Table of Contents
- Getting Started
- Agent-Based Management
- Common Tasks
- Data Providers
- Directory Services
- Auditing
- Hosts
- Templates
- Template Properties
- Batch Update Templates
- Assign Templates
- Log Management Templates
- SCAP Compliance Monitor
- Active Directory User Monitor Templates
- File and Directory Monitor Templates
- Windows Monitor Templates
- Account Lockout Monitor Template
- Logon Monitor Template
- CPU Monitor Template
- Memory Monitor Template
- Disk Space Monitor Template
- SMART Monitor Template
- Process Monitor Template
- Service Monitor Template
- Performance Counter Monitor Template
- PowerShell Template
- Registry Value Monitor Template
- System Security Monitor Template
- Task Scheduler Template
- Clock Synchronization Template
- Defragment NTFS Disks Template
- Windows Audit Policy Monitor Template
- Windows Logon As Monitor Template
- Windows Update Template
- WMI Query Template
- Network and Application Monitor Templates
- Database Monitor Template
- Directory Service Monitor Template
- DNS Blacklist Monitor Template
- DNS Monitor Template
- Domain Expiration Monitor Template
- Network Speed Monitor Template
- Ping Monitor Template
- Database Table Reseed
- SQL Server Shrink and Backup Template
- SSH Shell
- TCP Port Scan Monitor Template
- Website Monitor Template
- Wake On LAN Template
- SSL Certificate Monitor Templates
- Email Monitor Templates
- SNMP Monitor Templates
- Windows Accounts Templates
- Monitors
- Reports
- Auto-Configurators
- Filters
- Actions
- Database Actions
- Desktop Actions
- Email Actions
- Event Log Actions
- Executable Actions
- File Actions
- IIS IP Address Restriction Actions
- Microsoft Teams Actions
- PowerShell Actions
- Report Actions
- Service Actions
- SMS Actions
- SNMP Trap Actions
- Syslog Actions
- Template Actions
- IIS IP Address Restriction Actions
- Action Variables
- Schedules
- Environment Variables
- Options
- SNMP
- SSH Shell
- Syslog
- Shared Views
- Active Directory User and Group Filters
- Assign Actions
- Assign Azure Audit Logs
- Assign Consolidated Logs
- Assign Directories
- Assign Disks
- Assign Event Logs
- Assign Files
- Assign Services
- Assign Shares
- Auto-Config Host Assignment Properties
- Define CSV and W3C Log Entry Columns
- Define Log Entry Columns
- Define Log Entry Columns with Regular Expressions
- Executable Status
- Executable Timeline
- Explicitly Assigned Logs
- File Explorer
- General Executable Properties
- Report Columns
- Report Date/Time Ranges
- Report Security Event Log Filters
- Select Folder or File
- Target Files and Sub-Directories
- Command Line Interface
- Server Configuration
- Agent Configuration
- Troubleshooting
- Terminology
Corner Bowl Server Manager
SIEM, IPS, Server Monitoring, Uptime Monitoring and Compliance Software
Installation Components
In this Topic
Overview
Corner Bowl Server Manager includes multiple components to securely implement centralized remote management, log entry retention, vulerablility scanning, monitoring, reporting, remediation and notification.
Component | Description |
---|---|
Management Server | Either a Windows Service or Linux Daemon that provides all server functionality including log entry retention, vulnerability scanning, monitoring, reporting, remediation and notification. Remote management is implemented using a combination of native operating system APIs, network interface APIs, and optimally, Corner Bowl Agent APIs. |
Agent | Either a Windows Service or Linux Daemon that connects outbound to the Management Server, or a collection of servers, over a TCP/IP port, optionally encrypted TLS 1.2/3, then receives management instructions from the server, for example, archive, compress and upload the latest Windows Event Logs or Linux audit logs. |
Management Applications | |
Management Console | Either a Windows WPF Client Application or an Avalonia Client Application that connects outbound to any server, over a TCP/IP port, optionally encrypted TLS 1.2/3, then authenticates using either Windows Account Credentials or Linux SSH Credentials. Once connected, network administrators and ISSMs use the application to configure the server while read-only auditors use the application to audit logs. |
Tray Icon | Only available on Windows at this time, the Tray Icon provides remote real-time desktop notification messages and sounds. |
Command-Line Interface (CLI) | A console application that enables users to remotely connect to the Management Server, authenticate then execute management and auditing functions through either the command-line interface or a script. |
How to Install on Windows
- Windows Management Server
- Windows Agent
- Windows Management Console (Includes all Management Applications)