SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Lecture 12:
Monitoring &
Remotely Accessing
Systems
Network Design & Administration
Monitoring vs. Accessing
• Administrators have great power, so must use
  judiciously.
• Can change permissions, change ownership
  etc., so can silently examine drives on remote




                                                   Network Design & Administration
  machines while users still logged on.
• Can monitor actions, usage of
  resources, processes.
• Do not have time to watch everything!
                                                           2
Historical vs. Real-time
monitoring
• Historical monitoring summarises information
  over a time period:
  • Essential for an organisation that is trying to
    understand and improve its performance.




                                                      Network Design & Administration
  • Indicates need for upgrades.
  • Justifies spend.
• Real-time monitoring looks at the current/recent
  situation:
  • Used to understand problem/issue.
                                                              3
  • Generates a relatively quick action/response.
Monitoring User Machines
• Monitoring may imply high level, light touch:
  • How much printing is a user doing?
  • How close are they getting to their disk quotas?
• May also imply detailed management checking:




                                                          Network Design & Administration
  • What are they actually storing on disk?
  • How active at the computer actually are they?
• May be needed for security:
  • Are there a lot of failed attempts to log in at one
    particular machine?                                           4
Monitoring Servers
• Need to catch potential problems before they
  cause delays/inconvenience.
• Question: What sort of problems?
  • Running out of disk or disk faults.




                                                 Network Design & Administration
  • Memory leaks we want to programs.
 Question: why dodue to faultymonitor servers?
  • Network limitations.
  • Dead services/daemons meaning tasks not
    performed.
  • General resource shortages.                          5
How to monitor or check
machines
• There are a number of ways as:
  • Use Microsoft Management Console locally.
  • Physically log on at user machine.




                                                Network Design & Administration
  • Remote log in.
  • Use MMC addressing other machine.
  • Use log entries/audit trails/real-time
    monitoring.

                                                        6
Microsoft Management
Console
• Already encountered this when looking at users and
  computers.
• Provides a central point of management for different objects
  and resources.
• Can start via “admin tools”.




                                                                 Network Design & Administration
• Alternatively, can use the MMC (mmc.exe) and include a snap-
  in (e.g. gpedit.msc)
• MMC can also be redirected to another machine.




                                                                         7
Physically logging in
• Can be inconvenient to both user and admin.
• Sometimes necessary.
  • e.g. if network card has died.




                                                    Network Design & Administration
• More often used when helping a particular user.
• Sometimes users prefer local presence.
• Can be costly…
• Is there an alternative?

                                                            8
Remote Log in
• A better solution!
• Use Remote Desktop to remotely log into a client
  machine.
• Particularly used for monitoring servers, which may
  be in remote locations.




                                                        Network Design & Administration
• Uses Remote Desktop Services at target machine
  and client program (Remote Desktop Connection) at
  admin’s desktop machine.
• Needs to be set up at both ends.
• Question: Can you think of why this is a good thing
  to do?
• Question: Can you think of any potential problems?            9
Client-side remote desktop
access
• Can simply be set up
  from System
  properties
• By default,




                             Network Design & Administration
  Administrator group
  members are granted
  remote access
  permission
• Additional users can
  be added                   10
Remote Desktop Services
• Previously called Terminal Services in pre-Windows Server 2008
  editions.
• Allows clients to use server as if it were their PC.
            [2]
                                                          [1]




                                                                       Network Design & Administration
                  [3]




• Questions:
  • Why would you want to use a single machine?
  • What benefits would it provide?
  • Are there any special considerations for the server to take into   11
    account?
Configuring Server side remote
desktop services




                                 Network Design & Administration
                                 12
Remotely accessing a Unix
server
• Not all servers will be running Windows Server.
• A number of companies and universities use Unix/Linux
  within their workplace.
• Could be setup to provide roles:




                                                          Network Design & Administration
   • DNS
   • Web Server
   • File Server
   • Print Server
   • (Pretty much everything Windows Server can offer)
• Question: How do we remotely administer and maintain    13
  them?
Monitoring the Server
• Servers are important!
• Need to constantly monitor the health of a server
  because of its mission critical nature.
• Things to monitor:




                                                            Network Design & Administration
   • Processor (usage & temperature)
   • Disk (performance, usage, throughput)
   • Memory (utilisation, page file etc.)
   • Network
• To monitor server, best to start from a baseline.
• Baselines can change over time with the addition of new   14
  hardware & software.
Monitoring via the Event
Viewer
• Accessed from
  “Administration Tools”
  menu.
• Should be looked at




                           Network Design & Administration
  regularly. This needs
  to be part of a
  procedure (come back
  to this in a future
  lecture)
• Event viewer can also
                           15
  access event logs on a
  remote machine.
Event Logs
• Application – about specific programs, depends
  on what developers decided to log.
• System – about components e.g. device driver
  fail to load, or service fail to start.




