It security

Páginas: 156 (38794 palabras) Publicado: 3 de diciembre de 2010
Zenoss, Inc.
www.zenoss.com

Zenoss Administration
Copyright © 2009 Zenoss, Inc., 275 West St. Suite 204, Annapolis, MD 21401, U.S.A. All rights reserved.
This work is licensed under a Creative Commons Attribution Share Alike 3.0 License. To view a copy of this license, visit http:// creativecommons.org/licenses/by-sa/3.0/; or send a letter to Creative Commons, 171 2nd Street, Suite 300,San Francisco, California, 94105, USA.

The Zenoss logo is a registered trademark of Zenoss, Inc. Zenoss and Open Enterprise Management are trademarks of Zenoss, Inc. in the U.S. and other countries. Flash is a registered trademark of Adobe Systems Incorporated. Java is a registered trademark of Sun Microsystems, Inc. Linux is a registered trademark of Linus Torvalds. Oracle and the Oracle logoare registered trademarks of the Oracle Corporation. SNMP Informant is a trademark of Garth K. Williams (Informant Systems, Inc.). Sybase is a registered trademark of Sybase, Inc. Tomcat is a trademark of the Apache Software Foundation. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. All other companies and products mentioned are trademarks andproperty of their respective owners. Part Number: 06-102009-2.5-v01

1. About Zenoss .................................................................................................................................... 1 1.1. Zenoss High-Level View .......................................................................................................... 1 1.1.1. Key Tenets................................................................................................................... 1 1.2. Zenoss Architecture and Technologies ..................................................................................... 2 1.2.1. User Layer ................................................................................................................... 3 1.2.2. Data Layer................................................................................................................... 3 1.2.3. Process Layer .............................................................................................................. 3 1.2.4. Collection Layer ............................................................................................................ 4 1.3. Zenoss' Monitoring Approach................................................................................................... 4 1.3.1. File System Monitoring ................................................................................................. 4 1.4. Zenoss Terminology ................................................................................................................ 5 2. Using Zenoss..................................................................................................................................... 7 2.1. Zenoss Interface and Navigation .............................................................................................. 7 2.1.1. Navigation Menu ........................................................................................................... 8 2.1.1.1.Hiding the Menu ................................................................................................ 9 2.1.1.2. Pinning the Menu ............................................................................................... 9 2.1.2. Breadcrumbs ................................................................................................................ 9 2.1.3. User Information Area................................................................................................. 10 2.1.3.1. Update Details ................................................................................................. 10 2.1.4. Portlets ....................................................................................................................... 10 2.1.4.1. Customizing Portlets...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Security
  • Security
  • security
  • Security
  • Security
  • IT
  • Database security
  • Security Vocabulary

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS