Active Directory, Microsoft 365, and Exchange management and reporting
Hybrid AD, cloud, and file auditing; security; and compliance
Identity security with adaptive MFA, SSPR, and SSO
Reporting, auditing, and monitoring for hybrid Exchange and Skype
Active Directory, Microsoft 365, and Exchange backup and recovery
Hybrid AD, cloud, and file auditing; security; and compliance
SharePoint reporting and auditing
Microsoft 365 security
Cloud security monitoring and analytics
File auditing, data leak prevention, and data risk assessment
File security and storage analysis
Automated patching across multiple OSs and over 850+ third-party apps
Simplified third-party patch deployment via ConfigMgr and Intune
Seamless mobile device management from onboarding to retirement
Remote troubleshooting with integrated chat, voice, and video
Automated OS image creation and seamless role-based deployment
Prioritization-focused enterprise vulnerability management
App control and endpoint privilege management software
Data theft prevention with strict peripheral device control
Browser security with isolation, lockdown, and activity tracking
Sensitive data protection and compliance for endpoint devices
Real-time ransomware mitigation and file recovery for business continuity
Full-stack observability with AIOps and digital experience monitoring
AI-powered, all-in-one SaaS platform for observability and digital experience monitoring
Digital experience, application performance, and infrastructure monitoring
All-in-one vendor risk assessment tool to ensure domain security
Network, server, and storage performance monitoring
Bandwidth monitoring and traffic analysis
Network change and configuration management
Firewall rule, configuration, and log management
IP address and switch port management
Centralized IT alert management
Status pages for real-time status and incident communication
A cloud-native identity platform for workforce IAM
Full-stack service management for enterprises
IT asset management with an integrated CMDB
Unified endpoint management and security
Comprehensive mobile device management
Enterprise remote access
Automated multi-OS patch management
Full-stack monitoring for IT admins, DevOps, and SREs
Status pages for real-time status and incident communication
Cloud cost management for modern software teams
SaaS management platform to maximize ROI
Centralized IT alert management
Secure your IT infrastructure and prove compliance from the cloud
AI-powered unified analytics platform to correlate all IT data
An all-in-one DNS management service to keep your business online
Low-code application development platform
Remote support software
Collaborative project management
Agile project management
All-in-one collaboration tool for unified communication
Secure email hosting solution for businesses
All-in-one video conferencing solution for remote business meetings
All-in-one AR remote assistance software solution for remote collaboration.
Unified network monitoring and endpoint management for MSPs
Unified Active Directory management and reporting solution for MSPs
Unified SIEM solution for MSSPs
Log management and advanced threat intelligence for MSSPs
Complete privileged access security for enterprises
Privileged password management
Full-stack service management for MSPs
Applications Manager's Container monitoring tool ensures a seamless and efficient monitoring process by tracking a comprehensive set of container performance metrics:
Parameters | Description |
---|---|
State | Current state of the Container. Possible states are 'Running', 'Paused', 'Restarting', 'OOMKilled', 'Dead'. |
Exit Code | Last exit code of Docker Container. |
Error | Error message. |
Started At | Latest start time of the Container. |
Finished At | Last time the Container had stopped. |
Restart Count | Number of times the container has restarted. |
Parameters | Description |
---|---|
CPU Utilization | The percentage of CPU utilized. In multi core machines, CPU utilization's value can be greater than 100. |
Memory Utilization | The percentage of memory utilized. |
Processor Count | Total number of processors available. |
Memory Usage | Total memory used by the Container (in MB). |
Memory Limit | Memory limit of the Container (in MB). |
Parameters | Description |
---|---|
Bytes Received | Total number of bytes received by the Container interfaces. |
Bytes Transmitted | Total number of bytes transmitted by the Container interfaces. |
I/O Read | Number of IOs read to/from the disk by the Container. |
I/O write | Number of IOs written to/from the disk by the Container. |
I/O Total | Number of IOs completed to/from the disk by the Container. |
tx-packets Dropped | Packets dropped while transmitting data. |
rx-packets Dropped | Packets dropped while receiving data. |
Parameters | Description |
---|---|
Active File | Cache memory that has been identified as active by the kernel. |
InActive File | Cache memory that has been identified as inactive by the kernel. |
Active Anonymous | The amount of anonymous memory that has been identified as active by the kernel. |
Inactive Anonymous | The amount of anonymous memory that has been identified as inactive by the kernel. |
Cache | The amount of memory used by the processes of this control group. |
Inevictable | The amount of memory that cannot be reclaimed; generally, it will account for memory that has been locked with mlock. It is often used by crypto frameworks to make sure that secret keys and other sensitive material never gets swapped out to disk. |
Page Fault | Total number of page faults of the system. |
Page Major Fault | Total number of major page faults of the system. |
Page In | Each time a page is "charged" (added to the accounting) to a cgroup, pgpin increases. |
Page Out | When a page is “uncharged” (no longer “billed” to a cgroup), pgpgout increases. |
Parameters | Description |
---|---|
Container Name | Name of the Container. |
Container Id | Unique Id used to represent the Container. |
Image | Base image used to create the Container. |
Host Name | 'Hostname to use for the Container.' |
Process Id | Process Id mapped to the Container. |
Ip Address | Assigned IP address of the Container. |
Mac Address | Assigned Mac address of the Container. |
User | User associated with the Container. |
Created At | Time when the Container was created. |
Command | Command used while running the Container. |
Path | Path where the command will be executed. |
Ports | Details of all the ports exposed by the Container. |
Port Binding | Details of all the ports exposed by the Container and their mappings with the host. |
Thank you for your feedback!