WhatsUp Gold combines monitoring with powerful alerting, notification, and policy mechanisms to keep network infrastructure, services, and applications running smoothly and stakeholders informed whenever issues arise. WhatsUp Gold ensures network administrators and managers have 360-degree visibility, actionable intelligence, and complete control to make smarter decisions faster.

WhatsUp Gold can monitor, report, alert, and take action based on the status of network devices, host systems, and services. To start, it discovers and reports on any connected assets within minutes, while leveraging several detection techniques and a comprehensive library to manage credential types.

The latest version of WhatsUp Gold enable you to discover, manage, and explore WhatsUp Gold-discovered and WhatsUp Gold-monitored devices, visually, either as a network map, or a device table, or both. The map and table work together to provide status at a glance and quick drill down into device details when you need to know more than just operating state and basic attributes.

See Also

New features in this version of WhatsUp Gold

Evaluation Quick Start

Navigating the WhatsUp Gold User Interface

Getting Started

Running Discovery

Device Management

Network Environment Monitoring

Application Monitoring with WhatsUp Gold

Configuration Management

Network Traffic Analysis

Applying System Tasks

WhatsUp Gold Settings

Local Access of Settings and Controls (WhatsUp Gold Console)

Administering Users and User Groups

Global SMTP Settings

SMS Providers

SMS Provider Details

Select computer

Email Active Monitor Advanced Properties

Tools: Layer 2 Trace

IP/MAC Address Finder

Using Email Notification Message Settings

Select a Device

Select a Home Device Group

Welcome Guided Tour

Setting LDAP or Cisco ACS credentials

Percent Variables

Discovery Percent Variables

Alert Center Percent Variables

Setup Actions for Passive Monitors

Monitoring Application Performance

Configure Monitors - Windows Event Log settings

SNMP MIB Browser dialog

Passive Monitor Properties

Rescan Options

JMX Browser

OS Library

CPU Threshold

Custom Threshold

Disk Threshold

Interface Threshold

Interface Errors and Discard Threshold

Memory Threshold

Ping Availability Threshold

Ping Response Time Threshold

Windows Event Log Threshold

SNMP Trap Threshold

Syslog Threshold

Hyper-V Event Threshold

VMware Threshold

Blackout Summary Threshold

Failover Threshold

WhatsUpHealth Threshold

Conversation Partners Threshold

Network Traffic Analysis Custom Threshold

Failed Connections

Interface Traffic Threshold

Top Sender/Receiver

Network Traffic Analysis-Dark Web (Tor) Threshold

Access Point CPU Threshold

Access Point Memory Threshold

Banned Client MAC Threshold

Device Over Subscription Threshold

Excessive Rogue Threshold

Rogue Access Point MAC Address Threshold

Rogue Hidden SSID Threshold

Rogue Specific SSID Threshold

Rogue Unknown SSID Threshold

Wireless Access Point RSSI Threshold

Wireless Clients Bandwidth Threshold

SMS Action Notification

SMS Direct Notification

Email Notification

Manage Notification Policies

Visualize Escalation Schedule

Blackout Policies

Example: On Call Rotation

Scheduled Reports Library

System Status and Properties

Choosing Business Hours

Define a Date Range

Enable Virtual Monitoring Event Listeners (VMware)

Enable Virtual Monitoring Event Listeners (Hyper-V)

Visualize, Print, Share, and Export

Emailing Reports and Logs

Exporting Log and Report Data

Printing reports and logs

Share Reports

Interface Report Settings

Column Sort and Picker

Filter Row and Search

Network Traffic Report Settings

Scheduling maintenance

Network Interfaces

Add/Edit Network Interface

Browse Active Directory

Test LDAP Credentials

Dashboarding, Reporting, and Logging

Copyright notice