Getting Started

The main window and menu optimizes the network management, configuration management, fault management, and performance management capabilities of WhatsUp Gold.

The steps for managing your network and application infrastructure with WhatsUp Gold include:

Step-by-Step Guide

When managing your network infrastructure, host devices, and virtual devices in WhatsUp Gold, the typical workflow includes:

Step 1: Discover devices on your network

Run a discovery scan associated with initial credential types.

  • Discover devices based on IP address.
  • Batch discover using an IP address to walk network segments.

Step 2: Promote discovered devices to managed devices (enable device-level monitoring)

Step 3: Set up monitors

  • View current monitors for a selected device in Monitor Setup.
  • Select select or 'bulk select' devices and switch on individual monitor types.
  • Associate new custom monitors with device profiles.
  • Add individual and specialized monitors and credential sets as needed.

Step 4: View detailed reports and summaries of device statistics and status

  • View charts and data.
  • Create network operations dashboards.
  • Schedule periodic distribution of stakeholder charts, reports, and service level collateral.

Step 5: Create user roles, policies, chains of notification, and automate corrective actions for handling network, device, and application alerts and events.

See Also

Welcome to WhatsUp Gold

Configuring the WhatsUp Gold Application

Network Monitoring with WhatsUp Gold

Using the WhatsUp Gold Console Application

Configuration Management

Traffic Analysis

Logging and Reporting

Using Built in and Custom Dashboards

JMX Browser

CPU Threshold

Disk Threshold

Interface Threshold

Interface Errors and Discard Threshold

Memory Threshold

Ping Availability Threshold

Ping Response Time Threshold

SNMP Trap Threshold

Syslog Threshold

Hyper-V Event Threshold

VMware Threshold

Blackout Summary Threshold

Failover Threshold

WhatsUpHealth Threshold

Conversation Partners Threshold

Network Traffic Analyzer Custom Threshold

Failed Connections

Interface Traffic Threshold

Top Sender/Receiver

Access Point CPU Threshold

Access Point Memory Threshold

Banned Client MAC Threshold

Device Over Subscription Threshold

Excessive Rogue Threshold

Rogue Access Point MAC Address Threshold

Rogue Hidden SSID Threshold

Rogue Specific SSID Threshold

Rogue Unknown SSID Threshold

Wireless Access Point RSSI Threshold

SMS Action Notification

SMS Direct Notification

Email Notification

Manage Notification Policies

Visualize Escalation Schedule

Blackout Policies

Example: On Call Rotation

Choosing Business Hours

Define a Date Range

Enable WhatsVirtual Event Listeners (VMware)

WUG17.0N-WV-Enable WhatsVirtual Event Listeners (Hyper-V)

Visualize, Print, Share, and Export

Emailing Reports and Logs

Exporting Report Data

Printing reports and logs

Share Reports

Interface Report Settings

WUG17.0N-EMBEDDED-Column Sort and Picker

WUG17.0N-Filter Row and Search

Network Traffic Report Settings