Glossary of Terms

Active Directory

Active Directory is a directory service used to store information about the network resources across a domain. Its main purpose is to provide central authentication and authorization services for Windows based computers. An Active Directory structure is a hierarchical framework of objects. The objects fall into three broad categories: resources (e.g. printers), services (e.g. e-mail) and users (user accounts and groups). The AD provides information on the objects, organizes the objects, controls access and sets security.

The VSA can reference information stored in Active Directory during a LAN Watch. Subsequently, agents can be automatically installed on machines using View AD Computers. Using View AD Users, agents can be automatically installed on each machine a AD user logs onto. Also the latest user contact information can be extracted from Active Directory and applied to the machine ID an AD user is currently logged onto. This provides VSA administrators with up-to-date contact information automatically.

Administrator Roles

Administrators can belong to none, one, or more administrator roles. If an administrator is assigned to multiple roles, and any one of those assigned roles provides access to a function, then the administrator has access to that function. The following policies are assigned by administrator role:

In addition, scripts and agent installation packages can be shared by administrator role. Standard administrators can only see other administrators who are members of the same roles.

Administrators

Administrators use the VSA application to maintain the KServer and oversee the monitoring of managed machines by the KServer and its agents. KServer management configuration and other specialized functions can only be performed by master administrators. Standard administrators are typically restricted to the administration and monitoring of managed machines. A background of two alternating shades of beige designates master administrators. A background of two alternating shades of grey designates standard administrators. Access to functions, machine groups and other policies are assigned by administrator role. Standard administrators can only see other administrators who are members of the same roles.

Agent Menu

The set of options that display when the user right-clicks the agent icon in the system tray of the managed machine. The agent menu can be customized.

Agent Settings

To provide both flexibility and automation, the VSA enables you to specify different values for the following types of agent settings on a per machine basis:

Agents

The VSA manages machines by installing a software client called an agent on a managed machine. The agent is a system service that does not require the user to be logged in for it to function and it does not require a reboot for it to be installed. The agent is configurable and can be totally invisible to the user. The sole purpose of the agent is to carry out the tasks requested by the IT administrator. Once installed:

Agents - Macintosh

Agents can be installed on Mac OS X version 10.3.9 and up. Both Intel and PowerPC platforms are supported. For Macintosh machines, the VSA supports:

See Deploying Macintosh Agents using Apple Remote Desktop.

Alarm

In graphical displays throughout the VSA, when an alarm condition exists, the VSA displays, by default, a red traffic light icon. If no alarm condition exists, a green traffic light icon displays. These icons can be customized.

Alarms, and other types of responses, are enabled using the following pages:

Alarm Condition

An alarm condition exists when a machine's performance succeeds or fails to meet a pre-defined criteria.

Alarms - Suspending

The Suspend Alarms page suppresses alarms for specified time periods, including recurring time periods. This allows upgrade and maintenance activity to take place without generating alarms. When alarms are suspended for a machine ID, the agent still collects data, but does not generate corresponding alarms.

Alert

Alerts are responses to alarm conditions. This differs from an audit, which simply collects selected data for reference purposes without regard to any criteria.

Alerts have two meanings, generic and specific:

Generic Alerts

Typically there are four types of alert responses to an alarm condition:

Defining an alert sets the ATSE response code for that machine ID or SNMP device.

Alerts are defined using:

Specific Alerts

The Alerts page enables you to quickly define alerts for typical alarm conditions found in an IT environment. For example, low disk space is frequently a problem on managed machines. Selecting the Low Disk type of alarm displays a single additional field that lets you define the % free space threshold. Once defined, you can apply this alarm immediately to any machine ID displayed on the Alerts page and specify the response to the alarm.

ATSE Response Code

Creating an alarm represents one of three ways to notify administrators of an alarm condition. The other two ways are to send an email or to create a ticket. In an addition, alarm conditions can run a script to automatically respond to the alarm condition. These four types of response are called the ATSE response code. Whether assigned to a machine ID, a group ID, or an SNMP device, the designation indicates which types of responses are active for the alarm condition defined.

None of the ATSE responses are required. The alarm condition and the ATSE responses, including no response, is reported to the Reports > Monitor > Monitor Action Log.

