SlideShare une entreprise Scribd logo
1  sur  20
LICT IT Department–Application Program-PRTG Network Monitor -Page 1
PRTG Network Monitor
V13.1.2-2012
Information Technology Department
LICT IT Department–Application Program-PRTG Network Monitor -Page 2
Revision
Version Date Author Subject
13.1.2 Majd Khriema PRTG Network Monitor
Reviewers / Approvals
Name Title Date Department Signature
Issa Nemeh IT Manager IT Department Review OK
Alfred Vitale Chief Information Officer Information Division Review OK
LICT IT Department–Application Program-PRTG Network Monitor -Page 3
Table of Contents
Introduction………………………………………………….…………...…....4
PRTG Network Monitor benefits………………………………………….….5
Configuring PRTG Network Monitor………………………………………..6
- « Guru » configuration wizard Configuration
- Enter Administrator Credentials for Windows Systems
- Enter Credentials for SNMP Based Network Devices
- Enter Credentials for VMware/XenServer
- Enter Credentials for Linux/OSX Servers
- Set up Monitoring for Internet Connection
- Set up monitoring for Server in your LAN
- Set up Monitoring for Websites and Online Shops
- Set up Monitoring for Cloud Services
- Auto-Discover a Segment of Your Network
Startup Monitoring LICT Network………………………………………....13
- Local Probe
- Groups
- Devices
- Sensors
- LICT Devices and Groups
Reports…………………………………………………………………..…19
LICT IT Department–Application Program-PRTG Network Monitor -Page 4
Introduction
Network Monitoring is the system That controls/monitors/supervises a network and notifies
the network administrator through e-mail or SMS.
Monitoring is a must for our company and every company that depends on its IT
infrastructure for any purposelike :
- Measuring Availability and performance
- Alerts are sent to the responsible personif any failure has been detected and also
informs administrator about unusual activities instantly.
- Results of the monitoring can be analysed and customised, also reports can be
generated.
- Help planning new investments and avoid expensive unused network components
through results that show how to strengthen the network by eliminting weak hardware,
failures, and security issues.
LICT IT Department–Application Program-PRTG Network Monitor -Page 5
PRTG Network Monitorbenefits
- Discovers and assess network devices (PCs, Servers, Switches, Printers, etc.)
- Discovers unusual, suspicious, or malicious activity with devices or users.
- Monitors system usage (CPU loads, free memory, free disk, etc.)
- Monitors and alerts due to uptimes/downtimes or slow devices.
- Monitors and account bandwidth and network device usage.
- Monitors system health of various hardware devices.
- Monitors performance of databases as well as monitors databases directly.
- Monitors Email Servers.
- Monitors Virtual Servers.
- Monitors Cloud Services (Google mail, Google drive, ms.office 365, dropbox, icloud,
twitter, facebook, skype.)
LICT IT Department–Application Program-PRTG Network Monitor -Page 6
Configuring PRTG Network Monitor
PRTG Network Monitor comes with three interfaces:
-Ajax web interface: through Web browser.
- Enterprise console (Windows GUI) on PRTG server.
- Mobile Web GUI.
For the first use of PRTG Network Monitor we should configurate it through « GURU »
configuration wizard.
- « Guru » configuration wizard Configuration
Configuring Administrator Account : configure default PRTG Admin « prtgadmin » and
domain E.mail address and password.
LICT IT Department–Application Program-PRTG Network Monitor -Page 7
- Enter Administrator Credentials for Windows Systems
In order to use WMI (Windows Management Instrumentation), which is the standard
monitoring technology for Windows PCs and servers, PRTG needs to have administrator
access to our network, this conatins our domain name, domain admin username and
password.
LICT IT Department–Application Program-PRTG Network Monitor -Page 8
- Enter Credentials for SNMP Based Network Devices
Most switches, routers and firewalls along with other network devices support SNMP
(Simple Network Management Protocol) for monitoring. PRTG needs the so-called
"community string" used on our network to access these devices.
- Enter Credentials for VMware/XenServer
PRTG supports monitoring of virtualization services, such as VMware and xin.
PRTG needs logins credentials if we are running VMware based virtualization (ESX/ESXi
3.5, 4.0, 5.0, and vCenter) or XenServer based virtualization.
LICT IT Department–Application Program-PRTG Network Monitor -Page 9
- Enter Credentials for Linux/OSX Servers
PRTG can monitor PCs that run on various versions of Linux, Solaris, and Mac OS X, in
order to monitor computers that run on those operating systems, PRTG needs logins
credentials.
LICT IT Department–Application Program-PRTG Network Monitor -Page 10
- Set up Monitoring for Internet Connection
PRTG can monitor our local LAN and internet connectivity. The following settings have
been taken from our LICT network configuration.
- Set up monitoring for Server in your LAN
PRTG has found the following servers in our LAN and will auto-discovers them. We can add
the DNS names or IP addresses of other servers.
LICT IT Department–Application Program-PRTG Network Monitor -Page 11
- Set up Monitoring for Websites and Online Shops
PRTG can monitor websites and online shops using http by entering the URLs of the webites
that we want to monitor.
