Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Networking

Spotlight: Zenoss network monitoring tool

By Jack Wallen August 17, 2010, 3:48 AM PDT

Image
1
of 5

a_dashboard.png
a_dashboard.png
Spotlight: Zenoss network monitoring tool

Zenoss Dashboard

Zenoss Dashboard

From the Dashboard you can see how much Zenoss has to offer. You have to make sure you obtain a Google Maps API key so you can include maps.

For a full review of the Zenoss network monitoring tool, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Zenoss network monitoring tool

Zenoss daemons

Zenoss daemons

Zenoss contains numerous daemons, not all of which must be running. But certain services require certain daemons and this is where you start/stop them.

For a full review of the Zenoss network monitoring tool, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Zenoss network monitoring tool

Auto discovery

Auto discovery

Here is a listing of my measly LAN network which was auto-discovered by Zenoss.

For a full review of the Zenoss network monitoring tool, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Zenoss network monitoring tool

Event logs

Event logs

From the events log you will see a listing of every single action that goes on between Zenoss and your network.

For a full review of the Zenoss network monitoring tool, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Zenoss network monitoring tool

Device overview

Device overview

From the device overview you can fill in any necessary information that was not auto-discovered.

For a full review of the Zenoss network monitoring tool, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

  • Networking
  • Account Information

    Share with Your Friends

    Spotlight: Zenoss network monitoring tool

    Your email has been sent

Share: Spotlight: Zenoss network monitoring tool
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Hardware inventory policy

    This policy describes guidelines your organization can follow to track, process and decommission IT equipment. From the policy: SUMMARY An organization’s IT hardware inventory constitutes a significant capital investment in order to perform company operations. Because hardware represents a critical asset and often holds organizational data, it is important for the company to track each ...

    Published:  January 23, 2023, 11:00 AM EST Modified:  January 24, 2023, 11:00 AM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Malware response checklist

    Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is to be minimized. Because even the best protected networks become infected, all organizations must have ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 1:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Securing Windows 10 systems

    Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10 deployments follow this checklist from TechRepublic Premium. Also included in this checklist: Security solutions Product ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cloud data storage policy

    Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers many benefits to consumers and companies ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 3:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice