 WhatsUp Gold Language Help
 Introduction to WhatsUp Gold
 Welcome
 New features
 Evaluation Quick Start
 User interface
 WhatsUp Gold Live
 Device list
 Searching WhatsUp Gold
 Getting Started
 Getting help and additional information
 Discovery
 Getting the Most from Your Scan
 Discovering Virtual Devices
 Discover VMware Hosts Managed by vCenter
 Discover Standalone VMware Hosts
 Discover Hyper-V Hosts
 Credentials for Top-Down Discovery
 Ensure SNMP/WMI Capability on Monitored Devices
 Cloud-based Wireless LAN Controllers
 Discovering Storage Devices
 Installing the SMI-S Agent for use with WhatsUp Gold
 Initiating a Discovery Scan
 Hosts File Format
 Handling Shared Addresses (Merge Devices)
 Typical Uses of Shared Addressing
 Device Merge Reason Categories
 Exclude a List of IP Addresses
 Using Saved Discovery Scan Settings
 Adding Discovered Devices (to MY NETWORK)
 Device Roles
 About Device Roles
 Device Roles (Detecting Categories)
 Fit Default Roles with Custom Monitors
 Create a Custom Device Role
 Clone a Device Role
 Refine Scan Rules
 Check Logic Between Rule Groups
 Roles/Sub Roles Library
 Roles/Sub Roles New/Edit Wizard
 General Settings
 Building Rule Sets for Device Detection
 Device Scan Rules
 Querying Infosets
 Associated Roles
 Associated Sub Roles
 Attributes
 Monitors
 Filter Library
 Add/Edit an Interface Filter
 Configuration Management Tasks
 Credentials
 Working with credentials
 Available Credentials
 SNMPv1
 SNMPv2
 SNMPv3
 Windows
 ADO
 Telnet
 SSH
 VMware
 JMX
 SMI-S Credential
 Installing the SMI-S Agent for use with WhatsUp Gold
 Monitoring Dell Compellent Storage Environments
 Monitoring Dell EMC Storage Environments
 AWS Credential
 Creating AWS Access Keys
 Azure Credential
 Create an Application Access Key with the Azure Management Portal
 Azure Tenant Credential Fields
 Meraki Cloud Credential
 Generating a Meraki API Key
 REST API Credential
 Ubiquiti
 Tips for applying credentials
 Creating credentials
 Assigning credentials
 Maps
 Discovered Network
 My Network
 Icons and annotations
 Map filtering
 Device information cards
 Addressing Web Alarms
 Creating links between devices
 Customizing your map view
 Devices
 Device Status
 Device Properties Panel
 Device Management Actions
 Device Groups
 Device Group Management Actions
 Monitors
 Monitor Types
 Assigning Monitors
 Critical Active Monitors
 Active Monitors
 Active Script (Active)
 APC UPS (Active)
 BGP Peer Status
 Cloud Resource Monitor
 DNS
 Email
 Exchange 2003
 Exchange
 Fan
 File Content
 File Properties
 Folder
 FTP
 HTTP Content
 JMX (Active)
 Meraki Device Status Active Monitor
 Network Statistics
 Ping
 Ping Interarrival Jitter
 Power Supply
 PowerShell
 Printer
 Process
 REST API (Active)
 Service
 SMI-S
 SNMP Extended
 SNMP (Active)
 SQL Query (Active)
 SQL Server
 SSH (Active)
 SSL Certificate
 Storage Controller Health monitor
 Storage File System
 Storage Disk Drives
 Storage LUN
 Storage Pool
 TCPIP
 Script Syntax
 Telnet
 Temperature
 VoIP
 WAP Radio
 WMI Formatted
 WMI
 Set Polling Properties
 Using Action Policies
 Implicit Action Policy
 Passive Monitors
 Syslog
 Windows Event Log
 SNMP Trap
 Performance Monitors
 Active Script (Performance)
 Using Reference Variables with Script Monitors
 APC UPS (Performance)
 AWS CloudWatch (Performance)
 How to monitor billing and usage using the AWS Cloudwatch Performance Monitor
 Azure Cloud (Performance)
