommend not to enable this feature unless it is necessarily needed.

Please note! When Available and Installed Updates options are enabled, the software information will be collected on every service triggering. This can slow down data gathering and application performance.

By default, all options for taking snapshots and for report visibility in the Compare Wizard are set to Enabled.

Period

  • Set the Period for how often this job will be executed.

Compare

  • Use these options to configure which reports you want compared. Unchecked options will not be displayed in the Compare Result dialog.

Refer to the Alerts section within this article if you want to enable the option to receive e-mail notifications if differences are detected after taking an automatic inventory snapshot.

Service

This section describes the Syskit Monitor Service.

Collect Interval

  • Set the Syskit Monitor collect interval. In this interval, the product will collect data from the monitored computers. The default and recommended interval is 90 seconds. The lower the interval, the more accurate the data will be, but the recommended scenario is never to hold this value under 60 seconds.

    However, we have calculated that the best value and accuracy rate is the default 90 seconds.

  • You can choose whether to show warning when service is not running or not.

  • Verbose logging – You can choose to enable these options to help our developer and support teams solve potential problems before they occur. Before enabling these options, please consult our support team. Select the check boxes to enable verbose logging for the following sources:

    • Verbose event logging – The Windows Event Viewer will list in detail every event that usually cannot be viewed.

    • Database service log sources Syskit Monitor Service will write entries for the specified sources into the product database. The drop-down menu contains the following sources: Analyzer, Performance Counters, System Jobs, and PowerShell.

    The verbose event logging warning will show if any of the available options have been enabled, because a lot of entries could be written into the Windows Event Viewer and product database.

PreviousConfigureNextSyskit Monitor Web App

Last updated 11 months ago

Was this helpful?

See article to learn more.

See to learn more. See to learn more. See to learn more.

How to configure Report Subscriptions
How to Enable Folder Auditing
How to Configure Audit Logon Events
How to Configure Server to support Block Malicous IP Addresses feature