Key Features

VirtualMetric was designed to have a clean and innovative reporting interface, and has been enhanced for a simple user experience. It comes with many dashboard items and dynamic data tables, so you don't need to do any programming to create dashboards. You can export all historical data in various formats. All reports are printer-friendly. You will have the same user experience across all mobile devices because of our responsive dashboard design.

In this section, you can find the highlights of our innovative features.

Realtime Monitoring

VirtualMetric can collect important processor, memory, disk, and network counters in realtime. You can select more than one counter with different units, and you can view them on the same chart. You can filter Device Groups, Clusters, or Servers to monitor specific servers.

Overview
Multi-Counters

Realtime Monitoring uses an in-memory database and stores only 90 seconds of monitoring data.


Realtime Reports

VirtualMetric reports are our new tool giving you the ability to create custom charts and reports by using our large sets of inventory and performance counters—which now have more than 700 sensors. Unlike other products on the market today, VirtualMetric Insight offers the creation of performance charts and custom reports in real time.

Monitoring Overview

VirtualMetric draws various performance counters on the same chart, and helps you find correlations between them. You can combine sensors by using our large sets of inventory and performance counters. You can design your own chart and report templates, and share them with your organizations.

Report Overview
Top IO Usage<

Log Analysis

VirtualMetric offers the ability to collect different types of logs (custom logs, application logs, syslogs, etc.), in addition to do custom log date parsing, log filtering by query, and showing trends on a bar chart.

Log Analysis

Change Tracking

VirtualMetric tracks every single change in your environment to keep you informed on updates. You will never miss any software, hardware, service, or configuration updates anymore. You can export all changes within specific date ranges in CSV, Excel, and PDF formats.

Configuration Changes Overview

Network Security

VirtualMetric logs every TCP connection made on your servers to troubleshoot network related issues and quickly identify DDoS attacks. It offers the following reports for Network Security.

  • All TCP connections, with IP Address and Geo location information

  • All TCP connections Dropped and Allowed via Windows Firewall

  • All authentication requests made by WinRM, SSH, RDP and Console connections

  • Detailed user information, with IP Address and Geo location for logon requests

Geo-Activity Overview
Network Sessions Overview

Forensic Analysis

VirtualMetric offers forensic reports giving you complete visibility on your servers. With more than 10 Forensic Reports, you will be able to identify malware activities, suspicious movements, and configuration changes on your servers.

Forensic Reports

  • Event Logs

  • Security Logs

  • Security Threats

  • Active User Sessions

  • File Change Tracking

  • Pending Updates

  • Running Processes

  • Startup Services

  • Installed Updates

  • Installed Applications

  • Startup Commands

  • Local DNS Records

  • Local Administrators

Forensic Overview

Windows Defender

VirtualMetric offers Windows Defender reports to track virus, malware, trojan, etc. activities on your servers.

Security Thread Overview
Security Thread Overview

You can easily track Windows Defender activities with the Security Threats reports. VirtualMetric provides these in real time. It also offers following Windows Defender information:

  • Last Quick and Full scan ages, including their start and finish times.

  • Antimalware, Antispyware, Antivirus, and NIS signature last update dates and signature versions.

  • On Access and Real Time Protection status.

  • Pending reboot status.


Object Access Auditing

VirtualMetric offers Object Access Auditing to let you know what actually happened to your files and folders. Who accessed them, deleted them, edited them, moved them, where the files and folders went etc. You get precise information on object access such as which user performed the action, what was the result of the action, on which server it happened, etc.

Object Access Auditing Overview

You can get these object access audit logs in real time.

Last updated