The Asset Management section provides a centralized view of router data collected after the RHEL proxy is configured, allowing you to monitor and manage them easily.
1. Navigate to IT Management > Asset Management.
The SYSTEMS CURRENTLY BEING MONITORED page is displayed.
Monitoring:
The Monitoring provides a centralized view of all systems currently being monitored within the IT infrastructure. This displays critical details such as host names, private and public IP addresses, MAC addresses, operating systems, uptime status, device types, CPU usage, and memory consumption, allowing to keep track of system health in real-time. Each entry represents a device or virtual machine, indicating whether it is operational (Up/Down status) and how long it has been online. Additionally, the dashboard captures logged-in users and timestamps for better security tracking. The tab also features filtering, searching, and export options, making it easy to analyze, troubleshoot, and generate reports on system performance. By offering an organized and detailed overview, the Monitoring tab ensures proactive IT management, enabling administrators to detect and resolve potential issues before they escalate.
Settings icon provides a highly customizable interface, allowing users to modify the displayed data by selecting specific columns. This customization feature enhances usability and efficiency, ensuring that IT administrators focus on the most relevant metrics without unnecessary clutter.
When a user clicks on a device, the Device Details is displayed, providing comprehensive insights into the selected system's specifications, performance, and operational status.
Specifications :Display the device details and performance monitoring (cpu and memory utilization).
Triggers: Lists event logs and alerts associated with the device.
Monitoring: Provides real-time status updates on device activity.
AI Prediction: Predictive analytics based on historical performance trends.
Log: Displays recorded activities and security and system logs.
Health Check: Displays diagnostic insights into system health.
Settings: Allows configuration adjustments and customization for the device.
Non Monitoring:
The Non-Monitoring provides a detailed list of new, unmonitored, or failed devices that are currently not being actively tracked within the monitoring system. This section is crucial for IT administrators to identify devices that require attention, either due to failed connectivity, configuration issues, or unregistered status.
Installing:
This shows devices that are currently undergoing installation or onboarding within the monitoring system. These devices may be in the process of firmware updates, configuration setups, or network registration.
Ignored :
This contains devices that have been intentionally excluded from active monitoring due to administrative policies, testing purposes, or non-essential usage.
Printers:
This shows all network-connected printers that are registered within the system, providing visibility into their availability and status.
Cameras :
This monitors networked security cameras deployed within the infrastructure, ensuring that surveillance systems are online and functioning correctly.
Routers:
The Routers provides visibility into all network routers within the infrastructure, ensuring they are operational and configured correctly.
Switches:
This tracks all network switches, allowing IT administrators to monitor traffic distribution and device connectivity.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article