LICT IT Department–Application Program-PRTG Network Monitor -Page 12
- Set up Monitoring for Cloud Services
If we use any of the cloud services (Google mail, Google drive, ms.office 365, dropbox,
icloud, twitter, facebook, skype), PRTG will set up a sensor for each service.
- Auto-Discover a Segment of Your Network
The automatic network discovery of PRTG can scan a segment of our network for devices.
Each device will be analyzed and sensors will be created according to the device type.
LICT IT Department–Application Program-PRTG Network Monitor -Page 13
Startup MonitoringLICT Network
- Local probe
PRTG Network Monitor is installed on it. In LICT our PRTG server is: 192.168.9.199
- Groups
To add a group manually, select Devices | Add Group from the main menu, an assistant will
appear, and we should add group settings.
- Devices
The Add Device dialog appears when adding a new device to a group. It only shows the
setting fields that are imperative for creating the device, and we will not see all setting fields
in this dialog.
LICT IT Department–Application Program-PRTG Network Monitor -Page 14
- Sensors
In PRTG we create “devices”, on those devices, we create “sensors”, we called them the
“basic monitoring elements”
Sensors are calssified according to:
- Their Functions: disponibility, bandwidth/traffic, speed, CPU use, memory use, network
infrastructure.
- Operating system of the target: Windows, Linux, Mac OS, SQL server, mail server.
- Technology used: Ping, SNMP, WMI, HTTP, NetFlow.
We can add sensors by click on “Add sensor”and choosewhich sensors we wants to add
from the sensors list.
LICT IT Department–Application Program-PRTG Network Monitor -Page 15
We add (ping, Core Health free physical memory, System Health CPU Load, Disk Free, and
Network card connection).
Each sensorhas its configuration, and has a “Live Data”diagram.
LICT IT Department–Application Program-PRTG Network Monitor -Page 16
PRTG gives also “2 days”, “30 days”, “365 days”and “Historic Data” which gives a
custom monitoring period of time as we want.
If sensoris down there is a “Notification”and we can configure it to send E.mail to PRTG
admins or users group.
Sensor has one or more “channels”in which it handles the actual monitoring data. In the
channel settings we can define how the data from the sensor's different channels shall be
displayed in graphs and tables. Additionally, the channel data can affect the sensor's status.
LICT IT Department–Application Program-PRTG Network Monitor -Page 17
- LICT Devices and Groups
We have this groups in our system:
- Probe (192.168.9.199)
- Internet Connection(192.168.2.200, 192.168.40.3)
- Domain Controllers ( 192.168.3.1, 192.168.3.9)
- Exchange Servers ( 192.168.3.21, 192.168.3.22)
- Switches (192.168.2.197, 192.168.2.225, 192.168.2.230, 192.168.2.232,
192.168.2.234, 192.168.2.235, 192.168.2.236, 192.168.2.240, 192.168.2.241,
192.168.2.2242, 192.168.2.243, 192.168.2.244, 192.168.2.245, 192.168.2.247,
192.168.2.252, 192.168.2.253)
- Services Servers (192.168.3.23, 192.168.3.11, 192.168.33.8, 192.168.33.14,
192.168.33.60, 192.168.33.4, 192.168.33.9, 192.168.33.13, 192.168.33.10,
192.168.33.80)
All servers have been added with my credential as “majdk”, we will add all Servers to our
system and configure sensors that are needed in our network as soonas possible.
LICT IT Department–Application Program-PRTG Network Monitor -Page 18
We have added most important sensors that affect our devices (SNMP sensors forhardware
configuration and WMI log events sensors for our servers).
For example we have added those sensors for all Servers:
(ping, system uptime, Memory, Disk Free),also add this sensors for Domain Controllers
(WMI EventLog) for all systemwarning logs, and for Exchange Servers we add (Active
User Count, Database Cache Size).
LICT IT Department–Application Program-PRTG Network Monitor -Page 19
Reports
PRTG includes a powerful reporting engine, as well as scheduled report generation in
HTML and PDF format. So we can run reports on demand or on a regular basis (for
example, once a day). We can create reports for one single sensor, or we choosea range of
sensors we want to create a report for. It is also possible to create HTML reports for our
system configuration.
The content and layout of the report is controlled by the report template of our choice and is
the same for all sensors in a report.
PRTG is delivered with several pre-configured reports, we should select settings option to
configure reports, and settings include many options like:
- Template: this defines the overall look of our report and affects in which detail
(interval) monitoring data is included, there are templates that offer optional data
tables besides the graphs.
- Papersize:specify the paper size for which the report shall be formatted.
- Schedule:we can create reports for manual "on-demand use" or automatically every
hour, day, day of week, day of month or a specific date.
- Period: Specify which period is to be reported. We choosebetween daily, weekly,
monthly, quarterly or yearly reports.
- Access Rights:Set user group access rights for this object.
LICT IT Department–Application Program-PRTG Network Monitor -Page 20
In our LICT network we create four templates for PRTG groups in our system as:
- Domain Controllers
- Exchange Servers
- Switches
- Services Servers

