PRTG Manual: Group Settings

On a group's overview page, click the Settings tab to change settings.

Add Group

The Add Group dialog appears when adding a new group to a parent group. It only shows the setting fields that are imperative for creating the group. Therefore, you will not see all setting fields in this dialog. For example, the Group Status option is not available in this step.

You can change all settings in the group's Settings tab later.

Group Settings

The following settings are available in the Settings tab of every group. As you may not need all of these for every group, just regard the settings you really need, ignoring the others.

icon-i-roundThis documentation does not refer to the setting of the special Root group. The settings available there differ from those described here.

We recommend that you define as many settings as possible in the Root group, so you can inherit them to all other objects further down in the device tree hierarchy.

icon-i-roundThis documentation refers to the PRTG System Administrator user accessing the Ajax interface on a master node. If you use other user accounts, interfaces, or nodes, you might not see all of the options in the way described here. If you use a cluster installation, note that failover nodes are read-only by default.

Basic Group Settings

Group Name

Enter a meaningful name to identify the group. The name will be shown by default in the devices tree and in all alarms.

Status

Choose if monitoring for this group is started or paused. .We recommend that you use the default value. You can add additional tags to it, if you like.

  • Started: Monitor this group.
  • Paused: Pause monitoring for this group. All sensors on all devices in this group will be paused until this setting is changed again.

Parent Tags

Shows Tags that this group inherits from its parent probe. This setting is shown for your information only and cannot be changed here.

Tags

Enter one or more Tags. Confirm each tag by hitting the space, comma, or enter key. You can use tags to group objects and use tag–filtered views later on. Tags are not case sensitive.

Priority

Select a priority for the group. This setting determines where the group will be placed in list views. Top priority will be at the top of a list. You can choose from one star (low priority) to five stars (top priority).

Group Type

Sensor Management

Select which type of auto-discovery you would like to perform for this group. Choose between:

  • Manual (no auto-discovery): Do not auto-discover any sensors, only add sensors manually.
  • Automatic device identification (standard, recommended): Use a small set of auto-discovery templates. This will scan your LAN and usually create a set of standard sensors on your device.
  • Automatic device identification (detailed, may create many sensors: Use an extended set of auto-discovery templates. This will scan your LAN and usually create many sensors on your device.
  • Automatic sensor creation using specific device templates: Use specific auto-discovery templates only. Select templates below. This will scan your LAN and add sensors defined in the template.

Device Template(s)

This option is only visible if you enable using specific device templates above. Choose one or more templates by adding a check mark in front of the respective template name. You can also select and deselect all items by using the check box in the table head. PRTG will use the selected templates for auto-discovery on the current device. Choose from:

  • ADSL
  • Amazon Cloudwatch
  • Buffalo TeraStation NAS
  • Cisco ASA VPN
  • Cisco Device (Generic)
  • Dell EqualLogic
  • Dell MDI Disk
  • DNS Server
  • Environment Jacarta
  • Environment Poseidon
  • FTP Server
  • Generic Device (PING only)
  • Generic Device (SNMP-enabled)
  • Generic Device (SNMP-enabled, Detailed)
  • HTTP Web Server
  • Hyper V Host Server
  • IPMI enabled devices
  • Juniper NS Device
  • Linux/UNIX Device (SNMP or SSH enabled)
  • Mail Server (Generic)
  • Mail Server (MS Exchange)
  • Microsoft Sharepoint 2010
  • NAS LenovoEMC
  • NAS QNAP
  • NAS Synology
  • NetApp
  • NTP Server
  • Printer (HP)
  • Printer Generic
  • RDP Server
  • RMON compatible device
  • Server (Compaq/HP agents)
  • Server (Dell)
  • Server Cisco UCS
  • Server IBM
  • SonicWALL
  • SSL Security Check
  • Switch (Cisco Catalyst)
  • Switch (Cisco IOS Based)
  • Switch (HP Procurve)
  • UNIX/Linux Device
  • UPS Health (APC)
  • UPS Health (Generic)
  • UPS Health (Liebert)
  • VMware ESX / vCenter Server
  • Webserver
  • Windows (Detailed via WMI)
  • Windows (via Remote Powershell)
  • Windows (via WMI)
  • Windows IIS (via SNMP)
  • XEN Hosts
  • XEN Virtual Machines
     

Once the auto-discovery is finished, PRTG will create a new ticket and list the device templates that it used to create new sensors. The ticket will not show templates that were not applied.

