Get Live Help
For a list of security features provided by the Foglight Experience Monitor appliance, and for information about evaluating these features in connection with the federal information security standards recommended by NIST (National Institute of Standards and Technology) and promulgated under the FISMA (Federal Information Security Management Act), see the Foglight Experience Monitor Security and Compliance Field Guide.
This section describes configuration settings that allow you to tailor the metrics collected by the system. Topics such as identifying ports and portals and subnets are covered here.
For more information, see these topics:
During the Setup Wizard process you specified the ports and servers that the appliance should monitor. (For more information, see Configuring the appliance). This chapter discusses in much greater detail the configuration settings that allow you to tailor the metrics collected by the system to fit your requirements.
Using the configuration pages found on the Configuring > Monitoring menu, you can adjust configuration settings that influence what metrics are collected. The diagram below depicts the order in which these settings are applied to distinguish the traffic that the appliance will monitor from the traffic that is discarded.
The Protocols page, accessed from the Monitoring menu, allows you to configure the system to monitor applications using Transmission Control Protocol (TCP). TCP is a common transport layer protocol used both for Internet and Intranet applications. With Foglight Experience Monitor you can gather performance and volume metrics for any TCP-based application. Metrics such as IP packet counts, and TCP connection and response time metrics are available. For more information about metric definitions, see the Foglight Experience Monitor Metric Reference Guide.
HTTP and HTTPS (HTTP over SSL) are reliable application protocols that use TCP to transport messages between client and server. Given their widespread usage, these are configured as default protocols when the appliance's configuration database is initialized. If you would like to monitor other TCP-based protocols (such as FTP and SMTP), you must configure those protocols using the procedure defined below.
When configuring protocols and ports on the Protocols page use the following guidelines: