Method and apparatus of establishing customized network monitoring criteria
First Claim
1. A method, comprising:
- initiating an all objects trigger command to monitor a predefined monitor set of all objects except objects which are identified as not discoverable on at least one computer device based on audit information obtained during an audit session;
receiving, via a receiver of another computer device, the audit information representing device hardware attributes and device software attributes of the at least one computer device and storing the audit information in a memory, wherein the audit information comprises at least one less object to be monitored than the predefined monitor set of all objects originally intended to be monitored by the all objects trigger command;
comparing, via a processor of the another computer device, the audit information to the predefined monitor set of all objects intended to be monitored on the at least one computer device;
responsive to the comparing, removing at least one object present in the predefined monitor set of all objects initiated by the all objects trigger command which is not identified from the audit information;
creating, via the processor of the another computer device, a new monitor set of objects based on the comparison of the audit information and the predefined monitor set of all objects, and at least one new threshold as a value that should not be exceeded by the at least one computer device, wherein the new monitor set of objects has at least one fewer objects to be monitored than the predefined monitor set of all objects; and
monitoring, via the processor of the another computer device, the at least one computer device based on the new monitor set of objects.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example of the present invention may include a method of monitoring at least one computer device operating on a network. The method may include receiving audit information representing attributes of the computer device and storing the audit information in memory. The method may also include comparing the audit information to a predefined monitor set of objects to be monitored. The method may further include creating a new monitor set based on the comparison of the audit information and the predefined monitor set. The new monitor set is different from the predefined monitor set and is generally used to monitor objects which are included in the audited device. The method may also include monitoring the at least one computer device based on the new monitor set.
8 Citations
20 Claims
-
1. A method, comprising:
-
initiating an all objects trigger command to monitor a predefined monitor set of all objects except objects which are identified as not discoverable on at least one computer device based on audit information obtained during an audit session; receiving, via a receiver of another computer device, the audit information representing device hardware attributes and device software attributes of the at least one computer device and storing the audit information in a memory, wherein the audit information comprises at least one less object to be monitored than the predefined monitor set of all objects originally intended to be monitored by the all objects trigger command; comparing, via a processor of the another computer device, the audit information to the predefined monitor set of all objects intended to be monitored on the at least one computer device; responsive to the comparing, removing at least one object present in the predefined monitor set of all objects initiated by the all objects trigger command which is not identified from the audit information; creating, via the processor of the another computer device, a new monitor set of objects based on the comparison of the audit information and the predefined monitor set of all objects, and at least one new threshold as a value that should not be exceeded by the at least one computer device, wherein the new monitor set of objects has at least one fewer objects to be monitored than the predefined monitor set of all objects; and monitoring, via the processor of the another computer device, the at least one computer device based on the new monitor set of objects. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a memory configured to store audit information; a receiver configured to receive the audit information that represents device hardware attributes and device software attributes of at least one computer device and store the audit information in the memory; and a processor configured to initiate an all objects trigger command to monitor a predefined monitor set of all objects except objects which are identified as not discoverable on the at least one computer device based the audit information obtained during an audit session; compare the audit information to the predefined monitor set of all objects to be monitored on the at least one computer device, wherein the audit information comprises at least one less object to be monitored than the predefined monitor set of all objects originally intended to be monitored by the all objects trigger command, responsive to the compare operation, remove at least one object present in the predefined monitor set of all objects initiated by the all objects trigger command which is not identified from the audit information, create a new monitor set of objects based on the comparison of the audit information and the predefined monitor set of all objects, and at least one new threshold value as a value that should not be exceeded by the at least one computer device, and wherein the new monitor set of objects has at least one fewer objects to be monitored than the predefined monitor set of all objects, and monitor the at least one computer device based on the new monitor set of objects. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium comprising instructions that when executed cause a processor to perform:
-
initiating an all objects trigger command to monitor a predefined monitor set of all objects except objects which are identified as not discoverable on at least one computer device based on audit information obtained during an audit session; receiving the audit information representing device hardware attributes and device software attributes of the at least one computer device and storing the audit information in a memory; comparing the audit information to the predefined monitor set of all objects to be monitored on the at least one computer device, wherein the audit information comprises at least one less object to be monitored than the predefined monitor set of all objects originally intended to be monitored by the all objects trigger command; responsive to the comparing, removing at least one object present in the predefined monitor set of all objects initiated by the all objects trigger command which is not identified from the audit information; creating a new monitor set of objects based on the comparison of the audit information and the predefined monitor set of all objects, and a new threshold value as a value that should not be exceeded by the at least one computer device, wherein the new monitor set of objects has at least one fewer objects to be monitored than the predefined monitor set of all objects; and monitoring the at least one computer device based on the new monitor set of objects. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification