Monitoring Policy Wizard: Please select content

The options available on the Please select content page are based on the type of monitoring policy you create. For a policy that uses an On Demand template, the page title appears as Please select staging area.

Log Monitoring Policy

Use this page in the wizard to specify the location of the log (or log files) you want to monitor.

Add

Opens a window where you can specify the following content path:

  • For Text Log Files and SysLogs templates, specify the path to the folder containing the logs you want to monitor. You can also specify the path to an specific log file.

    Note: If you chose the Commvault Logs template, the log directory is already provided in the wizard. The policy automatically replaces the %LOG_DIR% variable with the log directory location during the monitoring process.

  • For the On Demand template, specify the folder where you want to store the log files that are uploaded to the Log Monitoring application. We recommend the use of a common location across all clients.

Browse

Browses the file systems of the clients you are monitoring with this policy. Use the browse window to select the following content:

  • For Text Log Files and SysLogs templates, select the folder containing the logs to be monitored. You can also select a specific log file.

  • For the On Demand template, select the folder where you want to store the log files that are uploaded to the Log Monitoring application.

Delete

Deletes the selected path.

As User

If you specified logs that reside in a UNC path or in a NetApp file server, use this button to open the Impersonate User dialog box where you can provide the credentials to access the network path.

Include Subfolders

When selected, the monitoring policy also monitors the subfolders residing in the folder(s) that you specified for monitoring. The logs in the subfolders must comply with the template you selected in order to be monitored.

System Monitoring Policy: Activity Monitoring

Use this page in the wizard to specify the kinds of activities you want to monitor. Note: The options available to you depend on the operating system you are monitoring.

Protocols and Operations

The protocols and operations you want to monitor.

  • Protocols

    The option to monitor the CIFS (Common Internet File System) and NFS (Network File System) protocols.

  • Operations

    The operations you want to monitor. These options apply to all of the clients selected on the Select associations page of the wizard.

    • Create (file level)

    • Create Directory

    • Delete (file level)

    • Delete Directory

    • Create Link

    • Lookup

    • Read

    • Rename (file level)

    • Rename Directory

    • Set Attributes

    • Create Symlink

    • Write

User Monitoring

Monitor when users log on or log out of a computer:

  • Login

  • Logout

If you added any remote Windows client computers to monitor, then you can configure only the User Monitoring tab. The other tabs in this page do not appear. If you configured any local computers along with the remote computers, then the login and logout events are monitored for the local computers also.

File System Monitoring: Monitor Paths

The file system paths you want to monitor for read, write, and execute activity. These options apply to all of the clients selected on the Select associations page of the wizard.

  • Path

    The file system path you want to monitor for read, write, or execute activity.

    Best Practice: An Activity Monitoring policy is intended to help you monitor sensitive or important data in your network. You should monitor specific file system paths, not an entire disk.

  • Read/Write/Execute

    Select the activity you want to monitor on the path you provided.

  • Subfolders

    When selected, the subfolders in the file system path you provided are monitored for read, write, and execute activity.

  • Add

    Adds a new row so that you can add additional file system paths.

  • Delete

    Deletes the selected file system path.

  • Up/Down

    Moves the selected file system path up or down in the list.

  • Browse

    Browses the file systems of the clients you are monitoring with this policy.

File System Monitoring: Filters

You can refine what is monitored by adding exclusions and exceptions to the exclusions.

  • Exclude these files/folders/patterns

    Excludes the files and folders you define. The excluded files and folders are not monitored.

    • Add

      Opens a window where you can add the path to files or folders you want to exclude.

    • Browse

      Browses the file systems of the clients you are monitoring with this policy.

    • Edit

      Edits the path to files or folders you want to exclude.

    • Delete

      Deletes the exclusion.

  • Except for these files/folders

    Exceptions to the exclusions you defined in Exclude these files/folders/patterns. For example, you can exclude the C:\ProgramData folder with the exception of the C:\ProgramData\Documents folder. The files and folders that are defined as exceptions are monitored.

    • Add

      Opens a window where you can add the path to files or folders you want to treat as exceptions to the exclusions you defined in the Exclude these files/folders/patterns box.

    • Browse

      Browses the file systems of the clients you are monitoring with this policy.

    • Edit

      Edits the path to files or folders you want to treat as exceptions to the exclusions you defined in the Exclude these files/folders/patterns box.

    • Delete

      Deletes the exception.

Loading...