                                                      Network Design & Administration
• Security – e.g. failed logons, attempts to access
  protected resources. Entries ONLY turn up if
  explicitly set up – none by default.
• Additionally - domain controllers, DNS servers
  have extra logs specific to them.
                                                      16
Event Types




 [4]




       Network Design & Administration
17
Event Properties




     Network Design & Administration
18
Real time monitoring
• Task Manager gives live real-time information
   • Processor and memory.
   • Applications and processes.




                                                   Network Design & Administration
   • Network Utilisation.
   • Users connected to a system.
• Can only be used to view information for local
  system (though can use remote desktop – but
  what is problem then?)
• Has no logging capability.                       19
Performance Console
• Snap ins to display real-time data, record over time, and
  execute actions when trigger values reached.
• System Monitor displays default of:
  • Memory: Pages per Sec




                                                              Network Design & Administration
  • Physical Disk: Average Disk Queue Length
  • Processor: % Processor Time
• Do not monitor too many/too often – generate system
  overheads.
• Do not monitor too infrequently or could miss spikes.

                                                              20
Performance Console




     Network Design & Administration
21
Performance Logs & Alerts
• Counter Log
  • Capture stats for specified counters to log file for
    later analysis.
• Trace Logs




                                                           Network Design & Administration
  • Records information about system apps when
    certain events occur.
• Alerts
  • Perform action when counter reaches specified
    value.
                                                           22
References
Next Time …
• C# programming.

References




                                                                      Network Design & Administration
[1] http://www.dell.com/uk/business/p/poweredge-m910/pd
[2] http://www.wyse.com/products/hardware/thinclients/S10/index.asp
[3] http://www.dell.com/uk/business/p/precision-desktops
[4] MOAC 290 Chapter 3



                                                                      23

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Computing Conf 1209
Cloud Computing Conf 1209Cloud Computing Conf 1209
Cloud Computing Conf 1209mandeepdhami
 
Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Ron_Roberts
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Securitydkaya
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1 Novell
 
BP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health CheckBP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health CheckLuis Guirigay
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-labDPA
 
Got Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckGot Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckLuis Guirigay
 
Imran Zahid Hussain Dalvi
Imran Zahid Hussain DalviImran Zahid Hussain Dalvi
Imran Zahid Hussain DalviImran Dalvi
 
CEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features ImpactCEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features Impactsthirion
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Microsoft TechNet
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds
 

Was ist angesagt? (17)

Deployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccmDeployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccm
 
Cloud Computing Conf 1209
Cloud Computing Conf 1209Cloud Computing Conf 1209
Cloud Computing Conf 1209
 
Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 
Best of Microsoft Management Summit 2012
Best of Microsoft Management Summit 2012Best of Microsoft Management Summit 2012
Best of Microsoft Management Summit 2012
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Should You Consider Virtual Desktops
Should You Consider Virtual DesktopsShould You Consider Virtual Desktops
Should You Consider Virtual Desktops
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1
 
BP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health CheckBP103 - Got Problems? Let's Do a Health Check
BP103 - Got Problems? Let's Do a Health Check
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
Got Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckGot Problems? Let's Do a Health Check
Got Problems? Let's Do a Health Check
 
Imran Zahid Hussain Dalvi
Imran Zahid Hussain DalviImran Zahid Hussain Dalvi
Imran Zahid Hussain Dalvi
 
CEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features ImpactCEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features Impact
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012
 

Ähnlich wie Lecture 12 monitoring the network

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experienceWiliam Ferraciolli
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating SystemRashmi Bhat
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup Ricoh India Limited
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and designYeonki Choi
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013Olav Tvedt
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...eG Innovations
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)diaryinc
 
Embedded systems introduction
Embedded systems introductionEmbedded systems introduction
Embedded systems introductionmohamed drahem
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...xKinAnx
 

Ähnlich wie Lecture 12 monitoring the network (20)

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
Ch 2
Ch 2Ch 2
Ch 2
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
OS_MD_1.pdf
OS_MD_1.pdfOS_MD_1.pdf
OS_MD_1.pdf
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
Embedded systems introduction
Embedded systems introductionEmbedded systems introduction
Embedded systems introduction
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...
 
Domain Controller.pptx
Domain Controller.pptxDomain Controller.pptx
Domain Controller.pptx
 
Case mis ch04
Case mis ch04Case mis ch04
Case mis ch04
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
 

Mehr von Wiliam Ferraciolli (20)

Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 

Lecture 12 monitoring the network

  • 1. Lecture 12: Monitoring & Remotely Accessing Systems Network Design & Administration
  • 2. Monitoring vs. Accessing • Administrators have great power, so must use judiciously. • Can change permissions, change ownership etc., so can silently examine drives on remote Network Design & Administration machines while users still logged on. • Can monitor actions, usage of resources, processes. • Do not have time to watch everything! 2
  • 3. Historical vs. Real-time monitoring • Historical monitoring summarises information over a time period: • Essential for an organisation that is trying to understand and improve its performance. Network Design & Administration • Indicates need for upgrades. • Justifies spend. • Real-time monitoring looks at the current/recent situation: • Used to understand problem/issue. 3 • Generates a relatively quick action/response.
  • 4. Monitoring User Machines • Monitoring may imply high level, light touch: • How much printing is a user doing? • How close are they getting to their disk quotas? • May also imply detailed management checking: Network Design & Administration • What are they actually storing on disk? • How active at the computer actually are they? • May be needed for security: • Are there a lot of failed attempts to log in at one particular machine? 4
  • 5. Monitoring Servers • Need to catch potential problems before they cause delays/inconvenience. • Question: What sort of problems? • Running out of disk or disk faults. Network Design & Administration • Memory leaks we want to programs. Question: why dodue to faultymonitor servers? • Network limitations. • Dead services/daemons meaning tasks not performed. • General resource shortages. 5
  • 6. How to monitor or check machines • There are a number of ways as: • Use Microsoft Management Console locally. • Physically log on at user machine. Network Design & Administration • Remote log in. • Use MMC addressing other machine. • Use log entries/audit trails/real-time monitoring. 6
  • 7. Microsoft Management Console • Already encountered this when looking at users and computers. • Provides a central point of management for different objects and resources. • Can start via “admin tools”. Network Design & Administration • Alternatively, can use the MMC (mmc.exe) and include a snap- in (e.g. gpedit.msc) • MMC can also be redirected to another machine. 7
  • 8. Physically logging in • Can be inconvenient to both user and admin. • Sometimes necessary. • e.g. if network card has died. Network Design & Administration • More often used when helping a particular user. • Sometimes users prefer local presence. • Can be costly… • Is there an alternative? 8
  • 9. Remote Log in • A better solution! • Use Remote Desktop to remotely log into a client machine. • Particularly used for monitoring servers, which may be in remote locations. Network Design & Administration • Uses Remote Desktop Services at target machine and client program (Remote Desktop Connection) at admin’s desktop machine. • Needs to be set up at both ends. • Question: Can you think of why this is a good thing to do? • Question: Can you think of any potential problems? 9
  • 10. Client-side remote desktop access • Can simply be set up from System properties • By default, Network Design & Administration Administrator group members are granted remote access permission • Additional users can be added 10
  • 11. Remote Desktop Services • Previously called Terminal Services in pre-Windows Server 2008 editions. • Allows clients to use server as if it were their PC. [2] [1] Network Design & Administration [3] • Questions: • Why would you want to use a single machine? • What benefits would it provide? • Are there any special considerations for the server to take into 11 account?
  • 12. Configuring Server side remote desktop services Network Design & Administration 12
  • 13. Remotely accessing a Unix server • Not all servers will be running Windows Server. • A number of companies and universities use Unix/Linux within their workplace. • Could be setup to provide roles: Network Design & Administration • DNS • Web Server • File Server • Print Server • (Pretty much everything Windows Server can offer) • Question: How do we remotely administer and maintain 13 them?
  • 14. Monitoring the Server • Servers are important! • Need to constantly monitor the health of a server because of its mission critical nature. • Things to monitor: Network Design & Administration • Processor (usage & temperature) • Disk (performance, usage, throughput) • Memory (utilisation, page file etc.) • Network • To monitor server, best to start from a baseline. • Baselines can change over time with the addition of new 14 hardware & software.
  • 15. Monitoring via the Event Viewer • Accessed from “Administration Tools” menu. • Should be looked at Network Design & Administration regularly. This needs to be part of a procedure (come back to this in a future lecture) • Event viewer can also 15 access event logs on a remote machine.
  • 16. Event Logs • Application – about specific programs, depends on what developers decided to log. • System – about components e.g. device driver fail to load, or service fail to start. Network Design & Administration • Security – e.g. failed logons, attempts to access protected resources. Entries ONLY turn up if explicitly set up – none by default. • Additionally - domain controllers, DNS servers have extra logs specific to them. 16
  • 17. Event Types [4] Network Design & Administration 17
  • 18. Event Properties Network Design & Administration 18
  • 19. Real time monitoring • Task Manager gives live real-time information • Processor and memory. • Applications and processes. Network Design & Administration • Network Utilisation. • Users connected to a system. • Can only be used to view information for local system (though can use remote desktop – but what is problem then?) • Has no logging capability. 19
  • 20. Performance Console • Snap ins to display real-time data, record over time, and execute actions when trigger values reached. • System Monitor displays default of: • Memory: Pages per Sec Network Design & Administration • Physical Disk: Average Disk Queue Length • Processor: % Processor Time • Do not monitor too many/too often – generate system overheads. • Do not monitor too infrequently or could miss spikes. 20
  • 21. Performance Console Network Design & Administration 21
  • 22. Performance Logs & Alerts • Counter Log • Capture stats for specified counters to log file for later analysis. • Trace Logs Network Design & Administration • Records information about system apps when certain events occur. • Alerts • Perform action when counter reaches specified value. 22
  • 23. References Next Time … • C# programming. References Network Design & Administration [1] http://www.dell.com/uk/business/p/poweredge-m910/pd [2] http://www.wyse.com/products/hardware/thinclients/S10/index.asp [3] http://www.dell.com/uk/business/p/precision-desktops [4] MOAC 290 Chapter 3 23