A simple program for monitoring a computer on a network. Programs for system administrators, programs for the network. Local network control program

Total Network Monitor 2 is a program for continuous monitoring and administration of a local network, individual computers, Internet resources, network and system services. TNM will notify you in advance of the occurrence of problems through various means and generate a detailed report on what happened and when.

Network monitoring

you create monitors- objects that periodically check one or another aspect of the operation of a service, server, or file system. The monitors are flexibly configured and display the network status in real time.

If any indicators deviate from the norm, the monitor executes the script described in advance actions: for example, a beep, e-mail or IM notification with a detailed description of the incident, rebooting the remote computer, launching an application, etc.

Turning to network monitoring log, you can always see the history of readings of all monitors and a list of performed actions.

Download for free and start using right now and without functional limitations!

Health checks and problems

Checks- connection of Total Network Monitor 2 with the outside world. They provide monitors with data for analysis. In our network monitoring utility you will find many checks for all occasions. Querying over network protocols to monitor servers, checking services, the Windows event log and registry keys, searching for a string in a file on a remote computer, and much more - TNM does all this with ease.

List of checks

Internet: ICMP TCP HTTP FTP SMTP POP3 IMAP Telnet

Windows: Event Log Service Status Registry Status System Performance

File-based: File existence File size File comparison Number of files CRC32 file Content of file Disk space

Alerts and event history

Actions triggered when something doesn't go according to plan. They notify you so you can fix things in time. They can provide first aid in administering a local network: restart a service or a remote computer, launch an application, execute a script. Or they can just add an entry to a separate journal.

Action List

Alerts: Message box Notification Sound signal Write to file

Alerts: E-mail Jabber Event log

Action: Run the application Run the script Restart the service Restart the computer

All actions performed and all changes in observed parameters are continuously logged, forming a clear picture of the state of the network.

Logging Checks to the Monitor Log

Total Network Monitor 2 monitors all running monitors and records the necessary information about the operation of checks. Any change in the state of the monitor is captured in Monitor Log:

Statistics and Activity Chart

Statistics include the time when the selected monitor was started and last scanned, the total number and number of green, red, and black monitor states. A separate tool can be called activity chart, which graphically displays the results of checking the selected monitor.

Monitoring actions in the log

TNM logs every action performed and non-performed in Activity log, showing the timecode and the name and IP address of the target equipment:

Convenient map of network devices

Build a visual plan for your monitoring project with network maps: place icons of computers, devices and servers on a plant diagram or world map, and depict the structure of a network using connections.

Color indication next to each device on the network map allows you to quickly determine their status.

LanAgent - a program for monitoring computers in the local network of an enterprise

Any leader knows for sure that there is no employee in this world who is ready to selflessly engage in his direct duties at work, to forget about his interests, hobbies, albeit the most harmless or useful, for the time being. Lazybones were, are and will be. Why not install hidden cameras? In every office? Unlikely. A competent manager probably knows about “agent programs” that are installed on a computer and collect visual information about the activities of employees. Now it’s something you can calmly and confidently present to a lazy person, as strong evidence of his guilt.
The program is very effective in this role. A very serious argument in the eternal confrontation "severe boss - cunning employees." And here the point is not even to bring a negligent employee to clean water and deprive him of his bonus, but to anticipate, predict such acts. Once caught, our lazy person, believe me, is unlikely to play solitaire or wander around the expanses of the network in the absence of superiors. Prevention is the best treatment. Let's start with the fact that LanAgent, being completely invisible (even for a self-described "advanced user"), monitors the user's actions completely: remembers all programs running on a particular computer, intercepts visited sites, monitors the contents of the clipboard and takes screenshots (screenshots). This data is transferred to the administrator's computer and stored in a database that is not accessible to other users.

Main window of LanAgent 1.8


A little about how LanAgent software works. The program consists of 2 parts - the user part (agent) and the administrator part. The administrator part is installed on the administrator's computer, and the agents on the user's computers. Agents monitor all user actions on each computer, and the administrator part collects information centrally over the network (polling agents), so that the administrator can then view all the data on his computer and make a report. Using the Report Wizard, you can select users for whom to make a report , the period for which to select data, as well as the types of logs that need to be included in the report. The report will be generated in html format.


The main program window is divided into several tabs:


Keyboard - here is information on pressed keys. Recording is carried out on the windows of the programs in which the keys were pressed. List of windows - in a table, sorted by time. At the bottom of the tab is the title of the window, the path to the program, the user who worked with it, and, of course, all the keys that he pressed. The program can be configured so that only symbols are shown and the system keys are hidden. For example, if the following keys were pressed:


Screenshots - hidden agents are able to periodically, with an interval specified in the settings, take screenshots of the entire screen or the currently active window (this is again indicated in the settings). All pictures taken are stored in the database along with the creation time, window title and username. Thus, the owner of the computer can only select the entry of interest to him and double-click on it with the mouse to clearly see what was happening on his PC.

Programs - this tab is designed to view information about who and when started and closed certain programs. Moreover, the screen displays not only the path to the used software, but also the title of its window.

Clipboard -as data appears in the buffer, information about this is entered into its table. Here it is noted in which window the operation was performed and who performed it. When you select an entry in the table, the contents of the buffer are displayed at the bottom of the tab. It must be borne in mind that you can save the contents of the clipboard not completely, but partially. To do this, you can set the maximum amount of stored information.

Files and folders -all changes in the file system will also be fixed: creation, deletion and renaming of folders or files. You can monitor the entire file system, or you can specify only a specific folder for monitoring.

A computer- this tab is designed to view information about who turned on and off the computer and when.

Internet connections - all moments of access to the Internet, as well as disconnections, will be recorded and presented on this tab. You can also find out which connection was used to access the Internet.

Sites visited - hidden agents remember all the sites visited by the user. You will be able to see both the page link itself and its title.


What can be done with log files other than viewing them directly? Search them. To do this, select the entry from which the search will begin, and enter the search string. You can set the search mode to be case sensitive.


The program has the ability to remotely manage agent settings. The administrator can, without getting up from his computer, tell the agents which user actions to intercept, with what interval to take screenshots. It can remotely start or stop monitoring, send a text message to the user's computer, etc.



Managing hidden agent settings


The administrator part of the program can, at a certain interval, set in advance, automatically poll users' computers and receive information collected by agents from them.


Let's summarize: using the LanAgent program, you can effectively monitor the rational use of working time by employees, monitor them in real time. But, perhaps, it is not worth going too far, the point of the program is still not to catch as many “criminals” as possible, but to prevent such actions.

The mantra of the real estate world is Location, Location, Location. For the world of system administration, this sacred text should sound like this: Visibility, Visibility and once again Visibility. If you don't know exactly what your network and servers are doing every second of the day, you're like a pilot flying blind. A catastrophe awaits you. Lucky for you, there are a lot of good programs available on the market, both commercial and open source, that can do your network monitoring.

Since good and free is always more tempting than good and expensive, here is a list of open source programs that prove their worth every day in networks of any size. From discovering devices, monitoring network equipment and servers, to identifying network trends, graphing monitoring results, and even backing up switch and router configurations, these seven free utilities are likely to surprise you.

Cacti

First there was MRTG (Multi Router Traffic Grapher) - a program for organizing a network monitoring service and measuring data over time. Back in the 1990s, its author Tobias Oetiker saw fit to write a simple graphing tool using a ring database, originally used to display the throughput of a router on a LAN. So MRTG gave birth to RRDTool, a set of utilities for working with RRD (Round-robin Database, ring database), which allows you to store, process and graphically display dynamic information such as network traffic, processor load, temperature, and so on. Now RRDTool is used in a huge number of open source tools. Cacti is the modern flagship of open source network graphics software and takes the principles of MRTG to a whole new level.

From disk usage to power supply fan speed, if it can be tracked,Cacti will be able to display it and make this data easily accessible.

Cacti is a free program included in the LAMP suite of server software that provides a standardized software platform for plotting virtually any statistical data. If any device or service returns numeric data, then they can most likely be integrated into Cacti. There are templates for monitoring a wide range of equipment, from Linux and Windows servers to Cisco routers and switches, basically anything that talks on SNMP (Simple Network Management Protocol). There are also collections of third-party templates that further expand the already huge list of Cacti compatible hardware and software.

While Cacti's standard data collection method is SNMP, Perl or PHP scripts can also be used. The software system framework cleverly separates data acquisition and graphical display into discrete instances, making it easy to reprocess and reorganize existing data for different visual representations. In addition, you can select specific time frames and parts of the charts by simply clicking and dragging them.

