Welcome to WhatsUp Gold
Navigating the WhatsUp Gold User Interface
Working with the My Network Map
Working with the Discovered Network Map
Working with the Device List
Searching WhatsUp Gold
Getting Started
Device Management
Running Discovery
Getting the Most from Your Scan
Initiating a Discovery Scan
Promoting Discovered Devices
Using Saved Discovery Profiles
Working with Credentials
SMI-S Credential
Windows (WMI) for Hyper-V
AWS Credential
Azure Credential
Tips for Applying Credentials
Creating Credentials
Assigning Credentials
Grouping Devices
Managing and Assigning Monitors
Active Monitors
Active Script (Active)
APC UPS (Active)
Cloud Resource Monitor
Degraded Array
Exchange 2003
File Content
File Properties
HTTP Content
JMX (Active)
Network Statistics
NT Service
Ping Interarrival Jitter
Power Supply
SNMP Extended
SNMP (Active)
SQL Query (Active)
SQL Server 2000
SSH (Active)
SSL Certificate
WAP Radio
WMI Formatted
Set Polling Properties
Using Action Policies
Implicit Action Policy
Passive Monitors
Windows Event Log
Performance Monitors
Active Script (Performance)
Using Reference Variables with Script Monitors
APC UPS (Performance)
CPU Utilization (Performance)
PowerShell Scripting
Disk Utilization (Performance)
Printer (Performance)
Hyper-V Virtual Machine Disk Activity
JMX (Performance)
Memory Utilization (Performance)
Ping Latency and Availability
SNMP (Performance)
SQL Query (Performance)
SSH (Performance)
VMware Datastore IOPS
Windows Performance Counter
Configuring WMI Formatted Counter monitors
WMI Performance Monitor
Hyper-V Event Log Monitor (Built-in)
Hyper-V Host Virtual Machines Monitor
Creating Alerts
Thresholds Library
Notifications Library
Notification Policies
Notification Blackout Policies
Applying Thresholds, Alerts, Notification Schedules, and Action Policies
Built-in Action Types
Active Script Action
Beeper Action
E-mail Action
Log to Text File Action
Pager Action
PowerShell Action
Program Action
Service Restart Action
SMS Action
SMS Direct action
SNMP Set Action
Adding and editing a Sound Action
SSH Action
Syslog action
Text to Speech Action
VMware Action
Web Alarm Action
Configuration Management Action
Windows Event Log Action
Guidelines for Creating Action Policies
Recurring Action Library
Adding and editing a Recurring Action
Poller Configuration
Using Scalability Pollers with WhatsUp Gold
Installing the Remote Poller Application
Configuring Remote Pollers in WhatsUp Gold
WhatsUp Gold Settings
System Services
System Settings
Manage SNMP MIBs
Import MIB Definitions
Handling MIB Syntax or Depedency Errors
View MIB Definitions
Scheduling Activities
Administering Users and User Groups
Configuring Actions and Alerts
Accessing WhatsUp Gold Libraries
Scheduling Activities
Configuring Application Monitoring-specific Settings
Configuration Management Settings
Network Traffic Analysis Settings
Configuring Virtual-specific Settings
Configuring Wireless-specific Settings
Configuring Global Wireless Settings
Managing Wireless Client Groups
Managing Wireless Excluded Rogues
Customizing the My Network Map
Using the Top Menu Navigation Admin Features
Getting Help and More Information
Network Environment Monitoring
Viewing Devices on the Map
Viewing Information Cards
Device Properties View
About Device Roles
Viewing Device Status
Viewing Device Monitor Setup
Manually connecting devices on the map
Performing Device Management Actions
Using Tools in WhatsUp Gold
Application Monitoring with WhatsUp Gold
Understanding WhatsUp Gold Application Monitoring Terminology
Preparing to Monitor Applications
Working with Application Profiles
Working with Application Instances
Working with Components and Component Groups
CPU Utilization
Database Query
Disk Utilization
File Content
HTTP Content Check
Interface Statistics
