The options available on the Please select content page are based on the type of monitoring policy you create. For a policy that uses an On Demand template, the page title appears as Please select staging area.
Log Monitoring Policy
Use this page in the wizard to specify the location of the log (or log files) you want to monitor.
Add
Opens a window where you can specify the following content path:
-
For Text Log Files and SysLogs templates, specify the path to the folder containing the logs you want to monitor. You can also specify the path to an specific log file.
Note: If you chose the Commvault Logs template, the log directory is already provided in the wizard. The policy automatically replaces the %LOG_DIR% variable with the log directory location during the monitoring process.
-
For the On Demand template, specify the folder where you want to store the log files that are uploaded to the Log Monitoring application. We recommend the use of a common location across all clients.
Browse
Browses the file systems of the clients you are monitoring with this policy. Use the browse window to select the following content:
-
For Text Log Files and SysLogs templates, select the folder containing the logs to be monitored. You can also select a specific log file.
-
For the On Demand template, select the folder where you want to store the log files that are uploaded to the Log Monitoring application.
Delete
Deletes the selected path.
As User
If you specified logs that reside in a UNC path or in a NetApp file server, use this button to open the Impersonate User dialog box where you can provide the credentials to access the network path.
Include Subfolders
When selected, the monitoring policy also monitors the subfolders residing in the folder(s) that you specified for monitoring. The logs in the subfolders must comply with the template you selected in order to be monitored.
System Monitoring Policy: Activity Monitoring
Use this page in the wizard to specify the kinds of activities you want to monitor. Note: The options available to you depend on the operating system you are monitoring.
Protocols and Operations
The protocols and operations you want to monitor.
-
Protocols
The option to monitor the CIFS (Common Internet File System) and NFS (Network File System) protocols.
-
Operations
The operations you want to monitor. These options apply to all of the clients selected on the Select associations page of the wizard.
-
Create (file level)
-
Create Directory
-
Delete (file level)
-
Delete Directory
-
Create Link
-
Lookup
-
Read
-
Rename (file level)
-
Rename Directory
-
Set Attributes
-
Create Symlink
-
Write
-
User Monitoring
Monitor when users log on or log out of a computer:
-
Login
-
Logout
If you added any remote Windows client computers to monitor, then you can configure only the User Monitoring tab. The other tabs in this page do not appear. If you configured any local computers along with the remote computers, then the login and logout events are monitored for the local computers also.
File System Monitoring: Monitor Paths
The file system paths you want to monitor for read, write, and execute activity. These options apply to all of the clients selected on the Select associations page of the wizard.
-
Path
The file system path you want to monitor for read, write, or execute activity.
Best Practice: An Activity Monitoring policy is intended to help you monitor sensitive or important data in your network. You should monitor specific file system paths, not an entire disk.
-
Read/Write/Execute
Select the activity you want to monitor on the path you provided.
-
Subfolders
When selected, the subfolders in the file system path you provided are monitored for read, write, and execute activity.
-
Add
Adds a new row so that you can add additional file system paths.
-
Delete
Deletes the selected file system path.
-
Up/Down
Moves the selected file system path up or down in the list.
-
Browse
Browses the file systems of the clients you are monitoring with this policy.
File System Monitoring: Filters
You can refine what is monitored by adding exclusions and exceptions to the exclusions.
-
Exclude these files/folders/patterns
Excludes the files and folders you define. The excluded files and folders are not monitored.
-
Add
Opens a window where you can add the path to files or folders you want to exclude.
-
Browse
Browses the file systems of the clients you are monitoring with this policy.
-
Edit
Edits the path to files or folders you want to exclude.
-
Delete
Deletes the exclusion.
-
-
Except for these files/folders
Exceptions to the exclusions you defined in Exclude these files/folders/patterns. For example, you can exclude the C:\ProgramData folder with the exception of the C:\ProgramData\Documents folder. The files and folders that are defined as exceptions are monitored.
-
Add
Opens a window where you can add the path to files or folders you want to treat as exceptions to the exclusions you defined in the Exclude these files/folders/patterns box.
-
Browse
Browses the file systems of the clients you are monitoring with this policy.
-
Edit
Edits the path to files or folders you want to treat as exceptions to the exclusions you defined in the Exclude these files/folders/patterns box.
-
Delete
Deletes the exception.
-