Actions
|
Actions are a form of response executed by a Monitor Item and occur as a result of changing conditions observed by the Monitor Item. There are two Actions that can be executed: Generate application event log message or execute a script.
|
Monitoring Categories
|
Categories are user configurable containers for organizing ELM Agents. Monitor Items are assigned to Categories which then assign them to any Agents in the Category.
|
Agent Deployment Wizard
|
Agent Deployment Wizard allows installation of single or multiple Agents using lists generated from Active Directory, an IP address range, a text file of computer names or simply typed in.
|
Agents
|
Agents are the fundamental component for identifying the devices to be monitored. ELM pricing is based on the License and Class of the Agent. There are 6 licenses: System, Log, Performance, Core, Network and Event. There are 2 classes: Class I = Windows Server Systems and Class II = Windows Workstation and non-Windows Systems.
|
At-a-Glance
|
Server-At-a-Glance views are a summarization of overall status information for the ELM Server, Agents, Inventory, and Database Information. Agent At-a-Glance views are a summarization of overall status information per Agent.
|
Circular File
|
A circular file overwrites itself by returning to the beginning of the file when it reaches a pre-determined size. File Monitors track their progress, and look for new data, by setting size-based bookmarks. Because circular files grow to a limited size and then stop, the bookmarks become ineffective.
|
Containers
|
Container is a general term and is found on the left-hand side of the ELM Console. They are typically, but not always, shown as a folder icon with an overlaid design. Agent Categories are a special class of container.
|
DDL
|
Data Definition Language (DDL) is used to define and manage objects in SQL. See SQL Books On Line (BOL) for more details.
|
DML
|
Data Manipulation Language (DML) is used to retrieve and manipulate data. See SQL Books On Line (BOL) for more details.
|
ELM Advisor
|
ELM Advisor is a Windows Notification Area icon which provides a non-intrusive way for Administrators to be notified of changing conditions in their environment. For more information see ELM Advisor.
|
ELM Console
|
ELM Console refers to the snap-in that resides in a Microsoft Management Console and is the primary user interface for the product. Each snap-in can connect to multiple ELM Servers, and the ELM Console stand alone snap-in can be co-mingled with other MMC snap-ins to provide single-seat administration.
|
ELM Editor
|
ELM Editor refers to a report creation tool that can build Editor reports. Reports can be generated both on an ad hoc basis and at periodic intervals, and then output as a web archive file (.mht), e-mailed, or stored in the ELM database.
|
ELM Server
|
ELM Server is comprised of several engines that handle tasks such as creating and maintaining a database for data storage, archiving and reporting, managing Agents and Agent licensing, processing Event Filters, and executing Notification Methods.
|
ELM Server Database
|
ELM Server Database contains data collected from Agents, System Configuration, Inventory and when configured, ELM Server diagnostic events.
|
Event Filter
|
Filters look for matches in messages received by the ELM Server. Messages include Windows event log records, ELM Monitor Items, Syslog messages, or SNMP traps.
|
Event View
|
Event Views use one or more Event Filters to display some or all events. You can associate one or more Event Filters to filter what events are displayed.
|
Events
|
An event is a single record from a Windows event log, an SNMP trap,or a Syslog message.
|
IP Virtual Agents
|
IP Virtual Agents are non-Windows workstations and servers (e.g., Unix, Linux, appliances, etc.) and TCP/IP-based devices (routers, switches, hubs) that send messages to the ELM Server, and/or can be pinged by the ELM Server.
|
MIB Browser
|
MIB Browser, or SNMP OID Selector, provides a user-friendly method for importing and browsing MIB files in ELM. It is found in the properties of SNMP Alarm and SNMP Collector Monitor Items.
|
Monitor Items
|
Monitor Items determine the type of information or activity to monitor. Examples include Event Collector (which collects events), Service Monitor (which watches the state of Windows services), and Performance Collector (which gathers performance counter values).
|
Notification Methods
|
Notification Methods control the message and how it is is delivered to you. They're triggered by events and have thresholds which can protect you from being flooded by notifications.
|
Quality of Service (QoS)
|
Quality of Service deals with response time thresholds. Many Monitor Items include quality of service monitoring that enables you to generate warning events or take corrective action when an Agent, TCP port or TCP/IP-based application does not respond within the quality of service threshold.
|
Receiver
|
An SNMP trap receiver and a Syslog message receiver can be added as monitor items. The SNMP receiver can collect, filter and archive SNMP traps with and without SNMP Object IDs. The Syslog receiver can receive both TCP and UDP Syslog messages.
|
Report Section
|
Report section refers to different areas of an ELM Editor report. Each area displays the results of a single SQL query. Results can be displayed in graphical or textural style.
|
Service Agents
|
Service Agents execute Monitor Items, collect data, transmit collected data to the ELM Server, and execute the configured Actions for assigned Monitor Items. Service Agents are required in order to monitor event logs, health and performance and other subsystems in real-time.
|
SMTP Monitors
|
ELM Monitor used to monitor SMTP gateway services. See Monitoring for information about the SMTP Monitor.
|
SNMP Agent
|
An SNMP Agent is not one of the ELM Agent types. It is part of the SNMP protocol and exposes management data on the managed system.
|
Software License Agreement
|
You should receive a Software License Agreement (SLA) with your purchase. The SLA provides details on your license agreement, and includes your registration information. If you did not receive an SLA with your purchase, or if you cannot locate your SLA, please contact Sales@TNTSoftware.com
|
TNT Agent
|
Agents are the fundamental component for identifying the devices to be monitored.
|
TNTKEY
|
TNTKEY is a small text file that can be used to activate the ELM Server. Requires a valid ELM Serial Number.
|
Virtual Agents
|
Virtual Agents are used for agentless monitoring. Nothing is installed on the system being monitored when it is configured as a Virtual Agent. Virtual Agents are one of two types: Windows (workstations and servers), or TCP/IP-based (computers and network devices). TCP/IP-based agents are known as IP Virtual Agents. The actual monitoring functions for a Virtual Agent execute within the ELM Server Process so Virtual Agents cannot monitor in real-time.
|
Wizard
|
Wizards take the administrator or end-user step-by-step through the creation of a new object in ELM. Wizards are launched whenever new object creation is invoked from within the ELM Console.
|
WMI
|
WMI is based on the Common Information Model adopted by the Distributed Management Task Force. WMI is a key component of Microsoft Windows management services, and an integral part of Windows Operating System.
|
|