Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated the hideelements-macro macro with the following parameter(s): []

Feature released in SummitAI Asset Management (Denali SP3 HF14, Asset Management)

What's New?

Monitoring Accounts are the User Accounts that can access the Remote Machines. These accounts require authentication and authorization to access data and run certain tasks on the Target Machine. Monitoring Accounts can be configured for a specific Tenant. For more information, see Discovery and Monitoring.  

An Admin or Analyst can now configure User Accounts for User Authentication based deployments under Monitoring Accounts. 


Benefits

  • Provides provision to configure User/Service accounts in the Admin console. 
  • Helps in installing the application on end user machine remotely. 

Configure Monitoring Accounts

To configure Monitoring Accounts, perform the following steps:

  1. Navigate to Admin > Advanced > Discovery & Monitoring > Monitoring Account. 

  2. Under the Actions tab, click Add New. The Monitoring Account Details page will be displayed. 

  3. Under the Details section of the MONITORING ACCOUNT page, specify all the required information. For more information about the fields,seeField Description. 

  4. Click SUBMIT. A new Monitoring Account is configured. 

Figure: MONITORING ACCOUNT Page

Anchor
Field Description
Field Description
Field Description 

The following table describes the fields in Monitoring Account page. 

FIELD DESCRIPTION
UsedFor Select the protocol used for monitoring. This is a mandatory field. 
SFTP Servername Enter the IP Address or theHost Name. 
User Name  

Type in the username of the User to whom you want to provide the administrative rights to access the Windows server machines. This is a mandatory field.

Password 

Type in the password, which is a mandatory field. 

Re-enter Password

Re-enter the password, which is a mandatory field.

Fingerprint Algorithm Enter the security algorithm for file transfer. For example, SHA-256. 
DescriptionType in a brief description about the user or the purpose of adding MonitoringAccount or any warning message. For example, you can create a user to access data from a group of critical servers, you can add a message like “Do not delete this username.”
Active 

Indicates the status set for the Monitoring Account. 

  • If selected, the Monitoring Account is enabled. 
  • If not selected, the Monitoring Account becomes inactive.


Actions

This section explains all the icons displayed in the ACTIONS panel of the Monitoring Account page.


Filters

Click the Filtersicon to select a value for theUsed For list.
Click
SUBMIT. 

Figure: FILTERS pop-up 


Show List

Click SHOW LIST to display the LIST table showing all the Monitoring Accounts configured in the SUMMIT application for the selected Tenant. 

Figure: Show List icon under ACTIONS panel  


Figure: MONITORING ACCOUNT page: List of Monitoring Accounts 


History 

Click the CHANGE HISTORY icon to view the change history details of the Monitoring Account. 

Figure: Change History icon under ACTIONS panel 


Figure: Change History Details page