1 / 37

Monitoring

Monitoring. Unit objectives Monitor the network Read event logs to monitor network activity. Topic A. Topic A: Monitoring resources Topic B: Event Viewer. Resource Overview. CPU Hard disk Network Memory (RAM). Activity A-1. Viewing real-time performance data in Resource Overview.

feo
Download Presentation

Monitoring

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Monitoring Unit objectives • Monitor the network • Read event logs to monitor network activity

  2. Topic A • Topic A: Monitoring resources • Topic B: Event Viewer

  3. Resource Overview • CPU • Hard disk • Network • Memory (RAM)

  4. Activity A-1 Viewing real-time performance data in Resource Overview

  5. Performance Monitor • Create a baseline to compare system performance over time • Monitor system resource use • Locate performance problems • Identify performance bottlenecks

  6. Performance objects • Network Interface • Memory • Paging File • PhysicalDisk • Process • Processor • TCPv4 and TCPv6 • UDPv4 and UDPv6

  7. Bottlenecks • IPv4 and IPv6 • Network Interface • Redirector • Server • TCPv4 and TCPv6 • UDPv4 and UDPv6

  8. Activity A-2 Monitoring network performance

  9. Configuration • Toolbar • Properties dialog box

  10. Activity A-3 Configuring Performance Monitor

  11. Data Collector Sets • LAN Diagnostics • System Diagnostics • System Performance

  12. Activity A-4 Running a Data Collector Set

  13. Data Collector Set reports • Text-based report • Performance Monitor

  14. Activity A-5 Viewing a Data Collector Set report

  15. Reliability Monitor • Track events that affect stability • Software installs and uninstalls • Application failures • Hardware failures • Windows failures • Miscellaneous failures • System Stability Chart • System Stability Report

  16. Activity A-6 Determining the system’s Stability Index

  17. Remote Desktop • Remote computer management • Remote Desktop Connections supported in • Windows Server 2008 • Windows Vista (Ultimate, Business, and Enterprise) • Windows Server 2003 • Windows XP Professional

  18. Remote Desktop options • Allow connections from computers running any version of Remote Desktop (less secure). Select this option if you will be connecting to the Windows Vista computer from an older version of Windows such as Windows XP Professional • Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure)

  19. Remote Desktop Connection • General • Display • Local Resources • Programs • Experience • Advanced

  20. Activity A-7 Implementing Remote Desktop connections

  21. Topic B • Topic A: Monitoring resources • Topic B: Event Viewer

  22. Event Viewer • Application • Security • Setup • System • Forwarded Events

  23. Event information • Source • Event ID • Level • User • OpCode • Logged • Task Category • Keywords • Computer

  24. Event types • Critical • Error • Warning • Information • Success Audit • Failure Audit

  25. Activity B-1 Viewing the event logs

  26. Remote logs • Permissions on the remote computer • Event Log Readers local group • Windows Firewall exception for Remote Event Log Management on remote computer

  27. Activity A-2 Viewing event logs on a remote computer

  28. Event forwarding • Source computer • Collecting computer • Subscriptions

  29. Source computers • Windows Remote Management service • Windows Firewall exception for port 80 • winrm quickconfig

  30. Collecting computers • Windows Event Collector service • wecutil qc

  31. Activity B-3 Configuring source and collecting computers

  32. Subscriptions • Name • Destination log • Source computers • Events (Query Filter) • Advanced settings • User account • Delivery optimization • Protocol

  33. Activity B-4 Creating an event subscription

  34. Activity B-5 Examining forwarded events

  35. Device and application logging • Antivirus software • Router • Firewall • Wireless access point and RADIUS • DNS server • Domain controller

  36. Activity B-6 Discussing device and application logging

  37. Unit summary • Monitored the network • Read event logs to monitor network activity

More Related