 Azure Cloud (Billing and Usage)
 CPU Utilization (Performance)
 PowerShell Scripting
 Disk Utilization (Performance)
 Printer Ink/Toner Performance Monitor
 Hyper-V Virtual Machine Disk Activity
 JMX (Performance)
 Interface Utilization
 Memory Utilization (Performance)
 Ping Latency and Availability
 REST API (Performance)
 SNMP (Performance)
 SQL Query (Performance)
 SSH (Performance)
 VMware Datastore IOPS
 Windows Performance Counter
 Configuring WMI Formatted Counter monitors
 WMI Performance Monitor
 Hyper-V Event Log Monitor
 Hyper-V Host Virtual Machines Monitor
 Rules Expression Editor
 Dashboards
 Dashboard Creation
 NOC Views and Custom Dashboards
 Dashboards
 Home Dashboard
 Overview
 Device Status
 Alert Center
 User Permissions Dashboard
 WhatsUp Gold Live Activity
 Performance
 TOP 10
 CPU Utilization
 Disk Utilization
 Memory Utilization
 Custom Performance Monitor
 Predictive Trending Report
 Network
 Interface Utilization
 Ping Availability (Packet Loss)
 Ping Response Time
 Interface Errors
 Interface Discards
 Interface Traffic
 Device
 Active Monitor Availability
 Active Monitor Outages
 Alert Center Items
 Devices in Maintenance
 Device Health
 Device Uptime
 Device Utilization Summary report
 Down Active Monitors
 Down Interfaces
 Monitors Applied
 Quarterly Availability Summary
 State Change Acknowledgment Report
 State Change Timeline
 Device State Summary
 Web Alarms
 Alerts and Actions
 Actions Applied Log
 Alert Center
 Alert Center Log View
 Inventory
 Asset Inventory
 Asset Details Report
 Refresh Summary Report
 Installed Software
 Address Summary Report
 IP/MAC Addresses Report
 Device Connectivity
 Switch Port Utilization
 VLAN View
 Subnet View
 Computer Systems
 BIOS
 Software Updates
 Windows Services
 Logs
 Tools
 Application Monitoring
 Application Monitoring
 Configuration Management
 Configuration Archives
 Log Management
 Log Management Dashboard
 Log Viewer (Full Page Report)
 Log Management Server Status
 Virtual Monitoring
 Virtual Monitoring
 Wireless
 Wireless Monitoring
 Rogues Dashboard
 Traffic Analysis
 Traffic Analysis Dashboard
 NTA Home Dashboard
 NTA Senders and Receivers
 NTA Troubleshooting
 Traffic Overview
 Critical Activity
 Storage Monitoring
 Unclassified Traffic
 Alerts and Actions
 Applying Thresholds, Alerts, Notification Schedules, and Action Policies
 Creating Alerts
 Built-in Action Types
 Active Script Action
 Beeper Action
 E-mail Action
 Post To IFTTT Action
 Log to Text File Action
 OpsGenie Alert Management Action
 Pager Action
 Post To Slack Action
 PowerShell Action
 Program Action
 Service Restart Action
 ServiceNow Incident Creation Action
 SMS Action
 SMS Direct action
 SNMP Set Action
 Sound Action
 SSH Action
 Syslog action
 Text to Speech Action
 VMware Action
 Web Alarm Action
 WhatsConfigured Action
 Windows Event Log Action
 Guidelines for Creating Action Policies
 Creating Actions and Action Policies
 Recurring Action Library
 Adding and editing a Recurring Action
 Configuring Actions and Alerts
 Thresholds Library
 CPU Threshold
 Configuring a CPU Utilization Threshold
 Custom Threshold
 Configuring a Custom Performance Monitor Threshold
 Disk Utilization Threshold
 Configuring a Disk Utilization Threshold
 Log Management Filter Frequency Threshold
 Configuring a Log Management Filter Frequency Threshold
 Interface Threshold
 Configuring an Interface Utilization Threshold