The same ATSE design applies to all methods of monitoring provided by the VSA.

Audit

Agents can be scheduled to automatically audit the hardware and software configurations of their managed machines on a recurring basis. Agents report the information back to the KServer so you can access it using the VSA even when managed machines are powered down. Audits enable you to examine configurations before they develop into serious problems. The system maintains three types of audits for each machine ID:

The VSA detects changes in a machines's configuration by comparing the latest audit to the baseline audit. The latest audit record is stored for as many days as you specify.

Most of the agent and managed machine data displayed by function pages and Reports are based on the latest audit. The Machine Changes report compares a machine ID's latest audit to a baseline audit. Two alert types specifically address changes between a baseline audit and the latest audit: Application Changes and Hardware Changes.

Auto Learn Monitor Sets

You can enable Auto Learn alarm thresholds for any standard monitor set you assign to selected machine IDs. This automatically fine-tunes alarm thresholds based on actual performance data on a per machine basis.

Each assigned machine collects performance data for a specified time period. During that time period no alarms are triggered. At the end of the auto learn session, the alarm threshold for each assigned machine is adjusted automatically based on the actual performance of the machine. You can manually adjust the alarm threshold values calculated by Auto Learn or run another session of Auto Learn again. Auto Learn cannot be used with individualized monitor sets.

Backup Sets

All files required for a full backup, including all incremental or differential backups, are saved together in a backup set.

Canonical Name

The primary name for an object in DNS. Each object can also have an unlimited number of aliases.

Chat

Online chat is a text-based, instant messaging system. It is included with the KServer primarily to provide immediate technical support. Administrator's can chat with users of managed machines and/or chat with other administrators currently logged on the same Kserver. Administrators can enable or disable the user's ability to initiate chat sessions with administrators. Since Kaseya chats are relayed through the KServer, all chats are protected by the Kaseya 256 bit rolling encryption protocol.

Check-in Status

These icons indicate the agent check-in status of each managed machine:

Agent has checked in

Agent has checked in and user is logged on. Tool tip lists the logon name.

Agent is currently offline

Agent has never checked in

Agent is online but waiting for first audit to complete

Agent is online but remote control is disabled

Agent has been suspended

Check-in: Full vs. Quick

A full check-in occurs when an agent completes the processing of any and all outstanding tasks assigned to it by the KServer. These tasks can include processing a script, posting cached log data, or refreshing the agent configuration file.A full checkin occurs if 24 hours elapses without a specific task requiring it. A quick check-in occurs when an account checks in at the configured check-in interval, indicating to the KServer that the machine ID is still online. This doesn't require the completion of all outstanding tasks. Some functions require a full check-in before an agent can begin processing a new task. For example, System -> Naming Policy.

Collection

Collections are a free-form selection of individual machine IDs within a view. It doesn't matter which groups the machine IDs belong to, so long as the administrator is authorized to have access to those groups. This enables the administrator to view and report on logical collections of related machine IDs, such as laptops, workstations, servers, MS Exchange Servers, etc. Collections are created using the Only show selected machine IDs checkbox in View Definitions. Save a view first before selecting machines IDs using this option. Once the view is saved, a <N> machines selected link displays to the right of this option. Click this link to display a Define Collection window, which allows you to create a view using a free-form selection of individual machine IDs.

Copy Settings and Templates

Machine ID templates are initially used to create an agent install package using the template as the source to copy settings from. But even after agents are installed on managed machines, you'll need to update settings on existing machine ID accounts as your customer requirements change and your knowledge of the VSA grows. In this case use Agent > Copy Settings to copy these changes to any number of machines IDs you are authorized to access. Be sure to select Do Not Copy for any settings you do not want to overwrite. Use Add to copy settings without removing existing settings. Kaseya recommends making changes to a selected template first, then using that template as the source machine ID to copy changes from. This ensures that your machine ID templates remain the "master repositories" of all your agent settings and are ready to serve as the source of agent install packages and existing machine ID accounts.

Credential

A credential is the logon name and password used to authenticate a user or process's access to a machine or network or some other resource. See Agent > Set Credentials.

Dashboard

The dashboard is a summary display of the status of the entire system. The dashboard's data is filtered by the Machine ID / Group ID filter. Navigation: Home > View Dashboard.

