FAQs on server monitoring agent security
-
Does Site24x7 ask for any client server password(s) to perform monitoring?
No, Site24x7 does not ask for any server password(s) to perform monitoring.
-
How does Site24x7 monitor availability of server?
A status information check (heartbeat check) is done every minute by the agent to the Site24x7 Primary Data Center. The server's uptime is decided by how long it's been since Site24x7 received a heartbeat check from the agent running on your server.
Learn more
.
-
How is performance data sent from the user environment to the Site24x7 Data Center?
The server monitoring agent uses a HTTPS connection to send performance data from the user environment to the Site24x7 Data Center.
-
Do I need to whitelist any ports/domains to allow access for the agent?
Yes, whitelist the ports and domains
listed in this article
to allow access for the agent.
-
What data is collected by the agent(s)?
Performance metrics like CPU, memory, disk usage, network stats, processor queue length (for Windows), load average (for Linux) are collected by the agents. For the complete list of performance metrics collected by each of these agent,
refer this article
.
-
How is performance metrics collected by the agent(s)?
The Windows agent collects performance data using WMI queries, performance counters and few built-in APIs.
The Linux, FreeBSD, and MacOS agents collect performance data using shell commands like top, free, df, ps etc. For the complete list of performance metrics collected by each of these agent,
refer this article
.
-
Does Site24x7 store user's software inventory data?
Inventory details like the installed softwares for the last 30 days are shown in the
Root Cause Analysis (RCA) report
.
Note: But, this data is captured only when the server monitor is in the Down state
during a server downtime
.
-
What details about Windows services and Linux processes are stored in Site24x7?
The process command line arguments and path are encrypted and stored in Site24x7 for performing
service and process monitoring
.
-
When does the Site24x7 agent declare a server monitor as Down?
Refer to this
article to check the scenarios
when the agent will declare a server monitor as Down.
-
Does Site24x7 server monitoring support servers with IPv6 protocols?
As of now, Site24x7 datacenters do not support data reception from servers running IPv6 protocol. Our server monitoring infrastructure uses IPv4 protocol. Support for IPv6 protocol is under development and will be released shortly.
Related Articles
-
Security for Server Monitoring
-
Security for Network Monitoring
-
Security for Agentless Monitoring
Related Articles
How to uninstall the Site24x7 Windows Server Monitoring Agent
Method 1: To uninstall the Site24x7 Windows Server Monitoring Agent, click the link below: https://staticdownloads.site24x7.com/server/Site24x7WindowsAgentUninstall.zip Unzip and execute the Uninstall.bat file in the Command Prompt as an ...
Prerequisites for Node.js agent installation
For a smooth Node.js agent installation, ensure that you've fulfilled the following prerequisites. The environment should have node version 16.20.2 or above installed. The application user should have full permission to access the agent directory. ...
Troubleshooting false positive alerts in monitoring
Problem False positive alerts are being generated. Possible cause The monitoring system is down in some locations. The Website monitor might be configured for one location, such as Seattle, but may appear down when accessed from another location, ...
Unable to add SQL insight monitor
If the SQL Insight monitor is not getting added even after entering your credentials, try these troubleshooting steps: Ensure that the Auto-discover applications feature is enabled. If not, you will need to trigger discovery using the Discover ...
Exclude the selective SSH algorithms in On-Premise Poller during SFTP Transfer monitoring
By excluding SSH algorithms, you can restrict Site24x7 SSH Client from using the excluded algorithm while connecting to the SSH server during SFTP Transfer monitoring. Follow the steps mentioned below for SSH algorithm exclusion in On-Premise Poller ...