So, for example, you can quickly look at data from several years ago to see if the current behavior of the network equipment or server is anomalous, or if such indicators appear regularly. And with Network Weathermap, a PHP plugin for Cacti, you can effortlessly create real-time maps of your network showing the traffic between network devices using graphs that appear when you hover your mouse over a network channel image. Many organizations using Cacti display these maps on 42-inch wall-mounted LCD monitors 24/7, allowing IT to instantly monitor network traffic and link status.

In summary, Cacti is a powerful graphing and trending network performance toolkit that can be used to monitor virtually any monitored metric that can be graphed. The solution also supports almost limitless customization options, which can make it overly complex for certain applications.

Nagios

Nagios is an established network monitoring software system that has been in active development for many years. Written in C, it allows you to do almost everything that system and network administrators might need from a monitoring application package. The web interface of this program is fast and intuitive, while its back-end is extremely reliable.

Nagios can be a problem for beginners, but the rather complex configuration is also an advantage of this tool, as it can be adapted to almost any monitoring task.

Like Cacti, there is a very active community supporting Nagios, so various plugins exist for a huge variety of hardware and software. From the simplest ping checks to integration with complex software solutions, such as WebInject, a free Perl-based web application and service testing tool. Nagios allows you to constantly monitor the status of servers, services, network links and everything else that understands the IP network layer protocol. For example, you can monitor server disk space usage, RAM and CPU usage, FLEXlm license usage, server outlet air temperature, WAN and Internet latency, and more.

Obviously, any server and network monitoring system will not be complete without notifications. Nagios is fine with that: the software platform offers a customizable email, SMS, and instant messaging notification mechanism for most popular Internet messengers, as well as an escalation scheme that can be used to make intelligent decisions about who, how and when. what circumstances should be notified that with the right settings will help you ensure many hours of restful sleep. And the web interface can be used to temporarily suspend receiving notifications or acknowledging a problem that has occurred, as well as making notes by administrators.

In addition, the display feature shows all monitored devices in a logical, color-coded representation of their location on the network, allowing problems to be shown as they occur.

The disadvantage of Nagios is the configuration, as it is best done through the command line, which makes it much more difficult for beginners to learn. Although people who are familiar with the standard Linux/Unix configuration files should not have much trouble.

The possibilities of Nagios are huge, but the effort to use some of them may not always be worth the effort. But don't let the complexity intimidate you: the early warning benefits that this tool provides for so many aspects of the network cannot be overestimated.

Icinga

Icinga started as a fork of the Nagios monitoring system, but has recently been rewritten into a standalone solution known as Icinga 2. Both versions of the program are currently in active development and available for use, while Icinga 1.x is compatible with a large number of plugins and configuration Nagios. Icinga 2 was designed to be less bulky, performance oriented, and more user friendly. It offers a modular architecture and multi-threaded design that neither Nagios nor Icinga 1 has.

Icinga offers a complete monitoring and alerting software platform that is designed to be as open and extensible asNagios, but with some differences in the web interface.

Like Nagios, Icinga can be used to monitor anything that speaks the IP language, as deep as you can use SNMP, as well as custom plugins and add-ons.

There are several variations of the web interface for Icinga, but the main difference between this monitoring software solution and Nagios is the configuration that can be done through the web interface rather than through configuration files. For those who prefer to manage their configuration outside of the command line, this functionality will be a real boon.

Icinga integrates with a variety of monitoring and graphical display software packages such as PNP4Nagios, inGraph and Graphite to provide a robust visualization of your network. In addition, Icinga has advanced reporting capabilities.

NeDi

If you've ever had to Telnet to switches to find devices on your network and search by MAC address, or you just want to be able to determine the physical location of certain equipment (or perhaps even more it doesn't matter where it was located before), then it will be interesting for you to take a look at NeDi.

NeDi constantly scans the network infrastructure and catalogs devices, keeping track of everything it finds.

NeDi is a free LAMP-related software that regularly scans the MAC addresses and ARP tables on the switches in your network, cataloging each discovered device in a local database. This project is not as well known as some others, but it can be a very handy tool when dealing with corporate networks where devices are constantly changing and moving.

You can use the NeDi web interface to search for a switch, switch port, access point, or any other device by MAC address, IP address, or DNS name. NeDi collects all the information it can from every network device it encounters, pulling serial numbers, firmware and software versions, current times, module configurations, and more. You can even use NeDi to mark MAC- addresses of devices that have been lost or stolen. If they appear online again, NeDi will let you know.