Contenu connexe

Tendances

Fortinet
FortinetFortinet
FortinetABEP123
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
Ccnp enterprise workbook v1.0 completed till weigth
Ccnp enterprise workbook v1.0   completed till weigthCcnp enterprise workbook v1.0   completed till weigth
Ccnp enterprise workbook v1.0 completed till weigthSagarR24
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Introduction to Things board (An Open Source IoT Cloud Platform)
Introduction to Things board (An Open Source IoT Cloud Platform)Introduction to Things board (An Open Source IoT Cloud Platform)
Introduction to Things board (An Open Source IoT Cloud Platform)Amarjeetsingh Thakur
 
Proactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call CentersProactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call CentersPerficient, Inc.
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-NetworkBelal Ashraf
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Proteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2Ban
Proteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2BanProteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2Ban
Proteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2BanI Putu Hariyadi
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk
 
FreeSWITCH Cluster by K8s
FreeSWITCH Cluster by K8sFreeSWITCH Cluster by K8s
FreeSWITCH Cluster by K8sChien Cheng Wu
 

Tendances (20)

Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Fortinet
FortinetFortinet
Fortinet
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Ccnp enterprise workbook v1.0 completed till weigth
Ccnp enterprise workbook v1.0   completed till weigthCcnp enterprise workbook v1.0   completed till weigth
Ccnp enterprise workbook v1.0 completed till weigth
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Introduction to Things board (An Open Source IoT Cloud Platform)
Introduction to Things board (An Open Source IoT Cloud Platform)Introduction to Things board (An Open Source IoT Cloud Platform)
Introduction to Things board (An Open Source IoT Cloud Platform)
 
Proactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call CentersProactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call Centers
 
Fortinet
FortinetFortinet
Fortinet
 
Mtcna mikrotik informatix
Mtcna mikrotik informatixMtcna mikrotik informatix
Mtcna mikrotik informatix
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Proteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2Ban
Proteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2BanProteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2Ban
Proteksi Brute Force pada Proxmox Virtual Environment (PVE) menggunakan Fail2Ban
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
802.1x
802.1x802.1x
802.1x
 
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1
 
FreeSWITCH Cluster by K8s
FreeSWITCH Cluster by K8sFreeSWITCH Cluster by K8s
FreeSWITCH Cluster by K8s
 

En vedette

network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Utilizacion de la herramienta PRTG Network monitor
Utilizacion de la herramienta PRTG Network monitorUtilizacion de la herramienta PRTG Network monitor
Utilizacion de la herramienta PRTG Network monitorRita Aguilar
 
Giam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtgGiam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtglaonap166
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Ticketing pada manage engine servicedisk plus
Ticketing pada manage engine servicedisk plusTicketing pada manage engine servicedisk plus
Ticketing pada manage engine servicedisk plusFanky Christian
 
