www.softinventive.com

Technical White Paper

Terms

TNM — abbreviation from "Total Network Monitor", name and trademark of the described application.

Minimal system requirements

CPU: 1000 Mhz.
Memory: 512 Mb.
Disk space: 30 Mb for installation plus 1-5 Mb for monitoring project saving.
Network: TCP/IP.
Operating system: Windows 2000 / Windows 2000 Server.

Requirements to remote devices

Probe type
Requirements
Internet probes Appropriate protocol support and deployed TCP port availability
Windows probes Windows NT4 / 2000 / XP Pro / Vista / 2000 Server / 2003 Server / 2008 Server / Windows 7; administrator rights; ipc$, admin$ resources
Registry state "Remote registry" service
System efficiency RPC protocol, open TCP port 135, ”Windows management Instrumentation (WMI)” service
File probes NetBIOS and SMB protocols, open TCP ports 139 and 445

Description of technology

Monitoring project consists of network hierarchy (tree-like device group ierarchy) manually created by the user and/or by means of scanning tools, and monitors representing basic element of the network monitoring.

Network monitoring is a variety of different probes for each device in the network and an appropriate response according to the results of these probes. Each device includes monitors manually created by the user.

Моnitor is a combination of certain type of the probe with the parameters, list of actions executed aссording to the conditions and the result of the probe, and authorization parameters for some probe types.

Network monitoring includes management of all project monitors work and its journalizing. Monitor work consist in probe executing in certain time intervals and in action execution according to the conditions and the result of the probe. Journalizing is carried out according to the executed probes and actions.

Program operation pictorial diagram see below:

Potential risks

There are some rare problems in TCP probes work. For the moment they are under examination and debugging process. Problems are related to a large number of monitors, deploying TCP probes.

Encrypted monitoring project passwords (for authorization in the computers or services). Symmetrical proprietary block cipher is deployed in the program.

Page last modified 13:35, 15 Apr 2009 by Admin

Tags:

Files (0)