Our monitoring software products have a wide range of functionality and features. At the same time, they share a common look and feel. This makes it easy to move among applications, but it might make it a little harder to see how they're different. This page will help show their similarities and differences.
If you have further questions, please contact us.
In general the products are typically used for:
Agentless server and application health and performance monitoringsoftware on local and remote servers and devices. Rich alerting and reporting.
In-depth analysis and tracking of file storage and directory sizes(local and remote), including file and file-owner information. Some monitoring capabilities as well as rich alerting and reporting.
Real-time file access and auditing. Can report who accesses and deletes files. Ransomware protection, file-copy detection and USB drive blocking
The Directory Quota Monitor keeps track of directory sizes, and executes actions if the directory sizes are over the quota. End users (directory owners) can be notified via email with the Monitor-Directed E-mail action. Includes reports.
Protects servers and workstations by preventing CD/DVDs and/or external drives, including USB drives, from being attached. Any specified devices that are attached are immediately detached by the operating system so they cannot be accessed.
Connects to an Esensors EM01b Websensor on the LAN and monitors the current temperature, humidity and luminescence, and notifies you if the values go above thresholds that you set. Historical reports as well.
Execute your custom written scripts written in the Visual Basic Scripting Edition language.
You can use custom or 3rd party ActiveX controls. The script determines whether to trigger actions using your
This monitor is a host-based IDS (Intrusion Detection System) that will notify you when the date, size or even content of a file changes on local files, or files on any CIFS share. File creation and deletion is also monitored. A good tool to help with configuration management as well. Auto-configuration functionality is available.
The File Sight monitor watches real time file access by users and programs. You can configure which files it watches, and
how you are notified when a particular operation (file read, write, delete, etc) occurs.
The Ultra version also lets you:
* Record the file access operations to a database for reporting (by user, by file, by operation, etc)
* Alert on user usage patterns (i.e. user reads X amount of data in Y time, useful for ransomware protection and detecting file copying)
NOTE: This monitor can ONLY monitor drives on the local computer. Watching files on remote computers requires that the [PA Monitoring Product] service (or a Satellite) be installed
on the remote computers.
The Network Scan monitor will periodically perform a ping scan of a specified IP address range looking for new devices that are not already being monitored. They can automatically get added to the system and configured for monitoring.
The entire breadth of the system Performance Counters can be monitored allowing you to set actionable
thresholds on CPU usage, memory usage, NIC traffic, etc. Performance counter values are stored in a database so
you can view historical counter reports and understand trends.
Runs an executable or external script launched via Windows, or via SSH, and parses the output to determine whether alerts should be fired. Plugins can also return values that are recorded to the database and can be charted.
Connects to local or remote SNMP agents and queries SNMP object values. Custom MIBs are supported. The value is compared to a threshold that you set and actions are fired as specified. SNMP values are also recorded to a local database for reporting purposes. Supports SNMP v1, v2c and v3.
Monitor one or many pages on a web site. Checks for positive cases (text that must be found),
negative cases (alerts if error text found) and if the page has changed at all.
Response times are checked and recorded, and reports can be generated to understand trends.
You can create scheduled reports which will get created when you want them, and optionally email the report to a list of recipients. Scheduled report URLs are stable so you can add them to your Favorites list to quickly and easily see the latest results.
While a computer is in maintenance mode, [PA Monitoring Product] won't run monitors. It will turn itself back on automatically after the maintenance window expires if you manually entered maintenance mode, or it can automatically enter and leave maintenance mode on a schedule.
Many monitors are capable of sending escalating events. For example, low disk space alerts could first go to a first-tier Ops team. If the aren't handled in a specified time frame, they could be forwarded to a second-tier Ops team.
Paste a list of servers or IP address into a list and let [PA Monitoring Product] inspect and self-configure for each server/device. Or easily copy the configuration from one configured server to one or more other servers.