 Interface Errors and Discard Threshold
 Configuring Interface Errors and Discards Threshold
 Memory Threshold
 Configuring a Memory Utilization Threshold
 Ping Availability Threshold
 Configuring a Ping Availability Threshold
 Ping Response Time Threshold
 Configuring a Ping Response Time Threshold
 SNMP Trap Threshold
 Configuring an SNMP Trap Threshold
 Windows Event Log Threshold
 Configuring a Windows Event Log Threshold
 Syslog Threshold
 Configuring a Syslog Threshold
 Hyper-V Event Threshold
 Configuring a Hyper-V Threshold
 VMware Threshold
 Configuring a VMWare Threshold
 Blackout Summary Threshold
 Configuring a Blackout Summary Threshold
 Failover Threshold
 Configuring a Failover Threshold
 WhatsUpHealth Threshold
 Configuring a WhatsUp Health Threshold
 Conversation Partners Threshold
 Configuring a Conversation Partners Threshold
 Network Traffic Analysis Custom Threshold
 Configuring a Network Traffic Analyzer Custom Threshold
 Failed Connections
 Configuring a Failed Connections Threshold
 Interface Traffic Threshold
 Configuring an Interface Traffic Threshold
 Top Sender/Receiver
 Configuring a Top Sender/Receiver Threshold
 Suspicious Connections Threshold
 Configuring Suspicious Connections Threshold
 Access Point Memory Threshold
 Configuring a Wireless Memory Utilization threshold
 Access Point CPU Threshold
 Configuring a Wireless CPU Utilization threshold
 Device Over Subscription Threshold
 Configuring a Wireless Access Point Over Subscription Threshold
 Excessive Rogue Threshold
 Using Alert Center Notification Policy options
 Configuring a Wireless Excessive Rogues Threshold
 Rogue Access Point MAC Address Threshold
 Configuring a Wireless Rogue Access Point MAC Address Threshold
 Rogue Hidden SSID Threshold
 Configuring a Wireless Rogue Hidden SSID Threshold
 Rogue Specific SSID Threshold
 Configuring a Wireless Rogue Specific SSID Threshold
 Rogue Unknown SSID Threshold
 Configuring a Wireless Rogue Unknown SSID Threshold
 Wireless Access Point RSSI Threshold
 Configuring a Wireless Access Point RSSI Threshold
 Wireless Clients Bandwidth Threshold
 Configuring a Wireless Client Bandwidth Threshold
 Notifications Library
 Notification Policies
 Notification Blackout Policies
 Blackout Policies
 Add/Edit Blackout Policy
 Example: On Call Rotation
 Reports
 Reporting Performance, Inventory, and Uptime
 Reporting Quick Start
 Application Monitoring
 Application Event Log
 Application State Summary
 Running Action Policy Report
 Instance Summary
 Hourly Availability Over Time
 Custom Content
 Custom Links
 Devices
 Active Monitor Availability
 Attributes
 Current Device States
 Dependencies
 Device Active Monitor States
 Device Custom Links
 Group Status
 Device Information and Status
 Device SNMP Details
 Devices in Maintenance
 Enabled Active Monitors
 Interface Details
 WhatsUp Gold Live Activity
 Map View
 Monitors Applied
 Notes
 Performance Monitor Summary
 Device State Summary
 SNMP Details
 Active Monitor Outages
 Alert Center Items
 Device Uptime
 Device Health
 Start vs. Run
 Log Management
 Log Activity
 Log Management Server Status
 Log Source Statistics
 Top 10 Devices with Critical Windows Security Events
 Top 10 Devices with Critical Windows Application Events
 Top 10 Devices with Critical Windows System Events
 Top 10 Devices with Critical Syslog Issues
 Network Traffic
 Working with NTA reports using the world map