Dashboard List

The dashboard list is a summary display of the alarm statuses of all machines being monitored. The dashboard list's data is filtered by the Machine ID / Group ID filter. Navigation: Home > Dashboard List or Monitor > Dashboard List.

Distribute File

The Distribute File function sends files stored on your VSA server to managed machines. It is ideal for mass distribution of configuration files, such as virus foot prints, or maintaining the latest version of executables on all machines. The VSA checks the integrity of the file every full check-in. If the file is ever deleted, corrupted, or an updated version is available on the VSA, the VSA sends down a new copy prior to any script execution. Use it in conjunction with recurring scripts to run batch commands on managed machines.

Event Logs

An event log service runs on Windows operating systems (Not available with Win9x). The event log service enables event log messages to be issued by Window based programs and components. These events are stored in event logs located on each machine. The event logs of managed machines can be stored in the KServer database, serve as the basis of alerts and reports, and be archived.

Depending on the operating system, the event logs types available include but are not limited to:

The list of event types available to select can be updated using Monitoring > Update Lists by Scan.

Windows events are further classified by the following event log categories:

Event logs are used or referenced by the following VSA pages:

Events Sets

Because the number of events in Windows based events logs is enormous the VSA uses a record type called an event set to filter the triggering of alerts.

Event sets contain one or more conditions. Each condition contains filters for different fields in an event log entry. The fields are source, category, event ID, user, and description. An event log entry has to match all the field filters of a condition to be considered a match. A field with an asterisk character (*) means any string, including a zero string, is considered a match. A match of any one of the conditions in an event set triggers an alert on any machine that event set is applied to.

For details on how to configure event sets, see Monitor > Alerts > Event Logs > Edit Event Sets.

File Transfer Protocol (FTP)

File Transfer Protocol (FTP) is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol. The FTP server is the program on the target machine that listens on the network for connection requests from other computers. The FTP client is the program on the administrator's machine that initiates a connection to the server. The FTP client machine requires user access rights to the FTP server machine. It is included with the KServer primarily to provide immediate technical support. Once connected, the client can upload files to the server, download files from the server, rename or delete files on the server and so on. Any software company or individual programmer is able to create FTP server or client software because the protocol is an open standard. Virtually every computer platform supports the FTP protocol. Since Kaseya FTP sessions are relayed through the KServer, all FTP sessions are protected by the Kaseya 256 bit rolling encryption protocol.

Flood Detection

If 1000 events—not counting black list events—are uploaded to the KServer by an agent within one hour, further collection of events of that log type are stopped for the remainder of that hour. A new event is inserted into the log to record that collection has been suspended. A new event is inserted into the event log to record that collection was suspended. At the end of the hour, collection automatically resumes. This prevents short term heavy loads from swamping your KServer. Alarm detection and processing operates regardless of whether collection is suspended.

Global Event Log Black Lists

Each agent processes all events, however events listed on a "black list" are not uploaded to the VSA server. There are two black lists. One is updated periodically by Kaseya and is named EvLogBlkList.xml. The second one, named EvLogBlkListEx.xml, can be maintained by the service provider and is not updated by Kaseya. Both are located in the \Kaseya\WebPages\ManagedFiles\VSAHiddenFiles directory. Alarm detection and processing operates regardless of whether entries are on the collection blacklist.

Group Alarms

Alert, system check, and log monitoring alarms are automatically assigned to a group alarm category. If an alert alarm is triggered, the group alarm it belongs to is triggered as well. The group alarm categories for monitor sets and SNMP sets are manually assigned when the sets are defined. Group alarms display in the Group Alarm Status dashlet of the Monitor > Dashboard List page. You can create new groups using the Group Alarm Column Names tab in Monitor > Monitor Lists.

Host name

The text equivalent of an IP address. For example, the IP address 89.234.7.197 should resolve to the host name of www.kaseya.com. Host names are only available from computers. Hubs, switches, routers, or other network appliances do not return a host name.

Hotfix

Kaseya frequently posts hotfixes to correct small problems in the latest release. If the Enable automatic check box is checked in System > Configure, your VSA periodically checks for new only hotfixes at http://vsaupdate.kaseya.net. If any new hotfixes are available, the KServer automatically downloads and applies the hotfixes without any user interaction.