Discovery is triggered by a cron process at specified intervals. The configuration is simple, with a single configuration file that allows for much more customization, including the ability to skip devices based on regular expressions or set network boundaries. NeDi typically uses the Cisco Discovery Protocol or Link Layer Discovery Protocol to discover new switches and routers and then connects to them to collect their information. Once the initial configuration is set, device discovery will be pretty fast.

Up to a certain level, NeDi can integrate with Cacti, so it is possible to link device discovery to the corresponding Cacti graphs.

Ntop

The Ntop project - now better known to the "new generation" as Ntopng - has come a long way in the last decade. But call it what you want - Ntop or Ntopng - as a result, you get a first-class tool for monitoring network traffic paired with a fast and simple web interface. It is written in C and is completely self contained. You start a single process configured on a specific network interface, and that's all it needs.

Ntop is a lightweight web-based packet sniffing tool that shows you real-time network traffic data. Information about the data flow through the host and about the connection to the host is also available in real time.

Ntop provides easy-to-digest graphs and tables showing current and past network traffic, including protocol, source, destination, and history of specific transactions, as well as hosts at both ends. In addition, you'll find an impressive array of graphs, charts, and real-time network usage maps, as well as a modular architecture for a huge number of add-ons, such as adding NetFlow and sFlow monitors. Here you can even find Nbox - a hardware monitor that embeds in Ntop.

In addition, Ntop includes an API for the Lua scripting programming language that can be used to support extensions. Ntop can also store host data in RRD files for ongoing data collection.

One of the most useful uses of Ntopng is to control traffic to a specific location. For example, when some of the network links are highlighted in red on your network map, but you don't know why, you can use Ntopng to get a minute-by-minute report on the problematic network segment and immediately find out which hosts are responsible for the problem.

The benefit of such network visibility is difficult to overestimate, and it is very easy to get it. Essentially, you can run Ntopng on any interface that has been configured at the switch level to monitor a different port or VLAN. That's all.

Zabbix

Zabbix is ​​a full-blown network and system monitoring tool that combines several functions in one web console. It can be configured to monitor and collect data from a wide variety of servers and network devices, maintaining and monitoring the performance of each site.

Zabbix allows you to monitor servers and networks using a wide range of tools, including monitoring of virtualization hypervisors and web application stacks.

Basically, Zabbix works with software agents running on monitored systems. But this solution can also work without agents, using the SNMP protocol or other monitoring capabilities. Zabbix supports VMware and other virtualization hypervisors by providing detailed hypervisor performance and activity data. Particular attention is also paid to the monitoring of Java application servers, web services and databases.

Hosts can be added manually or through an automatic discovery process. A wide range of default templates apply to the most common use cases such as Linux, FreeBSD and Windows servers; widely used services such as SMTP and HTTP as well as ICMP and IPMI for detailed network hardware monitoring. In addition, custom checks written in Perl, Python or almost any other language can be integrated into Zabbix.

Zabbix allows you to customize your dashboards and web interface to focus on the most important network components. Notifications and problem escalations can be based on custom actions that are applied to hosts or groups of hosts. Actions can even be configured to run remote commands, so some script of yours can run on the controlled host if certain event criteria are met.

The program graphs performance data such as network bandwidth and CPU usage and collects it for custom display systems. In addition, Zabbix supports customizable maps, screens, and even slideshows showing the current status of monitored devices.

Zabbix can be difficult to implement initially, but judicious use of auto discovery and various templates can alleviate some of the integration difficulties. In addition to being an installable package, Zabbix is ​​available as a virtual appliance for several popular hypervisors.

observium

Observium is a network equipment and server monitoring software that has a huge list of supported devices using the SNMP protocol. As a LAMP related software, Observium is relatively easy to install and configure, requiring the usual Apache, PHP and MySQL installations, database creation, Apache configuration, and the like. It installs as its own server with a dedicated URL.

Observium combines system and network monitoring with performance trending. It can be configured to track almost any metric.

You can enter the GUI and start adding hosts and networks, as well as set up auto-discovery ranges and SNMP data so that Observium can explore the networks around it and collect data on each discovered system. Observium can also discover network devices via CDP, LLDP or FDP protocols, and remote host agents can be deployed on Linux systems to help with data collection.

All of this collected information is available through an easy-to-use user interface that provides advanced statistical display options as well as charts and graphs. You can get anything from ping and SNMP response times to throughput graphs, fragmentation, IP packet counts, and more. Depending on the device, this data can be available up to every discovered port.

