Table of Contents
- Getting Started
- Agent-Based Management
- Data Providers
- Directory Services
- Event Log Archiving for JSIG and CMMC Compliance
- Auditing
- Hosts
- Templates
- Template Properties
- Batch Update Templates
- Assign Templates
- Log Management Templates
- SCAP Compliance Monitor
- File and Directory Monitor Templates
- Windows Monitor Templates
- Account Lockout Monitor Template
- Logon Monitor Template
- CPU Monitor Template
- Memory Monitor Template
- Disk Space Monitor Template
- SMART Monitor Template
- Process Monitor Template
- Service Monitor Template
- Performance Counter Monitor Template
- PowerShell Template
- Registry Value Monitor Template
- System Security Monitor Template
- Active Directory User Monitor Template
- Active Directory User Integrity Monitor Template
- Task Scheduler Template
- Clock Synchronization Template
- Defragment NTFS Disks Template
- Windows Audit Policy Monitor Template
- Windows Logon As Monitor Template
- Windows Update Template
- Windows Management Instrumentation (WMI) Templates
- Database Monitor Template
- Directory Service Monitor Template
- DNS Blacklist Monitor Template
- DNS Monitor Template
- Domain Expiration Monitor Template
- Network Speed Monitor Template
- Ping Monitor Template
- Database Table Reseed
- SQL Server Shrink and Backup Template
- SSH Shell
- TCP Port Scan Monitor Template
- Website Monitor Template
- Wake On LAN Template
- SSL Certificate Monitor Templates
- Email Monitor Templates
- SNMP Monitor Templates
- Windows Accounts Templates
- Monitors
- Reports
- File and Permission Reports
- Summary Reports
- Auto-Configurators
- Filters
- Actions
- Database Actions
- Desktop Actions
- Email Actions
- Event Log Actions
- Executable Actions
- File Actions
- IIS IP Address Restriction Actions
- Microsoft Teams Actions
- PowerShell Actions
- Report Actions
- Service Actions
- SMS Actions
- SNMP Trap Actions
- Syslog Actions
- Template Actions
- IIS IP Address Restriction Actions
- Action Variables
- Schedules
- Environment Variables
- Options
- Account Lockout Monitoring and Reporting
- Merging Logs
- SNMP
- SSH Shell
- Syslog
- Exporting and Importing Configuration Objects
- Shared Views
- Active Directory User and Group Filters
- Assign Actions
- Assign Azure Audit Logs
- Assign Consolidated Logs
- Assign Directories
- Assign Disks
- Assign Event Logs
- Assign Files
- Assign Services
- Assign Shares
- Auto-Config Host Assignment Properties
- Define CSV and W3C Log Entry Columns
- Define Log Entry Columns
- Define Log Entry Columns with Regular Expressions
- Executable Status
- Executable Timeline
- Explicitly Assigned Logs
- File Explorer
- General Executable Properties
- Report Columns
- Report Date/Time Ranges
- Report Security Event Log Filters
- Select Folder or File
- Target Files and Sub-Directories
- Command Line Interface
- Server Configuration
- Agent Configuration
- Troubleshooting
- Terminology
Corner Bowl Server Manager
SIEM, IPS, Server Monitoring, Uptime Monitoring and Compliance Software
TCP Port Scan Template
The TCP Port Scan Template enables you to validate a TCP server is available and optionally returns a packet. This template is typically used to notify network administrators when a network server application is down or slow to respond.
How to configure the TCP Port Scan Template:
- From the Menu Bar, select File | New. The Create New Object View displays.
- From the Create New Object View, expand Templates | Network and Application Monitors then select TCP Port Monitor. The New Template Properties View displays.
- The Template Properties view contains 4 tabs.
- General
- Options
- Agent Template
- Actions
The Options Tab
- Use the Server drop-down to select the target server you would like to monitor.
Note
Once selected, the server is automatically assigned to this template.
- Use the TCP Port definitions controls to specify the TCP ports to scan.
- To add a port, click the Add button. A new line is added to the list.
- Use the Host text box when configuring this template as an Agent-Based Template and you would like the agent device to scan a remote port rather than a local port.
- Use the Value text box to enter the TCP port to scan.
Note
Comma separate multiple ports. Dash separate port ranges.
For example:
80, 443, 1000-2000
- Use the Description text box to enter a friendly TCP port description.
- Use the Delete button to remove the selected line items form the list.
- Use the Clear button to clear the list.
- Use the Up button and Down button to reorder the list.
- Use the Warning and Critical threshold controls to set the timeout trigger thresholds.
- Use the Read response check box to configure the monitor to read the first packet received.
- Finally, select the General Tab, then click the click the Auto-Generate Name button to auto-generate a name based on the configured settings.