The hotfix mechanism addresses minor issues only, typically either cosmetic typos, or ASP page errors. The KServer, agents, or database schema are never updated via hotfixes. Any changes affecting system operation go into full product updates that you approve before installing. Hotfixes just correct minor issues without having to wait for the release cycle.

ISO Image

An ISO image (.iso) is a disk image of an ISO 9660 file system. ISO 9660 is an international standard originally devised for storing data on CD-ROM. In addition to the data files that are contained in the ISO image, the ISO image also contains all the filesystem metadata, including boot code, structures, and attributes. All of this information is contained in a single file. CD writers typically provide the option of writing an ISO file as an image when writing to a CD.

LAN Watch

LAN Watch uses an existing VSA agent on a managed machine to periodically scan the local area network for any and all new devices connected to that LAN since the last time LAN Watch ran. These new devices can be workstations and servers without agents or SNMP devices. Optionally, the VSA can send an alert when a LAN Watch discovers any new device. LAN Watch effectively uses the agent as a proxy to scan a LAN behind a firewall that might not be accessible from a remote server.

Log Monitoring

The VSA is capable of monitoring data collected from many standard log files. Log Monitoring extends that capability by extracting data from the output of any text-based log file. Examples include application log files and syslog files created for Unix, Linux, and Macintosh operating systems, and network devices such as Cisco routers. To avoid uploading all the data contained in these logs to the KServer database, Log Monitoring uses parser definitions and parser sets to parse each log file and select only the data you're interested in. Parsed messages are displayed in Log Monitoring, which can be accessed using Agent > Agent Logs > Log Monitoring or the Agent Logs tab of the Machine Summary page or by generating a report using Reports > Logs > Log Monitoring. Users can optionally trigger alerts when a Log Monitoring record is generated, as defined using Assign Parsing Sets or Parser Summary.

Logs

Logs collect event information about multiple systems, including the KServer. The different types of logs that can be generated are:

Note: Log Monitoring enables you to monitor the data generated by any text-based log.

MAC address

The unique media access control (MAC) identifier assigned to network adapter cards (NICs).

Machine ID / Group ID

Each agent installed on a managed machine is assigned a unique machine ID/group ID name. All machine IDs are associated with a group ID and optionally a subgroup ID. Typically a group ID represents a single customer account. Subgroup IDs typically represent a location or network within a group ID. For example, the full identifier for an agent installed on a managed machine could be defined as jsmith.acme.chicago. In this case chicago is a subgroup ID defined within the group ID called acme. Only a master administrator, or administrators authorized by a master administrator, can create group IDs. Any administrator can create subgroup IDs. Group IDs and subgroup IDs are created using the System > Machine Groups > Create/Delete page.

Machine ID / Group ID filter

The Machine ID / Group ID filter is available on all tabs and functions. It allows you to limit the machines displayed on all function pages. The View Definitions window lets you further refine a Machine ID / Group ID filter based on attributes contained on each machine—for example, the operating system type. Once filter parameters are specified, click the green arrow icon to apply filter settings to all function pages. By default, the Machine ID / Group ID filter displays all machine IDs in <All Groups> managed by the currently logged in administrator.

Note: Even if an administrator selects <All Groups>, only groups the administrator is granted access to using System > Group Access are displayed.

Machine ID Template

A machine ID template is a machine ID record without an agent. Since an agent never checks into a machine ID template account, it is not counted against your total license count. You can create as many machine ID templates as you want without additional cost. When an agent install package is created, the package's settings are copied from a selected machine ID template. Typically machine ID templates are created and configured for certain types of machine. Machine type examples include desktops, Autocad, Quickbooks, small business servers, Exchange servers, SQL Servers, etc. A corresponding install package can be created based on each machine ID template you define.

Machine IDs vs. Agents

When discussing agents it is helpful to distinguish between the machine ID / group ID and the agent. The machine ID / group ID is the VSA's user account name for a managed machine in its database. The agent is the client software installed on the managed machine. A one-to-one relationship exists between the agent on a managed machine and its machine ID / group ID account name on the VSA. Tasks assigned to a machine ID by a VSA administrator direct the agent's actions on the managed machine.