 Receivers
 Top Receivers
 Top Receiver ASN
 Top Receiver Cities
 Top Receiver Domains
 Top Receiver Groups
 Top Receiver TLDs
 Top Receivers with the Most Conversation Partners
 Top Receivers with the Most Failed Connections
 Top Receiver Countries
 Senders
 Top Senders
 Top Sender ASN
 Top Sender Cities
 Top Sender Domains
 Top Sender Groups
 Top Sender TLDs
 Top Senders with the Most Conversation Partners
 Top Senders with the Most Failed Connections
 Top Sender Countries
 Top Cities
 Top Conversations Between Cities
 Interface Usage
 NBAR Applications - Flow Details
 NBAR Applications - Interface Totals
 NTA Types of Services (ToS)
 Suspicious Connections Report
 Packet Size Distribution
 Top Ports
 Top Protocols
 Top Applications
 Top Conversations
 Top Endpoint Groups
 Top Endpoints
 ICMP Types
 Top Interfaces by Traffic
 Top Interfaces by Utilization
 Top Sources with Interfaces
 Traffic Totals
 Unclassified Traffic
 Class-Based QoS Usage
 Performance
 CPU Utilization
 Custom Performance Monitor
 Device Utilization Summary report
 Disk Free Space
 Disk Utilization
 Interface Discards
 Interface Errors
 Interface Traffic
 Interface Utilization
 Memory Utilization
 Ping Availability (Packet Loss)
 Ping Packet Loss
 Ping Response Time
 System Info
 Inventory
 Virtual
 Host List
 Virtual Server
 Virtual Host Attributes
 Virtual Machine Attributes
 Asset Inventory
 Installed Software
 Device Connectivity
 Switch Port Utilization
 VLAN View
 Subnet View
 Computer Systems
 BIOS
 Software Updates
 Windows Services
 Warranty Information
 Element Count
 Total Actions Applied by Type
 Active Monitors by Type
 Devices by Type
 Devices with a Specific Attribute
 Total Devices by Role
 Passive Monitors by Type
 Total Performance Monitors by Type
 NTA
 Archive Database Size
 Database Size
 Database Table Usage
 Poller Health
 Network Coverage
 Device Role Composition
 Troubleshooting
 Specific Device
 State Change Timeline
 Down Active Monitors
 Down Interfaces
 Interface Discards
 Interface Errors
 Interface Errors and Discards
 Quarterly Availability Summary
 Tail of Action Activity Log
 Tail of Passive Monitor Error Log
 Tail of SNMP Trap Log
 Tail of Syslog
 Tail of Windows Event Log
 Web Alarms
 Actions Fired
 Completely Down Devices
 Device Group Mini Status
 Down Active Monitors
 Devices with Down Critical Monitors
 Down Interfaces
 Summary Counts
 State Change Acknowledgment Report
 Tail of Action Activity Log
 Tail of Passive Monitor Error Log
 Tail of SNMP Trap Log
 Tail of State Change Log
 Tail of Syslog
 Tail of Windows Event Log
 Unacknowledged Devices
 Down Active Monitors
 Users
 Device Access Rights
 Device Group Access Rights
 User Device Group Access Rights
 Virtual Reporting
 Virtual Machines CPU Utilization
 Virtual Machines Disk Activity
 Virtual Machines Interface Utilization
 Virtual Machines Memory Utilization
 VMware Virtual Machines Datastore IOPS
 VMware Device Datastore IOPS
 Wireless Reporting
 Wireless Bandwidth Utilization
 Bandwidth Summary
 Wireless CPU Utilization
 Client Count
 Wireless
 Wireless Memory Utilization
 RSSI
 Rogue Count
 Signal to Noise Ratio
 Wireless System Summary
 Wireless Clients
 Wireless Clients: Specific Client
 Wireless Session Details
 Client Bandwidth
 Client Associations
 Wireless Client Session Details
 Wireless Client Signal Quality
 Wireless Client Bandwidth (Specific Client)
 Free Form Text/HTML
 Alerts