As for servers, for them Observium can display information about the state of the central processor, RAM, data storage, swap, temperature, etc. from the event log. You can also enable data collection and performance graphing for various services including Apache, MySQL, BIND, Memcached, Postfix, and more.

Observium works great as a virtual machine, so it can quickly become the go-to tool for getting information about the status of servers and networks. This is a great way to add auto-discovery and graphical representation to any size network.

Too often, IT administrators feel they are limited in what they can do. Whether we're dealing with a custom software application or an "unsupported" piece of hardware, many of us feel that if the monitoring system can't handle it right away, it's impossible to get the data we need in that situation. This, of course, is not true. With a little effort, you can make almost everything more visible, accounted for, and controlled.

An example is a user application with a database on the server side, for example, an online store. Your management wants to see beautiful graphs and charts, designed in one form or another. If you are already using, say, Cacti, you have several options to display the collected data in the required format. You can, for example, write a simple Perl or PHP script to run queries against the database and pass those calculations to Cacti, or you can SNMP call the database server using a private MIB (Management Information Base). One way or another, but the task can be done, and done easily, if you have the necessary tools for this.

Most of the free network monitoring utilities listed in this article should not be difficult to access. They have bundled versions available for download for the most popular Linux distributions, unless they are originally included. In some cases, they may be pre-configured as a virtual server. Depending on the size of your infrastructure, configuring and configuring these tools can be quite time-consuming, but once they're up and running, they'll be a solid foundation for you. As a last resort, it is worth at least testing them.

Regardless of which of these above systems you use to keep an eye on your infrastructure and equipment, it will provide you with at least the functionality of another system administrator. Although it cannot fix anything, it will monitor literally everything on your network around the clock, seven days a week. The time spent on installation and configuration will pay off with a vengeance. Also, be sure to run a small set of standalone monitors on another server to observe the main monitor. This is the case when it is always better to keep an eye on the observer.

Always in touch, Igor Panov.


See also:

LanAgent- a program for covert monitoring of computers on a local network, designed to control user actions. LanAgent controls and monitors activity on any computer connected to your organization's network.

The program will allow you to identify activities that are not related to work, show how rationally your employees use working time,
this is a tool for detecting leaks of important information, as well as the facts of negotiating with competitors. All necessary FSTEC licenses are available.

Who is the program for:

  • For company executives. Via LanAgent you can effectively monitor the rationality of the use of working time by employees: covertly monitor them in real time, create reports for any period of time. LanAgent will increase the efficiency of using the working time of the staff, save the company's money.
  • For information security specialists. Accessibility provided LanAgent, such as monitoring connections and disconnections of storage devices, control of texts typed on the keyboard and copied to the buffer, interception of ICQ and Mail.ru agent correspondence, are a tool for detecting leaks of important information, as well as the facts of negotiating with competitors.
  • For system administrators. LanAgent will help you find out exactly what was going on in the system. You will always be aware of all the actions taking place on the computers of your local network. Thanks to screenshots, the program will allow you to see what is happening on the user's monitor.

Using LanAgent monitoring is carried out almost imperceptibly for users of workstations, special attention should be paid to the possibility of generating and printing a wide variety of reports on the results of monitoring, which allows them to be presented to the management of the enterprise in a clear and accessible form.

LanAgent Terminal

LanAgent WebCam- designed to organize remote video surveillance of premises, allows you to record video and sound from an almost unlimited number of cameras to the archive, as well as monitor in real time.

Even a short period of using the program will significantly reduce cases of misuse of your company's computing and information resources.

Advantages LanAgent before analogues:

  • High functionality at a reasonable price;
  • Easy setup, ease of use;
  • High-quality and prompt information and technical support;
  • Stability of work;
  • Constant development and release of new versions.

LanAgent has been successfully used in Russia and the CIS for more than 7 years. Now there are more than 10,319 client companies, including banks, factories, large enterprises in the oil and gas industry.

The cost of the program depends on the number of computers you are going to monitor. Please note that if you want to monitor 30 computers, then you need to purchase a program for 30 computers. Estimated cost for 1 workplace is 1200 rubles.

Versions of LanAgent

LanAgent Standard- a program for covert monitoring of computers in a local network. Designed to control user actions and protect confidential information from leaks.

LanAgent Standard controls and monitors activity on any computer connected to your organization's network. The program will allow you to identify activities that are not related to work, show how rationally your employees use working time.