Software de monitoreo de red Activity Monitor
Software de monitoreo de red Activity MonitorSoftware de monitoreo de red Activity Monitor
Software de monitoreo de red Activity MonitorActivity Monitor España
 
Pandora FMS - Presentación técnica
Pandora FMS - Presentación técnicaPandora FMS - Presentación técnica
Pandora FMS - Presentación técnicaSancho Lerena
 
Riesgos laborales higiene mariana 3 corte
Riesgos laborales higiene mariana 3 corteRiesgos laborales higiene mariana 3 corte
Riesgos laborales higiene mariana 3 corteMariana Lesmes
 
Giam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtgGiam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtglaonap166
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hLeon Kappelman
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringDaniel Koller
 

En vedette (20)

Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
Prtg
PrtgPrtg
Prtg
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Utilizacion de la herramienta PRTG Network monitor
Utilizacion de la herramienta PRTG Network monitorUtilizacion de la herramienta PRTG Network monitor
Utilizacion de la herramienta PRTG Network monitor
 
PRTG
PRTGPRTG
PRTG
 
Manejo de prtg network monitor
Manejo de prtg network monitorManejo de prtg network monitor
Manejo de prtg network monitor
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Giam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtgGiam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtg
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
Ticketing pada manage engine servicedisk plus
Ticketing pada manage engine servicedisk plusTicketing pada manage engine servicedisk plus
Ticketing pada manage engine servicedisk plus
 
INTERNSHIP REPORT PRESENTATION
INTERNSHIP REPORT PRESENTATIONINTERNSHIP REPORT PRESENTATION
INTERNSHIP REPORT PRESENTATION
 
Software de monitoreo de red Activity Monitor
Software de monitoreo de red Activity MonitorSoftware de monitoreo de red Activity Monitor
Software de monitoreo de red Activity Monitor
 
Pandora FMS - Presentación técnica
Pandora FMS - Presentación técnicaPandora FMS - Presentación técnica
Pandora FMS - Presentación técnica
 
Riesgos laborales higiene mariana 3 corte
Riesgos laborales higiene mariana 3 corteRiesgos laborales higiene mariana 3 corte
Riesgos laborales higiene mariana 3 corte
 
Zenoss
ZenossZenoss
Zenoss
 
Giam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtgGiam sat-switch-bằng-phần-mềm-prtg
Giam sat-switch-bằng-phần-mềm-prtg
 
Tcpdump daniel heredia
Tcpdump daniel herediaTcpdump daniel heredia
Tcpdump daniel heredia
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure Monitoring
 

Similaire à PRTG

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Liz Warner
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET Journal
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerManageEngine
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applicationsijsrd.com
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET Journal
 
Merged document
Merged documentMerged document
Merged documentsreeja_16
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analyticsnovsela
 

Similaire à PRTG (20)

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Parimal Resume
Parimal ResumeParimal Resume
Parimal Resume
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
 
System monitoring
System monitoringSystem monitoring
System monitoring
 
Merged document
Merged documentMerged document
Merged document
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
 