Managed Machine

A monitored machine with an installed agent and active machine ID/group ID account on the KServer. Each managed machine uses up one agent license.

Migrating the KServer

For the latest instructions on migrating an existing KServer to a new machine see the article How do I move my Kaseya Server to a new computer? (270436) in the Kaseya Support Knowledge Base Portal.

Monitor Sets

A monitor set is a set of counter objects, counters, counter instances, services and processes used to monitor the performances of machines. Typically, a threshold is assigned to each object/instance/counter, service, or process in a monitor set. Alarms can be set to trigger if any of the thresholds in the monitor set are exceeded. A monitor set should be used as a logical set of things to monitor. A logical grouping, for example, could be to monitor all counters and services integral to running an Exchange Server. You can assign a monitor set to any machine that has an operating system of Windows 2000 or newer.

The general procedure for working with monitor sets is as follows:

  1. Optionally update monitor set counter objects, instances and counters by source machine ID using Monitor > Update Lists by Scan.
  2. Optionally update monitor set counter objects, instances and counters manually and review them using Monitor Lists.
  3. Optionally update predefined sample monitor sets using System > Configure.
  4. Create and maintain monitor sets using Monitor > Monitor Sets.
  5. Assign monitor sets to machine IDs using Monitor > Assign Monitoring.
  6. Optionally customize standard monitor sets as individualized monitor sets.
  7. Optionally customize standard monitor sets using Auto Learn.
  8. Review monitor set results using:
Packager

The Packager is a wizard tool used to create a package when a pre-defined install solution cannot be used. Packager evaluates the state of a source machine before and after an installation and/or resource change. The Packager compiles the differences into a single executable file—the package—that can be distributed via scripts to any managed machine. Distribute a package any way you choose. You can email it, or store it on a server where a custom script can perform a silent installation on any managed machine.

Parser Definitions and Parser Sets

When configuring Log Monitoring it's helpful to distinguish between two kinds of configuration records: parser definitions and parser sets.

A parser definition is used to:

A parser set subsequently filters the selected data. Based on the values of populated parameters and the criteria you define, a parser set can generate log monitoring entries and optionally trigger alerts.

Without the filtering performed by the parser set, the KServer database would quickly expand. For example a log file parameter called $FileServerCapacity$ might be repeatedly updated with the latest percentage of free space on a file server. Until the free space is less than 20% you may not need to make a record of it in Log Monitoring, nor trigger an alert based on this threshold. Each parser set applies only to the parser definition it was created to filter. Multiple parser sets can be created for each parser definition. Each parser set can trigger a separate alert on each machine ID it is assigned to.

Patch Policy

Patch policies contain all active patches for the purpose of approving or denying patches. An active patch is defined as a patch that has been reported by a patch scan by at least one machine in the VSA. Any machine can be made a member of one or more patch policies.

For example, you can create a patch policy named servers and assign all your servers to be members of this patch policy and another patch policy named workstations and assign all your workstations to be members of this policy. This way, you can configure patch approvals differently for servers and workstations.

Patch Update Order

Service packs and patches are installed in the following order:

  1. Windows Installer
  2. OS related service packs
  3. OS update rollups
  4. OS critical updates
  5. OS non-critical updates
  6. OS security updates
  7. Office service packs
  8. Office update rollups
  9. All remaining Office updates

Note: Reboots are forced after each upgrade, service pack and at the end of each patch group without warning. This is necessary to permit the re-scan and installation of the subsequent groups of patches.

Performance Objects, Instances and Counters

When setting up counter thresholds in monitor sets, it's helpful to keep in mind exactly how both Windows and the VSA identify the components you can monitor:

Primary Domain Controller

Primary domain controllers have full access to the accounts databases stored on their machines. Only primary domain controllers run Active Directory.

Private, Shared or Public

Administrators can define many types of records within the VSA, then decide whether these records are private, shared or public. These types of records include scripts, reports, files, managed variables, and log file parser definitions. Private is the default and means only a single administrator has access to the record. Shared means selected administrators or administrator roles have access to the record. When a record is public, all administrators have access to the record. In some cases an administrator must "take ownership" of a public record to edit the record.