LanAgent– Your tool for detecting leaks of important information, as well as the facts of negotiating with competitors.

LanAgent Enterprise is an easily scalable tool for monitoring employees' computers on a local network. It is an effective tool for ensuring information security. LanAgent Enterprise also has all the necessary functions to control the organization's personnel.

With all the functionality of the standard version, LanAgent Enterprise has a built-in report scheduler, allows you to connect several workplaces of security specialists, has a mechanism for distributing rights to view information between them, the ability to send notifications of violations of security policies to ICQ or E-Mail of a specialist subscribed to these events. The mechanism for subscribing to notifications is flexible. Access to data is carried out only after mandatory authentication.

LanAgent will help in solving one of the main tasks of information security - the fight against insider trading.

LanAgent Terminal is an easily scalable tool for monitoring the actions of users of terminal clients.

LanAgent Terminal has the entire set of features of the LanAgent Enterprise version, such as: connecting several workstations of a security specialist, distributing rights to view information, sending notifications of violations of security policies to ICQ and E-mail, subscribing to alerts on these events, a built-in report scheduler, ... And designed for use on terminal-server technology (based on Win 2003/2008 Server).

LanAgent Terminal allows you to effectively monitor the work of "thin clients".

LanAgent NetworkFilter- a special module designed to control information transmitted over the network. In addition to intercepting ICQ messages, the mail.ru agent allows you to intercept messages, both received and sent through mail clients, and sent through the web interface. Also, LanAgent NetworkFilter monitors files uploaded to the Internet, allows you to block visiting certain sites and sending files.

LanAgent NetworkFilter used as a standalone product, providing an even greater level of protection for your organization against internal threats.

7 REASONS TO CHOOSE LANAGENT

  • The complexity of the solution. You will receive in one software product a complete set of functions to control user work and protect confidential information.
  • LanAgent is time tested. LanAgent has been successfully used in Russia and the CIS for more than 7 years. The first version of the computer monitoring software was released in 2005. Now the program is installed in more than 10319 companies, including banks, factories, large enterprises in the oil and gas industry.
  • Ease of implementation of the program. Even an unprepared user can install and configure the tracking program. All installation and configuration actions are performed remotely and in stealth mode. Bulk installation of the client part can be done in a matter of minutes. Any issues that arise can be resolved with our technical service. support by phone, Skype, e-mail and ICQ.
  • Constant development. Information technology is constantly evolving, and with it the capabilities of a personnel performance monitoring program.
  • Legality of use. Using a program to monitor employees can be completely legal if a number of simple requirements are met. All our clients are provided with a set of documents on the implementation of the program and the introduction of a trade secret regime.
  • Minimum purchase and operation costs. Implementation of the program does not require the use of additional hardware or software. The cost of one license for computer monitoring software is from 1250 rubles. The license for all programs is perpetual. Technical support is free, version updates within a year after purchase are also free.
  • Scalability and customizability. Whatever your needs for monitoring the operation of a computer, employees or users of a terminal server, we will find the best solution for you.

FUNCTIONAL CAPABILITIES OF THE PROGRAM

  • Logs all keystrokes.
  • Takes screenshots (screenshots) after a specified period of time.
  • Remembers starting and closing programs.
  • Monitors the contents of the clipboard.
  • Keeps track of turning on/off the computer (Accounting of working hours).
  • Remembers installing and removing programs.
  • Intercepts ICQ, Mail.ru Agent, MSN, Jabber messages.
  • Intercepts visited sites.
  • Monitors incoming and outgoing e-mail.
  • Provides full control of skype: correspondence, voice messages, transferred files.
  • Intercepts letters sent via the web interface and uploads files to the Internet.
  • Defines the connection and disconnection of storage media.
  • Performs shadow copying of files copied to or edited on USB media.
  • Allows you to block the connection of USB drives, CD / DVD ROM, floppy drives. Create a list of allowed USB media.
  • Keeps records of documents sent for printing to the printer.
  • Monitors the file system.
  • Logs work with shared computer resources.
Additional features
  • "Active alert" on violations of security policies.
  • Generates a report in various formats, incl. in html format.
  • Expanded system of analytical reports.
  • All information is stored in a database on the administrator's computer.
  • Remote management of agent settings, the ability to remotely start/stop monitoring.
  • Automatic receipt of logs from agents on the administrator's computer.
  • Logs are transmitted over the network in encrypted form.
  • Agents are completely invisible on users' computers.
  • Ability to send text messages to the user's computer.