JMX Performance Check
Memory Utilization
Network Port Check
Process Check
Scripting (PowerShell)
Scripting (End User Monitor)
About iDrone (EUM Poller) and using EUM Components
Configuring iDrone (EUM Poller)
Using iMacros with End User Monitor (EUM) Components
Service Check
Windows Performance Counter
Working with Discrete Applications
About Action Policies, Actions, and Blackout Policies and WhatsUp Gold Application Monitoring
Working with Application Attributes
Monitoring Wireless
Monitoring Virtual Machines and Infrastructure
Monitoring VoIP IP SLA
Addressing Web Alarms
Applying System Tasks
Using WhatsUp Gold System Tasks
Changing Log Persistance Settings
Using the WhatsUp Gold Console Application
About Device Role Settings
Operating WhatsUp Gold in FIPS 140-2 Mode
Using WhatsUp Gold Database Utilities
Configuring File Transfer Settings
Importing Trap Definitions
Configuration Management
CM System Overview
Using Task Scripts
Using the Configuration Management Task Script Library
Creating and Editing a Task Script
Configuring Custom Task Scripts
Importing and Exporting Task Scripts
Using Tasks
Task Library
Configuring Password Tasks
Configuring Schedulable Tasks
Assigning a Task to a Device
Running a Task Immediately
Using Device Properties
Viewing Configuration Management in Device Properties
Associating Tasks with Devices
Viewing Archived Configuration Files
Comparing Archived Configuration Files
Modifying Archived Configuration Files
Importing Archived Configuration Files
Exporting Archived Configuration Files
Removing Tasks from Devices
Restoring Archived Configurations
Deleting Archived Configuration Files
Using Policies
CM Policy Library
Configuring a Configuration Management policy
Auditing a policy
Viewing Archive Policy Audit Results
Using Configuration Management templates
Capture and Add Templates
Generating and Applying Templates
Importing and Exporting Templates
Leveraging and Customizing System Scripts
System Script Library
Configuring System Scripts
Importing and Exporting System Scripts
Managing CLI and Remote Shell Settings
CLI Settings Library
CLI Settings Profile
Configuring CLI settings
Importing and exporting CLI settings
Remote Client Settings
Archive Search
Understanding Configuration Archives
Performing an Archive Search
Configuration Archive Search Result
Applying Regular Expressions
Pattern Range (IP Address)
Pattern Exclusion
Using the Configuration Management VLAN Manager
Configuring VLAN trunks
Setting Log Expiration
Network Traffic Analysis
NTA System Overview
NTA System Requirements
NTA Quick Start
Choosing NTA Sources
Configuring and Enabling Collection on Sources
Enable and View Flow Collection Status
NTA Sources Library
View, Edit, Delete, and Enable Flow Sources
Edit Interface Properties
Add NBAR Source
Get SNMP Traffic Totals
Scope User Access to NTA Traffic Data
Access NTA Data Views
Browse, Configure, and Enable Potential Netflow Sources
Remotely Configure Cisco Netflow Device
Configure Flow Export on Source Devices
Configure Flow Export
Configure sFlow Export
Configuring Flexible NetFlow on a Cisco device
Aggregating Sources
Grouping Traffic
Classifying Traffic by Port Number
Adding Custom Labels for Type of Service (ToS) IDs
Listener Port, Collection, and Retention Settings
Collector Database Maintenance
Reduce and Analyze Traffic with Advanced Filtering
Dashboarding, Reporting, and Logging
Using Built in and Custom Dashboards
Home Dashboard
Device Status
Alert Center
Application Monitoring
Network Traffic Analysis Dashboards
NTA Home Dashboard
NTA Senders and Receivers
NTA Troubleshooting
Predictive Trending Report
Virtual Monitoring
Traffic Overview
Wireless Monitoring
Unclassified Traffic
TOP 10
Rogues Dashboard
Quarterly Availability Summary
Reporting Performance, Inventory, and Uptime
Device Thresholds
Threshold Summary
Application Event Log
Application State Summary
Running Action Policy Report
Instance Summary
Hourly Availability Over Time
Custom Content
Custom Links
Free Form Text/HTML
Active Monitor Availability
Device Custom Links
Interface Details
Monitors Applied
Performance Monitor Summary
Device Health
Start vs. Run
State Change Acknowledgment Report
Device State Summary
Group Status
Map View
SNMP Details
Device Information and Status
Network Traffic
Top Receivers
Top Receiver ASN
Top Receiver Cities
Top Receiver Domains
Top Receiver Groups
Top Receiver TLDs
Top Receivers with the Most Conversation Partners
Top Receivers with the Most Failed Connections
Top Senders
Top Sender ASN
Top Sender Cities
Top Sender Domains
Top Sender Groups
Top Sender TLDs
Top Senders with the Most Conversation Partners
Top Senders with the Most Failed Connections
Interface Usage
NBAR Applications - Flow Details
NBAR Applications - Interface Totals
NTA Types of Services (ToS)
Packet Size Distribution
Top Applications
Top Endpoint Groups
Top Endpoints
ICMP Types
Top Interfaces by Traffic
Top Interfaces by Utilization
Top Sources with Interfaces
Traffic Totals
Unclassified Traffic
Class-Based QoS Usage
CPU Utilization
Custom Performance Monitor
Disk Free Space
Disk Utilization
Interface Discards
Interface Errors
Interface Traffic
Interface Utilization
Memory Utilization
Ping Availability
Ping Packet Loss
Ping Response Time
System Info
Host List
Virtual Server
Virtual Host Attributes
Virtual Machine Attributes
Asset Inventory
Installed Software
Device Connectivity
Switch Port Utilization
Computer Systems
Software Updates
Windows Services
Warranty Information
Element Count
Total Actions Applied by Type
Active Monitors by Type
Devices by Type
Devices with a Specific Attribute
Total Devices by Role
Passive Monitors by Type
Total Performance Monitors by Type
Database Size
Database Table Usage
Poller Health
Specific Device
State Change Timeline
Down Active Monitors
Down Interfaces
Interface Discards
Interface Errors
Interface Errors and Discards
Quarterly Availability Summary
Tail of Action Activity Log
Tail of Passive Monitor Error Log
Tail of SNMP Trap Log
Tail of Syslog
Tail of Windows Event Log
Web Alarms
Actions Fired
Completely Down Devices
Device Group Mini Status
Devices with Down Active Monitors
Devices with Down Critical Monitors
Down Interfaces
Summary Counts
Tail of Action Activity Log
Tail of Passive Monitor Error Log
Tail of SNMP Trap Log
Tail of State Change Log
Tail of Syslog
Tail of Windows Event Log
Unacknowledged Devices
Down Active Monitors
Virtual Reporting
Virtual Machines CPU Utilization
Virtual Machines Disk Activity
Virtual Machines Interface Utilization
Virtual Machines Memory Utilization
VMware Virtual Machines Datastore IOPS
VMware Device Datastore IOPS
Wireless Reporting
Wireless Bandwidth Utilization
Bandwidth Summary
Wireless CPU Utilization
Client Count
Wireless Memory Utilization
Rogue Count
Signal to Noise Ratio
Wireless System Summary
Wireless Rogue Setting
Wireless Clients
Wireless Clients: Specific Client
Wireless Session Details
Client Bandwidth
Client Associations
Using Logs
Searching, Sorting, and Reducing
Finding the Best Logger for the Task
Log Library
Action Log
Actions Applied Log
Activity Log
Actions Activity Log
Blackout Summary Log
Discovery Scan Log
General Error Log
Hyper-V Event Log
Logger Health Messages
Passive Monitor Error Log
Performance Monitor Error Log
Policy Audit
Recurring Action Log
Scheduled Report Log
SNMP Trap Log
Task Log
VMware Event Log
Web User Activity Log
Windows Event Log
Alert Center Log View
Network Traffic Analysis Logs
Unclassified Traffic
Applications State Change Log
APM-Resolved Items Log
Copyright notice