High demand environments such as 911 Call Centers, air-locked Military installations, financial institutions, and healthcare organizations employ ELM for reliable on-premise monitoring. Adding to the challenge, these applications commonly generate tens of millions of events each day across hundreds of servers and require years of archiving.
ELM Enterprise Manager is a scalable solution that can be deployed across multiple different network architectures while centralizing your monitoring, alerting and reporting needs.
ELM Enterprise Manager Most Popular Licenses & Features:
Advanced Event Log Monitoring
Event logs are the richest source of management data on the Windows platform. They document the security and status changes that affect server and workstation operations. Unfortunately, the event logs are isolated locally. Instead of taking advantage of their immediate posting, they typically only reviewed during forensic investigations.
ELM Enterprise Manager-Event License elevate Windows event log monitoring to real-time. Seconds after written, this advanced event log monitor reliably collects some or all of the Windows event log records. Then, local Agents promptly encrypt and transmit the event parameters and message details to the central ELM Server.
From there, the ELM Server securely inserts the events into a user-provided MS SQL Server. Alternately, a run-time version is provided in the ELM Enterprise Manager download. With the logs reliably stored, the software tools populate filtered Views. These dynamic displays also trigger notifications and are the source for custom Reports.
While email alerts are the most commonly used method, Dashboard Notifications are also available. This Notification Method posts icons identifying the severity of filtered events and maintains the peak value until manually cleared. As a result, ELM keeps System Administrators up to date on the status of their Windows Servers.
Windows Server Monitoring + Events
Management of Windows Servers takes urgency. One minute they are supporting network security and processing critical applications. Seconds later, actions by a disgruntled employee threaten security or process bottlenecks restrict productivity. Fortunately, the Windows event logs documents many of these critical changes. However, when event log monitoring is not enough, ELM Enterprise Manager-Core License extends the scope to include performance and status monitoring.
The ELM Enterprise Manager-Core License includes all Monitors available in the Event License plus the Performance Monitor, Process Monitor, Service Monitor and File Monitor. In addition, it includes the Performance Collector. The first four of these monitors leverage the event log management features. These Windows Server Monitors watch for state changes, thresholds breaches or character string matches and write an event log entry confirming their detection. Then, the event log technologies take over. These events can be Viewed and used to trigger alerts.
The Performance Collectors support the ELM Dashboard and server performance reports. At scheduled collection intervals, default Performance Objects/Counters/Instances are collected normalized, weighted and used to populate a set of Dashboard Bottleneck Spark Lines. In addition, scheduled Performance Reports document critical metrics for monitoring computer resources.
ELM Enterprise Manager-Core License includes the Monitors and Collectors to automate event log management, detect changing states and conditions, and identify performance Bottlenecks. Be proactive, get the Window Server Monitor with the Core Licenses.
Additional Features and Product Architecture
- Agent-based for reliability and security
- Failover Database to provide uninterrupted monitoring and alerting
- Heartbeat Monitoring to actively confirm the event log monitor processes
- Event Correlation to determine and respond on event sequences
- Dashboard for high visibility of alerts and performance bottlenecks
- Event Log Archiving efficiently transfer data to managed Archive Databases
- Event Forwarding to support n-tier architectures and security policies
- Standby Architecture to support disaster recovery policies