Program cost

Program Number of computers Price for one computer, rub.
LanAgent Standard 4.3 2-10 1250
LanAgent Standard 4.3 11-25 1125
LanAgent Standard 4.3 26-50 1000
LanAgent Standard 4.3 51-100 875
LanAgent Standard 4.3 101-200 750
LanAgent Standard 4.3 201-300 700
LanAgent Standard 4.3 301-500 650
LanAgent Standard 4.3 Over 500 by agreement
LanAgent Enterprise 21-100 2100
LanAgent Enterprise 101-200 1900
LanAgent Enterprise 201-300 1700
LanAgent Enterprise 301-500 1500
LanAgent Enterprise Over 500 by agreement

In the previous article, a list of 80 tools for monitoring a Linux system was compiled. It also made sense to make a selection of tools for the Windows system. The list below is just a starting point, there is no ranking.


1.Task manager

The well-known Windows Task Manager is a utility for displaying a list of running processes and the resources they consume. But do you know how to use its full potential? As a rule, it controls the state of the processor and memory, but you can go much further. This application is pre-installed on all Microsoft operating systems.

2. Resource Monitor

A great tool to evaluate CPU, RAM, network and disk usage in Windows. It allows you to quickly get all the necessary information about the status of critical servers.

3.Performance Monitor

The main tool for managing performance counters in Windows. Performance Monitor, in earlier versions of Windows, is known to us as System Monitor. The utility has several display modes, displays performance counters in real time, saves data to log files for later study.

4.Reliability Monitor

Reliability Monitor - System stability monitor, allows you to monitor any changes in computer performance, you can find the stability monitor in Windows 7, in Windows 8: Control Panel> System and Security> Action Center. Using Reliability Monitor, you can keep track of changes and failures on your computer, the data will be displayed in a convenient graphical form, which will allow you to track which application and when caused an error or freeze, track the appearance of the Windows blue screen of death, the reason for its appearance (the next Windows update or program installation).

5.Microsoft SysInternals

SysInternals is a complete set of programs for administering and monitoring computers running Windows. You can download them for free on the Microsoft website. Sysinternals tools help you manage, troubleshoot, and diagnose applications and Windows operating systems.

6. SCOM (part of Microsoft System Center)

System Center - is a complete set of tools for IT infrastructure management, with which you can manage, deploy, monitor, configure Microsoft software (Windows, IIS, SQLServer, Exchange, and so on). Alas, MSC is not free. SCOM is used for proactive monitoring of key IT infrastructure objects.

Monitoring Windows Servers with the Nagios Family

7. Nagios

Nagios has been the most popular infrastructure monitoring tool for several years (for Linux and Windows). If you are considering Nagios for Windows then install and configure the agent on the Windows server. NSClient++ monitors the system in real time and provides output from a remote monitoring server and more.

8. Cacti

Usually used together with Nagios, it provides the user with a convenient web interface to the RRDTool utility, designed to work with circular databases (Round Robin Database), which are used to store information about changes in one or more values ​​over a certain period of time. Statistics in network devices are presented in the form of a tree, the structure of which is set by the user, you can build a graph of channel usage, HDD partition usage, display resource latency, etc.

9. Shinken

A flexible, scalable open source monitoring system based on the Nagios kernel written in Python. It is 5 times faster than Nagios. Shinken is compatible with Nagios, you can use its plugins and configurations without making adjustments or additional configuration.

10. Icinga

Another popular open monitoring system that checks hosts and services and reports their status to the administrator. Being a fork of Nagios, Icinga is compatible with it and they have a lot in common.

11. OpsView

OpsView was initially free. Now, alas, users of this monitoring system have to fork out.

Op5 is another open source monitoring system. Graphing, data storage and collection.

Alternatives to Nagios

13. Zabbix

Open source software for monitoring and tracking the status of a variety of computer network services, servers and network equipment, used to obtain data on processor load, network usage, disk space and the like.

14. Munin

A good monitoring system that collects data from several servers at the same time and displays everything in the form of graphs, with which you can track all past events on the server.

15.Zenoss

Written in Python using the Zope application server, data is stored in MySQL. With Zenoss you can
monitor network services, system resources, device performance, the Zenoss core analyzes the environment. This makes it possible to quickly deal with a large number of specific devices.