 Device Thresholds
 Threshold Summary
 Remote System Info
 Remote Group List
 Remote Site Overview
 Remote Sites Licensing Usage
 Remote Site List
 Remote Sites Status
 Remote Sites Error Log
 Remote Environment Reporting
 Action Activity Log (Remote)
 Active Monitor States (Remote)
 CPU Utilization (Remote)
 Custom Performance Monitor (Remote)
 Disk Free Space (Remote)
 Disk Utilization (Remote)
 Interface Traffic (Remote)
 Interface Utilization (Remote)
 Memory Utilization (Remote)
 Ping Availability & Packet Loss (Remote)
 Ping Response Time (Remote)
 Summary Counts (Remote)
 Viewing Performance Real Time
 RealTime Performance Monitor Report
 Logs
 About Logs
 Logging Quick Start
 Survey of Frequently Used Logs
 Consolidated Logs
 Action Log
 Activity Log
 Alert Center Log View
 Blackout Summary Log
 Scan History
 General Error Log
 Hyper-V Event Log
 Logger Health Messages
 Passive Monitor Error Log
 Performance Monitor Error Log
 Policy Audit
 Recurring Action Log
 Scheduled Report Log
 SNMP Trap Log
 Syslog
 VMware Event Log
 Web User Activity Log
 Windows Event Log
 Network Traffic Analyzer Logs
 NTA Log
 Unclassified Traffic
 Applications State Change Log
 APM-Resolved Items Log
 Log Management
 About Log Management
 Configure a Log Source
 Log Management Settings
 Creating filters
 Configuring a Log Management Filter Frequency Threshold
 Log Management Dashboard
 Log Viewer (Full Page Report)
 Archived Logs
 WhatsUp Gold Agents
 WhatsUp Gold Agent Overview
 Important Considerations and Planning for WhatsUp Gold Agent Deployment and Usage
 About Using Agents with the Log Management Database
 Configuring WhatsUp Gold Agent General Settings
 About the Certificate Common Name
 Deploying a WhatsUp Gold Agent to a log data source
 Wireless
 Monitoring Wireless
 Mapping Wireless
 Wireless Settings
 Global Wireless Settings
 Wireless Client Groups
 Wireless Excluded Rogues
 Virtual
 Monitoring Virtual
 Mapping Virtual
 Virtual Settings
 Applications
 Monitoring Applications
 Application Monitoring Terminology
 Application Profile Library
 Preparing to Monitor Applications
 Discovering Applications
 Mapping Applications
 Working with Application Profiles
 Working with Monitored Applications
 Components, Critical Component Groups, and Discrete Applications
 Cloud Monitoring for Azure
 Cloud Monitoring for AWS
 CPU Utilization
 Database Query
 Disk Utilization
 File Content
 HTTP Content Check
 Interface Statistics
 JMX Performance Check
 Memory Utilization
 Network Port Check
 Process Check
 REST API Active (Application)
 REST API Performance (Application)
 Scripting (PowerShell)
 Scripting (End User Monitor)
 About iDrone (EUM Poller) and using EUM Components
 Configuring iDrone (EUM Poller)
 Using iMacros with End User Monitor (EUM) Components
 Service Check
 SNMP
 SSH
 WMI
 Windows Performance Counter
 About Critical Component Groups
 About Action Policies, Actions, and Blackout Policies and WhatsUp Gold Application Monitoring
 Application Monitoring Actions
 Application Monitoring Blackout Policies
 Application Monitoring Action Policies
 Configuring an Application Monitoring Action Policy
 Application Attributes
 Application Monitoring Settings
 Cloud (AWS/Azure/Meraki)
 Monitoring Cloud-Managed Devices
 Network Traffic Analysis
 Start Analyzing Your Network!
 Before You Begin
 Check for Active Sources
 Check for Ready-to-Configure Sources
 What is Flow Data?