Discovery Schedule

Define when PRTG will run the auto-discovery. Choose between:

  • Once: Perform auto-discovery only once. PRTG will add new devices and sensors once. If you select this option, you have to start the auto-discovery manually, it will not run automatically.
  • Hourly: Perform auto-discovery for new devices and sensors every 60 minutes.
    icon-i-round-redPlease use this option with caution! Frequently executed auto-discoveries might cause performance issues, especially when large network segments are scanned every hour.
  • Daily: Perform auto-discovery for new devices and sensors every 24 hours. The first auto-discovery will run immediately, all other discoveries will start at the time defined in the Auto-Discovery Settings section of the System Administration—Monitoring settings.
  • Weekly: Perform auto-discovery for new devices and sensors every 7 days. The first auto-discovery will run immediately, all other discoveries will start at the time defined in the Auto-Discovery Settings section of the System Administration—Monitoring settings.

icon-i-roundThe Discovery Schedule will be set to Once on all devices created by the scheduled auto-discovery for performance reasons.

IP Selection Method

Define how you want to define the IP range for auto-discovery. Choose between:

  • Class C base IP with start/end (IPv4): Define an IPv4 class C address range.
  • List of individual IPs and DNS names (IPv4): Enter a list of individual IPv4 addresses or DNS names.
  • IP and subnet (IPv4): Enter an IPv4 address and subnet mask.
  • IP with octet range (IPv4): Enter an IPv4 address range for every IP octet individually. With this, you can define very customizable IP ranges.
  • List of individual IPs and DNS names (IPv6): Enter a list of individual IPv6 addresses or DNS names.
  • Use computers from the active directory (maximum 1000 computers): Search in the active directory for computers to perform auto-discovery.
    icon-i-roundDefine your active directory domain in advance in the system administration.
    See System Administration—Core & Probes.

icon-i-round-redOnly subnets with up to 65,536 IP addresses can be discovered! If you define a range with a higher number of addresses, discovery will stop before it is completed.

IPv4 Base

This field is only visible if you select Class C network detection above. Enter a class C network as IP base for the auto-discovery. Enter the first three octets of an IPv4 IP address, for example, 192.168.0

IPv4 Range Start

This field is only visible if you select Class C network detection above. Enter the IP octet of the class C network specified above from which PRTG will start the auto-discovery. This will complete the IP base above to an IPv4 address. For example, enter 1 to discover from 192.168.0.1.

IPv4 Range End

This field is only visible if you select Class C network detection above. Enter the IP octet of the class C network specified above at which PRTG will stop the auto-discovery. This will complete the IP base above to an IPv4 address. For example, enter 254 to discover up to 192.168.0.254.

IPv4/DNS Name List
IPv6/DNS Name List

This field is only visible if you select the IP list option above. Enter a list of IP addresses or DNS names that the auto-discovery will scan. Enter each address in a separate line.

IPv4 and Subnet (IPv4)

This field is only visible if you select the IP and subnet option above. Enter an expression in the format address/subnet, for example, 192.168.3.0/255.255.255.0. You can also use the short form like 192.168.3.0/24 in this example. PRTG will scan the complete host range (without network and broadcast address) defined by the IP address and the subnet mask.

IP with Octet Range

This field is only visible if you select the octet range option above. Enter an expression in the format a1.a2.a3.a4, where a1, a2, a3, and a4 are each a number between 0-255, or a range with two numbers and a hyphen like 1-127. All permutations of all ranges are calculated. For example, 10.0.1-10.1-100 results in 1,000 addresses that PRTG will scan during auto-discovery.

