Email Monitoring
Email is the killer app for most businesses! Users complain quickly and loudly if email is down for any length of time. Keeping on top of Microsoft Exchange prevents you spending days of remedial action on a broken Exchange Server. And, at the same time, users benefit from greater uptime of their 'business critical' email system.
N-able Mail Assure
N-able Mail Assure helps safeguard against spam, viruses, malware, ransomware, spear phishing, social engineering attacks, impersonation, spoofing, business email compromise, and other email-borne threats. For further information and sign-up for a trial please visit the N-able Mail Assure site.
Mail Store Size
This Exchange Store Size Check determines the overall size of the Exchange Mail Stores.
The check can monitor Multiple Exchange Mail Stores and queries the Active Directory to determine the Mail Store names and file locations. If an Active Directory is not available, then the Agent will use the default file locations. The location of the Mail Store files can also be manually selected using the browse button.
From Microsoft Exchange 2003 SP2 onwards, the size of the Mail Store is calculated as the sum of the EDB file and STM file (if available) less the amount of free space in the Mail Store and it is this logical size that the check reports on these systems.
For versions of Microsoft Exchange prior to this, the size of the Mail Store is calculated as the sum of the EDB file and STM file (as the Microsoft size limit check used the physical size).
Should you wish to calculate the physical size of a Mail Store on Microsoft Exchange 2003 SP2 or later, then this can be done using the File Size Check.
As mentioned above the Exchange Store Size Check from Exchange 2003 SP2 onwards uses the logical size of the Mail Store and its physical size may be determined by use of the File Size Check.
File Size
The File Size Check monitors the size of a group of files, folders (and subfolders) failing when the size of the group is greater or less than the specified threshold. The Check is available as a 24x7 Check for critical files and folders, and as a Daily Safety Check, for non-essential files and folders. Add the required files and folders to the Check then enter the threshold figure to begin monitoring.
MTA Queue Length
This MTA Queue Check queries the size of the mail queue in MBs for the specified Mail Transfer Agent (MTA) failing where the queue exceeds the threshold value and supports postfix, sendmail, exim, exim4 and qmail.
Windows Service, Linux Daemon and OSX Daemon Checks
The Windows Service Check, Linux Daemon Check and OSX Daemon Check monitor the state of the specified service or daemon generating an alert when any problems are discovered or after a number of consecutive failures. The Check can fail when the specified application’s service or daemon has stopped, is in the process of stopping or is not accessible.
To ensure that all essential services or Daemons are running. The Windows and Linux Checks include the option to restart a service or daemon when it is in the "stopped" state (either stopped unexpectedly or stopped manually). Please be aware that we do not attempt to restart disabled services or daemons.
Network Services (TCP/IP)
The TCP Service Check for Windows, Linux and macOS fails when any specified port on an ISP, internal server or external network is either open or closed depending upon the check configuration.
For example, check whether the mail server is or is not accepting connections by monitoring Ports 25 (SMTP), 110 (POP3) and 143 (IMAP).
To ensure this check is as versatile as possible we have included a drop-down list containing a number of popular preconfigured Ports and additional ports may be added if required. Assign a descriptive name to the check to make it easy to identify then enter the hostname or IP address and port number.
Windows Service, Linux Daemon and OSX Daemon Checks
The Windows Service Check, Linux Daemon Check and OSX Daemon Check monitor the state of the specified service or daemon generating an alert when any problems are discovered or after a number of consecutive failures. The Check can fail when the specified application’s service or daemon has stopped, is in the process of stopping or is not accessible.
To ensure that all essential services or Daemons are running. The Windows and Linux Checks include the option to restart a service or daemon when it is in the "stopped" state (either stopped unexpectedly or stopped manually). Please be aware that we do not attempt to restart disabled services or daemons.
Backup & Recovery
Cloud-based backup is a natural complement to our service and therefore we have teamed up with Cove Data Protection (Cove) to add Backup & Recovery. Enable Backup & Recovery on individual servers and workstations, on all servers and workstations at the Client or Site level, or a combination of both. For example at the Client or Site level, but with specific computers excluded.
Backup & Recovery uses True Delta Technology searches for changes at disk block level where, on average, only 0.1 - 0.5% of the protected data set will have changed making it highly effective at maximizing bandwidth and storage capacity. LocalSpeedVault provides on-site copy. Restore (also at disk block level) the last revision or any revision from the last 28-days either online or from the optional LocalSpeedVault.
On Windows you can backup the computer's system state, choose the files and folders to backup, along with the files to exclude, and set up a backup schedule. Along with the option to backup network shares, Exchange Information Stores, SQL Server instances and take application aware VMware (ESX only) snapshots.
For Windows and Mac workstations you can choose to use Backup & Recovery Documents and regularly back up specific file types on a preset schedule.
Backup
The Backup Check queries your client's backup on the days specified to determine the status of the backup ensuring that in the event of any problems on the client's server there is a backup to restore from.
The check incorporates a "Show Backup operation incomplete as successful" option so if the backup completes but files are still open this can be treated as successful or unsuccessful.
Although we monitor a number of the industry's leading backup solutions, where you product is unsupported and writes to the Windows Event Log the Windows Event Log Check may be used to monitor its status.
Windows Event Log Checks
Event Logs act as repositories containing detailed information on the status of the system populated by applications and Windows components.
Set up the Event Log Check to monitor an Event Log for Event ID, Event Type, Event Source or Description. Depending on configuration, the Check alerts when the specified criteria is, or is not, discovered in an Event Log entry.
The Event Log Check is available as both 24x7 and Daily Safety Checks. This allows you to continually monitor for critical events or licence failures and alert as soon as they are discovered, as well as setup Checks to look for events that only happen once per day including Antivirus updates or Backup job completion status.
Scripting
Write custom Scripts to monitor applications then upload them to N-sight RMM to deploy as 24x7 or Daily Safety Check Script Checks for Windows, Linux or macOS or as Automated Tasks for Windows, Linux or macOS. For example the system SQL Query script, which can run a query on an SQL database.