Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Monitoring, Statistics, and Reporting

SSH Tectia Manager provides logs, alarms and statistics, giving an up-to-date and comprehensive view into the SSH Tectia environment. All or any logs collected by the managed SSH Tectia products can be transferred to SSH Tectia Manager. The administrator can configure which parts of the SSH Tectia Client, ConnectSecure, and Server logs they want to collect in the Management Server database.

The information is viewable in graphical format in the SSH Tectia Manager web-based administration interface. The SSH Tectia Manager logs can also be exported to syslog, for retrieval and parsing by third-party network monitoring systems. The logs are archived in the database. For more information on the monitoring and statistics functionality, see SSH Tectia Manager Administrator Manual.

The following data on the SSH Tectia Manager are logged:

Event logs

Logs of internal SSH Tectia Manager system events.

Audit logs

Logs of SSH Tectia Manager administrator actions.

Host environment reports

Overview reports on the managed host environment, based on the host information reported by the Management Agent (for example, host memory status, processor type, operating system version, time since last connection, domain names, Secure Shell version)

Host connection, Management Server, and configuration status

SSH Tectia Manager provides real-time status indicators on the status of the management connection, Management Server service availability, and local changes to SSH Tectia software configurations.

Figure 3.2 shows a sample report on the host environment.

Viewing reports in the administration interface

Figure 3.2. Viewing reports in the administration interface

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps