Device Properties panel () is the central management/information point for any single managed device. It's the interface you leverage when bulk operations or group information (report data, for example) are not appropriate for your management task. Use Device Properties to apply changes, troubleshoot, and check configuration properties for any single device.
Device Configuration. Control how your device is monitored, managed, and represented within the WhatsUp Gold environment. Monitors. Browse, apply, and configure passive, active, and performance monitors to this device.
Tip: You now have the ability to specify the protocol by which WhatsUp Gold collects CPU, Disk, Memory, and Interface utilization data from the device. From the Monitors tab, select the applicable monitor, click , then select the desired protocol for collecting performance data at the top of the configuration dialog. Learn MoreTip: In WhatsUp Gold, a given device is considered to be in a down state if it has either a critical monitor down or all monitors down. Polling. Adjust polling interval, target address, and dependency chain.
Tip: If you need to apply a shorter poller interval either temporarily, or for troubleshooting performance, consider using the RealTime Performance monitor. Note: In WhatsUp Gold, a given device is considered to be in a down state if it has either a critical monitor down or all monitors down
Actions. Send notifications, log events, chain together corrective actions and apply escalation rules. When you apply active monitors, you typically associate an action and a device state with changes observed by the monitor. There are three main categories of built-in action types available through the Actions Library. Actions can be triggered or scheduled. Note: Certain actions (CM Actions, for example) can be invoked on demand (Run Now). Built-in action types include:
Notifications
Remote/Local Script or Execution
Log
Credentials. View and associate built-in credential types with this device. (Needed for rich discovery and monitoring information.) Credentials Library provides the following credential types: Network Management. Simple Network Management Protocol (SNMPv1, SNMPv2, SNMPv3).
System Attributes and Instrumentation. Windows, VMware, SSH (typically used for Linux and UNIX).
Remote Execution. Secure Shell client (SSH), Telnet client.
Storage Device Management. Storage Management Initiative Specification (SMI-S). Cloud. Amazon Web Services (AWS), Azure. Tip: Most active monitors that include scripting (PowerShell, for example) have the ability to apply credential sets as part of remote processing (before and during the active session). Learn MoreAbout Credentials. Tips for Applying Credentials. Tip:: Most active monitors that include scripting (PowerShell, for example) have the ability to apply credential sets as part of remote processing (before and during the active session). Attributes. User-defined, role-defined, and other properties uncovered during discovery that describe the device. Attributes panel enables you to view device system and host descriptions, modify some of this information, and populate user defined attributes (such as Contact Information).
Tip: Attribute values can be auto populated using Device Role definitions. You can also customize Device Attributes using discovery percent variable syntax. Roles. Browse, apply, and template the model applied to this device for discovery, role determination, and default monitor scheme. Primary Role. Consider these roles as candidates for the current role definition during discovery/rescan. Select a generalized role class to apply. Your role will inherit default characteristics from this class such as discovery attributes and default monitors that you can modify if appropriate. Sub Roles. Add sub roles to consider for discovery/rescan. Select a generalized sub role to apply (given your Scan Rules).
Learn MoreTip: You can customize roles and subroles using the Roles/Subroles Editor. Inventory. (Information only) Tables of system-specific, host, OS, chasis and layer 2 connectivity and merge data reported by the selected device when discovered/rescanned. Inventory provides complete views of the device management information.
Links. User-defined or role-associated URLs associated with the selected device. Define a custom link and apply it to the discovered device. You can customize for each device using discovery percent variable syntax.
Note: Custom Links can be tabulated and distributed as Custom Link reports. ExamplesAdd link for viewing web role or web service running on current device.
Add link to manage vCenter using vSphere web client.
Tasks. Manage and run scheduled Configuration Management tasks as well as modify and compare archived configuration records assigned to the selected device. Tasks enable you to apply controls, perform maintenance, and simulate user behavior, based on your site policies and goals. Learn MoreTypical Tasks Tip: For more details on how to build Scheduled Tasks and Password Tasks, see the section titled Configuration Management. |
||||||||||||||||||||||||||||||||||
System Status and Properties. View host properties, device role classification and status information.
|
||||||||||||||||||||||||||||||||||
Device Picker, Actions, and Status Reports. Apply operations, get status, and troubleshoot network connectivity for this device.
|
Tip: Tabs displayed in the device center are dependent upon the device role and information gathered during discovery and do not appear if not applicable to the selected device.
See Also Managing and Assigning Monitors |