 NTA Features and Advantages
 Choosing NTA Sources
 Credentials Used for Network Traffic Analysis
 Configuring and Enabling Collection on Sources
 Enable and View Flow Collection Status
 NTA Sources Library
 View, Edit, Delete, and Enable Flow Sources
 Edit Flow Source Properties
 Edit Interface Properties
 Add NBAR Source
 Get SNMP Traffic Totals
 Scope User Access to NTA Traffic Data
 NTA Data Quick Access
 Browse, Configure, and Enable Potential Netflow Sources
 Remotely Configure Cisco Netflow Device
 Configure Flow Export on Source Devices
 Configure Flow Export
 Configure sFlow Export on HP Devices
 Configuring Flexible NetFlow on a Cisco Device
 Configuring NetFlow for Meraki
 Configuring NetFlow for Aruba
 Creating Aggregate Sources
 Grouping Traffic
 Classifying Traffic by Port Number (NTA Applications)
 Collector Database Maintenance
 Reduce and Analyze Traffic with Advanced Filtering
 IP Reputation Library
 Listener Port, Collection, and Retention Settings
 Configuration Management
 Configuration Management
 Configuration Management System Overview
 Using Task Scripts
 Using the Configuration Management Task Script Library
 Creating and Editing a Task Script
 Configuring Custom Task Scripts
 Importing and Exporting Task Scripts
 Debugging Task Scripts
 Run Now
 Using Tasks
 Task Library
 Configuring Password Tasks
 Configuring Schedulable Tasks
 Assigning a Task to a Device
 Running a Task Immediately
 Using Device Properties
 Viewing Configuration Management in Device Properties
 Associating Tasks with Devices
 Viewing Archived Configuration Files
 Comparing Archived Configuration Files
 Modifying Archived Configuration Files
 Importing Archived Configuration Files
 Exporting Archived Configuration Files
 Removing Tasks from Devices
 Restoring Archived Configurations
 Deleting Archived Configuration Files
 Using Policies
 Configuration Management Policy Library
 Configuring a Configuration Management policy
 Auditing a policy
 Viewing Archive Policy Audit Results
 Using Configuration Management Templates
 Capture and Add Templates
 Generating and Applying Templates
 Importing and Exporting Templates
 Using the Template Library
 Leveraging and Customizing System Scripts
 System Script Library
 Configuring System Scripts
 Importing and Exporting System Scripts
 Managing CLI and Remote Shell Settings
 CLI Settings Library
 CLI Settings Profile
 Configuring CLI settings
 Importing and exporting CLI settings
 Remote Client Settings
 Archive Search
 Understanding Configuration Archives
 Performing an Archive Search
 Configuration Archive Search Result
 Applying Regular Expressions
 Pattern Range (IP Address)
 Pattern Exclusion
 Using the Configuration Management VLAN Manager
 Configuring VLAN trunks
 Writing Custom VLAN Scripts
 Setting Log Expiration
 Configuration Management Settings
 Tools
 Using Tools in WhatsUp Gold
 Connecting directly to a monitored device through the WhatsUp Gold interface
 Settings
 WhatsUp Gold Settings
 Using the Top Menu Navigation Admin Features
 System Services
 System Settings
 Scheduling Activities
 Accessing WhatsUp Gold Libraries
 Customizing web alarm behavior
 Applying System Tasks
 Using WhatsUp Gold System Tasks
 Changing Log Persistance Settings
 MIBs
 Manage SNMP MIBs
 View MIB Definitions
 Import MIB Definitions
 Handling MIB Syntax or Dependency Errors
 Users and User Groups
 Administering Users and User Groups
 Device Group Access Rights
 Managing User Accounts and User Groups
 Adding New User and User Rights
 Password Expiration and Retry Policies
 Admin Console
 Local Access of Settings and Controls (WhatsUp Gold Console)
 Using Device Types
 About Device Properties - General
 About Device Properties - Menus
 Adding a Menu Item
 Operating WhatsUp Gold in FIPS 140-2 Mode
 Using WhatsUp Gold Database Utilities
 Configuring File Transfer Settings
 Importing Trap Definitions
 Monitoring VoIP IP SLA
 Scalability Pollers
 Poller Configuration
 Using Scalability Pollers with WhatsUp Gold
 Installing the Scalability Poller Application on a Remote Machine
 Configuring Scalability Pollers in WhatsUp Gold
 Using Scalability Pollers with Failover and Distributed
 Failover
 About WhatsUp Gold Failover Edition
 Configuring Failover Options
 About the WhatsUp Gold Failover Console
 Distributed
 About WhatsUp Gold Distributed Edition
 Configuring WhatsUp Gold Distributed Edition
 Copyright notice
|