16. Observium

A system for monitoring and monitoring network devices and servers, although the list of supported devices is huge and is not limited to network devices, the device must support SNMP.

17. Centreon

A comprehensive monitoring system that allows you to control the entire infrastructure and applications containing system information. Free alternative to Nagios.

18. Ganglia

Ganglia is a scalable distributed monitoring system used in high performance computing systems such as clusters and grids. Tracks statistics and real-time calculation history for each monitored node.

19.Pandora FMS

Monitoring system, good performance and scalability, one monitoring server can control the work of several thousand hosts.

20. NetXMS

Open source software for monitoring computer systems and networks.

21.OpenNMS

OpenNMS monitoring platform. Unlike Nagios, it supports SNMP, WMI and JMX.

22.HypericHQ

A component of the VMware vRealize Operations suite, used to monitor OS, middleware, and applications in physical, virtual, and cloud environments. Displays availability, performance, usage, events, logs, and changes at each layer of the virtualization stack (from the vSphere hypervisor to guest OSes).

23. Bosun

An open source monitoring and alert system from StackExchange. Bosun has a well-thought-out data schema, as well as a powerful processing language.

24. Sensu

Sensu is an open source alert system similar to Nagios. There is a simple dashboard, you can see a list of clients, checks and triggered alerts. The framework provides the mechanisms that are needed to collect and accumulate server statistics. On each server, the Sensu agent (client) is launched, which uses a set of scripts to check the health of services, their status, and collect any other information.

25. CollectM

CollectM collects statistics about system resource usage every 10 seconds. It can collect statistics for several hosts and send it to the server, the information is displayed using graphs.

28. Performance Analysis of Logs (PAL) Tool

34.Total Network Monitor

This is a program for continuous monitoring of the local network of individual computers, network and system services. Total Network Monitor generates a report and notifies you of any errors that have occurred. You can check any aspect of a service, server, or file system: FTP, POP/SMTP, HTTP, IMAP, Registry, Event Log, Service State, and more.

35.PRTG

38. Idera

Supports multiple operating systems and virtualization technologies. There are many free tools with which you can monitor the system.

39.PowerAdmin

PowerAdmin is a commercial monitoring solution.

40. ELM Enterprise Manager

ELM Enterprise Manager - full monitoring from "what happened" to "what's going on" in real time. Monitoring tools in ELM include - Event Collector, Performance Monitor, Service Monitor, Process Monitor, File Monitor, PING Monitor.

41.EventsEntry

42. Veeam ONE

Efficient monitoring, reporting and resource planning solution for VMware, Hyper-V and Veeam Backup & Replication infrastructure, monitors the health of your IT infrastructure and diagnoses problems before they interfere with user experience.

43. CA Unified Infrastructure Management (formerly CA Nimsoft Monitor, Unicenter)

Monitors the performance and availability of Windows server resources.

44.HP Operations Manager

This infrastructure monitoring software performs proactive root cause analysis, reducing recovery time and operations management costs. The solution is ideal for automated monitoring.

45. Dell Open Management

OpenManage (now Dell Enterprise Systems Management) an all-in-one monitoring product.

46. ​​Halcyon Windows Server Manager

Management and monitoring of networks, applications and infrastructure.

Below is a list of (most popular) network monitoring tools

54. Ntop

55. NeDi

Nedi is an open source network monitoring tool.

54. The Dude

The Dude monitoring system, although free, but according to experts, is in no way inferior to commercial products, it monitors individual servers, networks and network services.

55. BandwidthD

Open source program.

56. NagVis

An extension for Nagios that allows you to create infrastructure maps and display their status. NagVis supports a large number of different widgets, icon sets.

57Proc Net Monitor

A free monitoring application that allows you to track all active processes and, if necessary, quickly stop them to reduce the load on the processor.

58.PingPlotter

Used to diagnose IP networks, it allows you to determine where the loss and delay of network packets occur.

Small but useful tools

The list would not be complete without mentioning several options for hardware monitoring.

60Glint Computer Activity Monitor

61.RealTemp

A utility for monitoring temperatures of Intel processors, it does not require installation, monitors the current, minimum and maximum temperatures for each core and the start of throttling.

62. SpeedFan

A utility that allows you to control the temperature and speed of rotation of fans in the system, monitors the indicators of the sensors of the motherboard, video card and hard drives.

63.OpenHardwareMonitor

Share with friends or save for yourself:

Loading...