Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Creating Host Views

The idea about the host views is to have the information on numerous managed hosts divided into sensible entities so that managing the host data is easier. Host views are different hierarchical groupings of the hosts, and they can be defined according to the characteristics of the hosts or the organizational units the hosts belong to.

Once the Management Server has been installed, you can create a suitable set of host views and add host groups into the views.

The work flow for managing host data

Figure 3.2. The work flow for managing host data

At least one host view is required, but typically more views are used. Consider what are the most relevant criteria in your environment for arranging the host information, and create a host view for each criterium. For example, you could use host views based on host locations and operating systems.

If you create the host views based on criteria that the host machines provide automatically, the hosts will be put directly into the relevant views when they connect to the Management Server for the first time. For this reason, it is advisable to configure the host views before installing the Management Agents.

To start managing the host views, click Hosts → Manage views on the menu.

The Manage views page

Figure 3.3. The Manage views page

To create a new host view:

  1. Click Hosts → Manage views on the menu.

  2. On the Manage views page, click the Add new view button.

  3. Enter a name for the view and click Save.

To rename a host view, click the Rename button on the Manage views page next to the view you wish to rename. Enter a new name for the view and click Save.

To delete a host view, click the Delete button on the Manage views page next to the view you wish to remove. Note that a host view cannot be removed if other objects of the system refer to it.

For detailed instructions on managing the host views, see Managing Host Views.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more