SETTINGS > ALARM CONDITIONS
Available Languages:
English
Create customized policies based on application and user activity or interface thresholds.
This feature ensures that the software is proactive as well as historically informative.

Options
- Alarms can be configured for three different conditions:
- User/Host:
The Packets or Megabytes from a
specified host has violated the configured threshold in a 1 minute interval.
NOTE: Enter a hostname NOT an IP address and then click the
Filter button to select the host from the drop down box. Simply entering a host name
or IP address will not work. YOU MUST SELECT FROM THE DROP DOWN BOX.
- Application:
. The Packets or Megabytes from a
specified protocol has violated the configured threshold in a 1 minute interval.
NOTE: Enter an application name (e.g. http) NOT a port number and then click the
Filter button to select the application from the drop down box. Simply entering a port
number or application name will not work. YOU MUST SELECT FROM THE DROP DOWN BOX.
- Utilization on any interface exceeds the globally specified threshold in a
1 minute interval. We recommend using
Logalot on a separate machine to collect syslogs as it allows a threshold to be set on
the number of violations per X minutes prior to notification. Please call us (207)324-8805 x3
if assistance is needed to set this up.
- Maximum Alarm Entries to appear in the alarms tab.
- Syslog Host can be specified which will receive the syslog alarm messages for
every violation.
- Syslog Port is specified only when the default of 514 cannot be used.
Alarms can be viewed using the Alarms tab Click Here
for more details.
To edit a Policy, click on the edit
icon.
To delete a Policy, click on the red
icon.
Would you like to see a feature added to Scrutinizer?
Click Here
and tell us about your feature request.
Next Topic: AS Names
Available Languages:
English