PSEXEC.EXE

PSEXEC.EXE is a light-weight telnet-replacement that lets you execute processes on other systems without having to manually install client software. It used by Agent > Install Agents to install agents on remote systems after a LAN Watch.

Quick Status

A Quick Status feature enables you to select any monitor set counter, service or process from any machine ID and add it to the same single display window. Using Quick Status, you can quickly compare the performance of the same counter, service or process on different machines, or display selected counters, services and processes from different monitor sets all within a single view. SNMP sets provide a similar Quick Status view for selected SNMP objects. Any Quick Status view you create exists only for the current session. The Quick Status window is accessed using Monitor > Dashboard > Monitoring Set Status, then clicking the Quick Status link or the Quick Status icon .

Sample Templates

The easiest method of assigning monitoring sets and event sets to machine IDs is to use the sample templates provided by Kaseya. Each sample template is an XML file defined for a certain type of machine, for example, Windows Server Basic.xml and Workstation XP.xml. Each sample template contains references to the appropriate set of sample monitor sets, sample event sets and sample scripts for that type of machine. These sample monitor sets, sample event sets and sample scripts, are loaded and updated automatically when you install the VSA, if enabled using System > Configure. Sample templates can be downloaded from the Kaseya Support Forum. Use Copy Settings to assign a set of sample monitor sets, sample event sets and sample scripts from a sample template to machine IDs.

To update monitoring of machine IDs using sample templates:

  1. Ensure sample monitor sets, sample events and sample scripts are enabled using System > Configure.
  2. Import the sample template using Agent > Import/Export.
  3. Copy monitor set assignments and event log alert assignments from the template to selected machine IDs using Agent > Copy Settings.
  4. Review sample monitor set assignments on target machine IDs using Monitor > Assign Monitoring.
  5. Review sample event log alert assignments on target machine IDs using Monitor > Alerts > Event Logs.

To customize monitoring using templates:

Silent Install

Silent installs, also called silent deploys, do not prompt the user for input. Silent installs may not require user input or else provide a typical configuration that serves the purposes of most users, or else provide command line parameters that enable users to configure the installation at execution. If an install does not support a silent install but still needs to be distributed automatically, administrators can use Packager to create a custom installation package. See Creating Silent Installs.

SNMP Community

An SNMP community is a grouping of devices and management stations running SNMP. SNMP information is broadcast to all members of the same communiity on a network. SNMP default communities are:

SNMP Devices

Certain network devices such as printers, routers, firewalls, servers and UPS devices can't support the installation of an agent. But a VSA agent installed on a managed machine on the same network as the device can read or write to that device using simple network management protocol (SNMP). Read/write instructions are communicated using a set of object variables. Collectively, the set of object variables made available by a device is called its Management Information Base or MIB. The objects within a MIB are therefore referred to as MIB objects.

Vendors typically provide a specific data file for each device called a MIB file. MIB files are used by monitoring systems such as the VSA to identify the MIB objects available on a device and the typical read or write values for each MIB object. The MIB file includes the "friendly name" associated with an object's ID number or OID number, enabling you to easily identify the object in SNMP sets.

SNMP Quick Sets

The SNMP Info link page displays a list of SNMP objects provided by the specific SNMP device you selected. These objects are discovered by performing a limited SNMP "walk" on all discovered SNMP devices each time a LAN Watch is performed. You can subsequently define device-specific SNMP sets called quick sets and associate alerts with these quick sets. Quick sets can be individualized for a single device. The standard version of the quick set can be shared with other administrators and applied to similar devices throughout the VSA. The prefix (QS) is used to distinguish quick set names from other kinds of SNMP sets.

  1. Discover SNMP devices using Monitor > LAN Watch.
  2. Assign SNMP sets to discovered devices using Monitor > Assign SNMP.
  3. Click the SNMP info link in the Assign SNMP page to display a list SNMP objects that apply to the specific SNMP device you selected.
  4. Display SNMP alarms using Monitor > SNMP Log or Dashboard List.
SNMP Sets

A SNMP set is a set of MIB objects used to monitor the performance of SNMP enabled network devices. The SNMP protocol is used because an agent cannot be installed on the device. You can assign alarm thresholds to any performance object in a SNMP set. If you apply the SNMP set to a device, you can be notified if the alarm threshold is exceeded. The following methods can be used to configure and assign SNMP sets to machine IDs.

