Server and Workstation Monitoring PDF Print E-mail
What is Server and Workstation Monitoring?

We have agents loaded on all computers and servers on your network. The principles behind Server and Workstation monitoring are the same as with the Network Monitoring, except we look for different things. With Network Monitoring, we are monitoring the health of the entire network, whereas with Server and Workstation monitoring only monitors the health and status of that individual machine.

What happens when a Workstation is monitored?

Don't worry - we aren't spying on your workstation. We only collect data about the health of your workstation. Here are some examples of the types of data we collect:

  • What is the daily processor usage
  • Does the processor hit 100%, and if so - for how long, and how many times a day
  • How much memory is being used on the machine
  • Does the memory usage hit 100%, and if so - for how long, and how many times a day
  • Which applications use the most system resources
  • How much free space is available
  • Are all the applications running the most up-to-date software patches
  • Are all the hardware components running the best available driver(s)


This information helps us keep your workstation running at top performance by ensuring it has adequate resources for the programs/services it needs to perform its daily functions. In addition, the Patch Management system constantly monitors for approved updates and loads those updates during times when the computer is not in use (lunch, before or after work)

What happens when a Server is monitored?

A Server has all the same stats ran as a Workstation does, but has a few more processes to watch for. Depending on the role of your server will determine the types of activities to watch for on your server. Below are some situations and examples:

  • If your server shares files for all the computers on your network, we actively analyze the file sharing activity for file locks, network usage, and indexing - anything to improve performance of file sharing.

  • If your server runs as a web server, we need to watch for web access, hack attempts, log activity, and watch system resources for the web activity so the server isn't drained from serving web pages.

  • If your server runs as an email server, we need to watch for SPAM, unauthorized relays, performance, mailbox sizes, hack attempts, system errors, and system statistic information to ensure the server has plenty of power

  • If your server is a database server, we will need to analyze the performance of the database, watch the log activity, setup a regular maintenance plan for backups and testing, and run tools to optimize the database