PRTG

  • 1. LICT IT Department–Application Program-PRTG Network Monitor -Page 1 PRTG Network Monitor V13.1.2-2012 Information Technology Department
  • 2. LICT IT Department–Application Program-PRTG Network Monitor -Page 2 Revision Version Date Author Subject 13.1.2 Majd Khriema PRTG Network Monitor Reviewers / Approvals Name Title Date Department Signature Issa Nemeh IT Manager IT Department Review OK Alfred Vitale Chief Information Officer Information Division Review OK
  • 3. LICT IT Department–Application Program-PRTG Network Monitor -Page 3 Table of Contents Introduction………………………………………………….…………...…....4 PRTG Network Monitor benefits………………………………………….….5 Configuring PRTG Network Monitor………………………………………..6 - « Guru » configuration wizard Configuration - Enter Administrator Credentials for Windows Systems - Enter Credentials for SNMP Based Network Devices - Enter Credentials for VMware/XenServer - Enter Credentials for Linux/OSX Servers - Set up Monitoring for Internet Connection - Set up monitoring for Server in your LAN - Set up Monitoring for Websites and Online Shops - Set up Monitoring for Cloud Services - Auto-Discover a Segment of Your Network Startup Monitoring LICT Network………………………………………....13 - Local Probe - Groups - Devices - Sensors - LICT Devices and Groups Reports…………………………………………………………………..…19
  • 4. LICT IT Department–Application Program-PRTG Network Monitor -Page 4 Introduction Network Monitoring is the system That controls/monitors/supervises a network and notifies the network administrator through e-mail or SMS. Monitoring is a must for our company and every company that depends on its IT infrastructure for any purposelike : - Measuring Availability and performance - Alerts are sent to the responsible personif any failure has been detected and also informs administrator about unusual activities instantly. - Results of the monitoring can be analysed and customised, also reports can be generated. - Help planning new investments and avoid expensive unused network components through results that show how to strengthen the network by eliminting weak hardware, failures, and security issues.
  • 5. LICT IT Department–Application Program-PRTG Network Monitor -Page 5 PRTG Network Monitorbenefits - Discovers and assess network devices (PCs, Servers, Switches, Printers, etc.) - Discovers unusual, suspicious, or malicious activity with devices or users. - Monitors system usage (CPU loads, free memory, free disk, etc.) - Monitors and alerts due to uptimes/downtimes or slow devices. - Monitors and account bandwidth and network device usage. - Monitors system health of various hardware devices. - Monitors performance of databases as well as monitors databases directly. - Monitors Email Servers. - Monitors Virtual Servers. - Monitors Cloud Services (Google mail, Google drive, ms.office 365, dropbox, icloud, twitter, facebook, skype.)
  • 6. LICT IT Department–Application Program-PRTG Network Monitor -Page 6 Configuring PRTG Network Monitor PRTG Network Monitor comes with three interfaces: -Ajax web interface: through Web browser. - Enterprise console (Windows GUI) on PRTG server. - Mobile Web GUI. For the first use of PRTG Network Monitor we should configurate it through « GURU » configuration wizard. - « Guru » configuration wizard Configuration Configuring Administrator Account : configure default PRTG Admin « prtgadmin » and domain E.mail address and password.
  • 7. LICT IT Department–Application Program-PRTG Network Monitor -Page 7 - Enter Administrator Credentials for Windows Systems In order to use WMI (Windows Management Instrumentation), which is the standard monitoring technology for Windows PCs and servers, PRTG needs to have administrator access to our network, this conatins our domain name, domain admin username and password.
  • 8. LICT IT Department–Application Program-PRTG Network Monitor -Page 8 - Enter Credentials for SNMP Based Network Devices Most switches, routers and firewalls along with other network devices support SNMP (Simple Network Management Protocol) for monitoring. PRTG needs the so-called "community string" used on our network to access these devices. - Enter Credentials for VMware/XenServer PRTG supports monitoring of virtualization services, such as VMware and xin. PRTG needs logins credentials if we are running VMware based virtualization (ESX/ESXi 3.5, 4.0, 5.0, and vCenter) or XenServer based virtualization.
  • 9. LICT IT Department–Application Program-PRTG Network Monitor -Page 9 - Enter Credentials for Linux/OSX Servers PRTG can monitor PCs that run on various versions of Linux, Solaris, and Mac OS X, in order to monitor computers that run on those operating systems, PRTG needs logins credentials.
  • 10. LICT IT Department–Application Program-PRTG Network Monitor -Page 10 - Set up Monitoring for Internet Connection PRTG can monitor our local LAN and internet connectivity. The following settings have been taken from our LICT network configuration. - Set up monitoring for Server in your LAN PRTG has found the following servers in our LAN and will auto-discovers them. We can add the DNS names or IP addresses of other servers.
  • 11. LICT IT Department–Application Program-PRTG Network Monitor -Page 11 - Set up Monitoring for Websites and Online Shops PRTG can monitor websites and online shops using http by entering the URLs of the webites that we want to monitor.