Typically the following procedure is used to configure and apply SNMP sets to devices.

  1. Discover SNMP devices using Monitor > LAN Watch.
  2. Assign SNMP sets to discovered devices using Monitor > Assign SNMP. This can include quick, standard, individualized or auto learn SNMP sets.
  3. Display SNMP alarms using Monitor > SNMP Log or Dashboard List.

The following additional SNMP functions are available and can be used in any order.

SNMP Types

You can assign SNMP sets to devices by type automatically as follows:

  1. Add or edit SNMP types using the SNMP Device tab in Monitor > Monitor Lists.
  2. Add or edit the sysServicesNumber associated with SNMP types using the SNMP Services tab in Monitor > Monitor Lists. Broad categories of SNMP devices share the same sysServiceNumber.
  3. Associate a SNMP type with a SNMP set using the Automatic Deployment to drop-down list in Monitor > SNMP Sets > Define SNMP Set.
  4. Perform a LAN Watch. During a LAN Watch SNMP devices are automatically assigned to be monitored by SNMP sets if the SNMP device returns a sysServicesNumber associated with a SNMP type used by those SNMP sets.
  5. Manually assign a SNMP type to an SNMP device using Monitor > SNMP Type. Doing so causes SNMP sets using that same type to start monitoring the SNMP device.
Synthetic Backups

A synthetic full backup is created by consolidating existing incremental or differential backups with the previous full backup image. This is sometimes called an 'Incremental Forever Backup'. Unlike traditional full backups, synthetic full backups are not transferred from the local server to the offsite server. Instead, after the first full backup is transferred, only the incremental or differential files are transferred to the offsite server. A synthetic backup component on the offsite server recreates the next full synthetic backup in parallel with the local server. This eliminates the need to transfer full backups between the local server and offsite server. With synthetic backups, bandwidth requirements for transferring full backups are eliminated, but the offsite server's access to its own file server may need to be enhanced to handle the processing of its synthetic backups.

Configuring synthetic backups involves the following steps:

Note: The first three steps are required even if synthetic backups are not enabled on the offsite server.

  1. Install an agent on a local server. Typically the backup image locations of machine IDs being backed up point to the local server.
  2. Install an agent on the offsite server.
  3. Define a machine ID as an offsite server using Backup > Offsite Servers.

    Note: You do not have to install the backup client to a local server or an offsite server.

  4. Click the Schedule Install hyperlink on the Backup > Offsite Servers page for the machine ID you want to schedule synthetic support on. A dialog box displays. Schedule the installation of synthetic support components to the offsite server.
  5. Schedule volume backups for machine IDs, ensure the Synthetic Full checkbox is checked. These are machine IDs that store backups on local servers that transfer backups to the offsite server you defined above.
syslog

Syslog is a standard for forwarding log messages in an IP network to a syslog server. A syslog server collects the messages broadcast by various devices on the network and integrates them into a centralized repository of syslog files. Syslog is commonly used by Unix, Linux and Macintosh operating systems and hardware devices such as Cisco routers. Log Monitoring enables you to monitor syslog files.

A typical format for a syslog file entry is:

<time> <hostname> <tag>:<message>

For example:

Oct 15 19:11:12 Georges-Dev-Computer kernel[0]: vmnet: bridge-en1: interface en is going DOWN

System Checks

The VSA can monitor machines that don't have an agent installed on them. This function is performed entirely within a single page called System Check. Machines without an agent are called external systems. A machine with an agent is assigned the task of performing the system check on the external system. A system check typically determines whether an external system is available or not. Types of system checks include: web server, DNS server, port connection, ping, and custom.

System Scripts

System scripts are basic functions that are exposed by the VSA. You can schedule system scripts to run automatically. They cannot be edited nor can they accept parameters. A list of available system scripts displays in any Script Search popup window. System scripts can be run from:

Because a system script can be run using an alert or parent script associated with a specific machine ID account, the scheduling of a system script can be copied, typically from a machine ID template to a machine using Agent > Copy Settings.