  • 12. LICT IT Department–Application Program-PRTG Network Monitor -Page 12 - Set up Monitoring for Cloud Services If we use any of the cloud services (Google mail, Google drive, ms.office 365, dropbox, icloud, twitter, facebook, skype), PRTG will set up a sensor for each service. - Auto-Discover a Segment of Your Network The automatic network discovery of PRTG can scan a segment of our network for devices. Each device will be analyzed and sensors will be created according to the device type.
  • 13. LICT IT Department–Application Program-PRTG Network Monitor -Page 13 Startup MonitoringLICT Network - Local probe PRTG Network Monitor is installed on it. In LICT our PRTG server is: 192.168.9.199 - Groups To add a group manually, select Devices | Add Group from the main menu, an assistant will appear, and we should add group settings. - Devices The Add Device dialog appears when adding a new device to a group. It only shows the setting fields that are imperative for creating the device, and we will not see all setting fields in this dialog.
  • 14. LICT IT Department–Application Program-PRTG Network Monitor -Page 14 - Sensors In PRTG we create “devices”, on those devices, we create “sensors”, we called them the “basic monitoring elements” Sensors are calssified according to: - Their Functions: disponibility, bandwidth/traffic, speed, CPU use, memory use, network infrastructure. - Operating system of the target: Windows, Linux, Mac OS, SQL server, mail server. - Technology used: Ping, SNMP, WMI, HTTP, NetFlow. We can add sensors by click on “Add sensor”and choosewhich sensors we wants to add from the sensors list.
  • 15. LICT IT Department–Application Program-PRTG Network Monitor -Page 15 We add (ping, Core Health free physical memory, System Health CPU Load, Disk Free, and Network card connection). Each sensorhas its configuration, and has a “Live Data”diagram.
  • 16. LICT IT Department–Application Program-PRTG Network Monitor -Page 16 PRTG gives also “2 days”, “30 days”, “365 days”and “Historic Data” which gives a custom monitoring period of time as we want. If sensoris down there is a “Notification”and we can configure it to send E.mail to PRTG admins or users group. Sensor has one or more “channels”in which it handles the actual monitoring data. In the channel settings we can define how the data from the sensor's different channels shall be displayed in graphs and tables. Additionally, the channel data can affect the sensor's status.
  • 17. LICT IT Department–Application Program-PRTG Network Monitor -Page 17 - LICT Devices and Groups We have this groups in our system: - Probe (192.168.9.199) - Internet Connection(192.168.2.200, 192.168.40.3) - Domain Controllers ( 192.168.3.1, 192.168.3.9) - Exchange Servers ( 192.168.3.21, 192.168.3.22) - Switches (192.168.2.197, 192.168.2.225, 192.168.2.230, 192.168.2.232, 192.168.2.234, 192.168.2.235, 192.168.2.236, 192.168.2.240, 192.168.2.241, 192.168.2.2242, 192.168.2.243, 192.168.2.244, 192.168.2.245, 192.168.2.247, 192.168.2.252, 192.168.2.253) - Services Servers (192.168.3.23, 192.168.3.11, 192.168.33.8, 192.168.33.14, 192.168.33.60, 192.168.33.4, 192.168.33.9, 192.168.33.13, 192.168.33.10, 192.168.33.80) All servers have been added with my credential as “majdk”, we will add all Servers to our system and configure sensors that are needed in our network as soonas possible.
  • 18. LICT IT Department–Application Program-PRTG Network Monitor -Page 18 We have added most important sensors that affect our devices (SNMP sensors forhardware configuration and WMI log events sensors for our servers). For example we have added those sensors for all Servers: (ping, system uptime, Memory, Disk Free),also add this sensors for Domain Controllers (WMI EventLog) for all systemwarning logs, and for Exchange Servers we add (Active User Count, Database Cache Size).
  • 19. LICT IT Department–Application Program-PRTG Network Monitor -Page 19 Reports PRTG includes a powerful reporting engine, as well as scheduled report generation in HTML and PDF format. So we can run reports on demand or on a regular basis (for example, once a day). We can create reports for one single sensor, or we choosea range of sensors we want to create a report for. It is also possible to create HTML reports for our system configuration. The content and layout of the report is controlled by the report template of our choice and is the same for all sensors in a report. PRTG is delivered with several pre-configured reports, we should select settings option to configure reports, and settings include many options like: - Template: this defines the overall look of our report and affects in which detail (interval) monitoring data is included, there are templates that offer optional data tables besides the graphs. - Papersize:specify the paper size for which the report shall be formatted. - Schedule:we can create reports for manual "on-demand use" or automatically every hour, day, day of week, day of month or a specific date. - Period: Specify which period is to be reported. We choosebetween daily, weekly, monthly, quarterly or yearly reports. - Access Rights:Set user group access rights for this object.
  • 20. LICT IT Department–Application Program-PRTG Network Monitor -Page 20 In our LICT network we create four templates for PRTG groups in our system as: - Domain Controllers - Exchange Servers - Switches - Services Servers