System Tray

The system tray is located, by default, in the lower right-hand corner of the Windows desktop, in the Taskbar. It contains the system clock, and other system icons.

Update Classification

Microsoft updates are organized as follows:

Update Classification

Classification Type
(Non-Vista / Vista)

Included in
WSUSSCN2.CAB*

Security Updates

High Priority / Important

Includes critical, important, moderate, low, and non-rated security updates.

Yes

Critical Updates

High Priority / Important

Yes

Update Rollups

High Priority / Important

Yes

Service Packs

Optional – Software / Recommended

Yes

Updates

Optional – Software / Recommended

No

Feature Packs

Optional – Software / Recommended

No

Tools

Optional – Software / Recommended

No

In those cases where a machine does not have Internet connectivity at the time of a machine patch scan, Kaseya uses Microsoft’s WSUSSCN2.CAB data file. Microsoft publishes this CAB file as needed. It contains a sub-set of the Microsoft Update Catalog. As seen in the table above, scan data for only the high priority updates and service packs are included in the CAB file. The KServer automatically downloads the CAB file on a daily basis to make it available for those machines needing this type of scan. See Windows Automatic Update.

URL to Display "Create/View" Page

The following URL displays the Create/View web page for a specific ticket ID

http://...?ticid=<TicketID>

For example:

http://demo.kaseya.com?ticid=1234

URL to Display Machine Summary Page

The following URL displays the Machine Summary web page for a specific machine ID:

http//....?machName=<MachineID>

For example:

http://demo.kaseya.com?machName=jconners.acme

User Access Welcome Page

The User Access Welcome Page is the page the user sees when the agent icon on the system tray of a managed machine is double-clicked. The User Access Welcome Page contains user options such as changing the user's contact information, creating or tracking trouble tickets, chatting with administrators or remote controlling their own machine from another machine. Some of these options are enabled by an administrator using Agent > User Access. The function list the user sees on the User Access Welcome Page can be customized using System > Customize.

User Account

See Machine IDs vs. Agents

Variables

Use variables to store values that can be referenced in multiple script steps. Variables are passed automatically to nested scripts.

View Definitions

The View Definitions window lets you further refine a Machine ID / Group ID filter based on attributes contained on each machine—for example, the operating system type. Views provide administrators flexibility for machine management and reporting. View filtering is applied to all function pages by selecting a view from the Select View drop-down list on the Machine ID / Group ID Filter panel and clicking the green arrow icon. Any number of views can be created and shared with other administrators. Views are created by clicking the Edit button to the right of the Views drop-down list.

Virtual Machine

A virtual machine (VM) is a software implementation of a physical computer (machine) that executes programs like a physical computer. Virtual machines are capable of virtualizing a full set of hardware resources, including a processor (or processors), memory and storage resources and peripheral devices. The Backup module can convert a backup image into a VM. See Backup > Image to VM.

Virtual Network Computing (VNC)

Virtual Network Computing (VNC), also called remote control or remote desktop, is a graphical desktop sharing system which uses the Remote Framebuffer (RFB) protocol to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network. It is included with the KServer primarily to provide immediate technical support. VNC is platform-independent. A VNC viewer on any operating system can usually connect to a VNC server on any other operating system. The VNC server is the program on the target machine that shares its screen. The VNC client (or viewer) is the program on the administrator's machine that watches and interacts with the target machine. The VNC client machine requires user access rights to the VNC server machine. Since Kaseya VNC sessions are relayed through the KServer, all VNC sessions are protected by the Kaseya 256 bit rolling encryption protocol.

vPro

Intel® vPro™ Technology provides hardware-based management integration independent of operating system software and network management software. The VSA can discover vPro-enabled machines during a LAN Watch, list the hardware assets of vPro machines, access hardware-based security use the power management and remote booting of ISO images capabilities provided by vPro.

Windows Automatic Update

Windows Automatic Updates is a Microsoft tool that automatically delivers updates to a computer. Windows Automatic Updates is supported in the following operating systems: Windows 2003, Windows XP, and Windows 2000 SP3 or later. While Windows Millennium Edition (Me) has an Automatic Updates capability, it cannot be managed as the above operating systems can. Patch Mgmt > Windows Auto Update can enable or disable this feature on managed machines.