Organizational Unit

This field is only visible if you select active directory above. Enter an organizational unit (OU) to restrict the active directory search to computers that are part of this OU. Just enter the name of the OU without any other term (so without "OU" in front). If you leave this field empty, there will not be any restriction.

icon-i-round Make sure that the OU contains a host. If the OU is empty, you will receive an error message.

If you have sub-OUs, consider the correct syntax in the format Y,OU=X: OUs that are part of another OU have to be listed together with their parent(s). Enter the sub-OU followed by ,OU= and the name of the parent OU.

Examples:

  • Assuming that the organizational unit 'Y' is part of the OU named 'X'. Then the syntax would be Y,OU=X
  • For three OUs 'X', 'Y' part of 'X', and 'Z' part of 'Y', the syntax would be Z,OU=Y,OU=X

icon-i-round-redThe order is important, sub-OUs have to be listed left of their particular parents!

Name Resolution

Define how to monitor newly discovered devices. This affects only new devices. The setting for existing devices will remain unchanged. Depending on your selection the IP Address/DNS Name field of an added device shows the DNS name or IP address that PRTG uses to access the target device. Choose between:

  • Use DNS names (recommended): Monitor newly discovered devices via their DNS names (if available).
  • Use IP addresses: Monitor newly discovered devices via their IP address.

We recommend that you use the default value.

icon-i-roundThis setting does not affect how PRTG shows the devices in the device tree.

Device Rescan

Define if you want to add devices that already exist in your PRTG installation also to the currently selected group. Choose between:

  • Skip auto-discovery for known devices/IPs (recommended): Do not re-scan known devices or IP addresses, only add devices with new IPs or DNS names when auto-discovering. PRTG will not add devices that are already included elsewhere in your configuration, for example, in other groups.
  • Perform auto-discovery for known devices/IPs: Re-scan devices with known IP addresses with every auto-discovery. This option will add devices that already exist in other groups also to this group and runs the auto-discovery on the newly added devices.
    icon-i-roundThe auto-discovery will not run on devices that already exist in this group. If you want to run the auto-discovery for an existing device, you have to start the auto-discovery on this device.

We recommend that you use the default value.

Inherited Settings

By default, all following settings are inherited from objects higher in the hierarchy and should be changed there, if necessary. Often, best practice is to change them centrally in the Root group's settings, see section Inheritance of Settings for more information. To change a setting only for this object, disable inheritance by clicking the button next to inherit from under the corresponding setting name. You will then see the options described below.

Location

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Location (for Geo Maps)

When you want to use Geo Maps, enter a location in the first line. Geographical maps will display objects (devices, groups) then with a flag, showing the current status using a color code similar to the sensor status icons (green - yellow - orange - red). You can enter a full postal address, city and country only, or latitude and longitude. It is possible to enter any text before, between, and after the coordinates, PRTG will parse latitude and longitude automatically, for example: 49.452778 11.077778 or enter 49.452778 any 11.077778 text

A minus sign () in the first line will hide an object from geo maps. In this case you can enter location information in line two and following.

You can define a specific label for each location: enter a string denoting the label in the first line and provide geo coordinates in the second line. This geo marker will show then the object with the label in the PRTG geo map.

icon-i-roundThe preview map will always hava a road map layout regardless of the map layout you set in User Interface.

Credentials for Windows Systems

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Domain or Computer Name

Define the authority for Windows access. This is used for Windows Management Instrumentation (WMI) and other Windows sensors. If you want to use a Windows local user account on the target device, enter the computer name here. If you want to use a Windows domain user account (recommended), enter the (Active Directory) domain name here. If not explicitly defined, PRTG will automatically add a prefix in order to use the NT LAN Manager (NTLM) protocol. Do not leave this field empty.

User

Enter the username for Windows access. Usually, you will use credentials with administrator privileges.

Password

Enter the password for Windows access. Usually, you will use credentials with administrator privileges.

Credentials for Linux/Solaris/Mac OS (SSH/WBEM) Systems

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

User

Enter a login name for the access via SSH and WBEM. Usually, you will use credentials with administrator privileges.

Login

Define the authentication method to use for login. Choose between:

  • Login via Password: Provide a password for login. Enter below.
  • Login via Private Key: Provide a private key for authentication.
    icon-i-round-redPRTG can only handle keys in OpenSSH format that are not encrypted. You cannot use password protected keys here. In the text field, paste the entire private key, including the "BEGIN" and "END" lines. Please make sure the according public key is provided on the target machine. For details, see Monitoring via SSH.

Password

This field is only visible if you select password login above. Enter a password for the Linux access via SSH and WBEM. Usually, you will use credentials with administrator privileges.

Private Key

This field is only visible if you select private key login above. Paste a private key into the field (OpenSSH format, unencrypted). Usually, you will use credentials with administrator privileges.

icon-i-round-redIf you do not insert a private key for the first time, but change the private key, you need to restart your PRTG core server service in order for the private key change to take effect! For details, see Monitoring via SSH.

For WBEM Use Protocol

Define the protocol to use for WBEM. This setting is only relevant if you use WBEM sensors. Choose between:

  • HTTP: Use an unencrypted connection for WBEM.
  • HTTPS: Use an SSL-encrypted connection for WBEM.

For WBEM Use Port

Define the port to use for WBEM. This setting is only relevant if you use WBEM sensors. Choose between:

  • Set automatically (port 5988 or 5989): Use one of the standard ports, depending on whether you choose unencrypted or encrypted connection above.
  • Set manually: Use a custom port. Define below.

WBEM Port

This setting is only visible if you enable manual port selection above. Enter the WBEM port number.

SSH Port

Enter the port number to use for SSH connections.

icon-i-roundBy default, PRTG uses this setting automatically for all SSH sensors, unless you define a different port number in the sensor settings.

SSH Rights Elevation

Define the rights that you want to use to execute the command on the target system. Choose between:

  • Run the command as the user connecting (default): Use the rights of the user who establishes the SSH connection, as defined above.
  • Run the command as another user using 'sudo' (with password): Use the rights of another user with a password required for sudo to run commands on the target device, for example, as root user.
  • Run the command as another user using 'sudo' (without password): Use the rights of another user without a password required for sudo to run commands on the target device, for example, as root user.
  • Run the command as another user using 'su': Use the rights of another user with su to run commands on the target device.

Target User

This field is only visible if you choose sudo or su above. Enter a username to run the specified command as a user other than root. If you leave this field empty, you will run the command as root. Ensure you set the Linux password even if you use a public or private key for authentication. This is not necessary if the user is allowed to execute the command without a password.

Password Target User

This field is only visible if you choose to run the commands using su or sudo with password above. Enter the password for the specified target user.

SSH Engine

Select the method you want to use to access data with SSH sensors. We strongly recommend that you keep the default engine! For now, you still can use the legacy mode to ensure compatibility with your target systems. Choose between:

  • Default (recommended): This is the default monitoring method for SSH sensors. It provides best performance and security.
  • Compatibility Mode (deprecated): Try this legacy method only if the default mode does not work on a target device. The compatibility mode is the SSH engine that PRTG used in previous versions and is deprecated. We will remove this legacy option soon, so please try to get your SSH sensors running with the default SSH engine.

icon-i-round You can also individually select the SSH engine for each SSH sensor in the sensor settings.

Credentials for VMware/XenServer

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

User

Enter a login name for access to VMware and Xen servers. Usually, you will use credentials with administrator privileges.

Password

Enter a password for access to VMware and Xen servers. Usually, you will use credentials with administrator privileges.

icon-i-roundSingle Sign-On (SSO) passwords for vSphere do not support special characters. See the manual sections for VMware sensors for details.

VMware Protocol

Define the protocol used for the connection to VMware and XenServer. Choose between:

  • HTTPS (recommended): Use an SSL-encrypted connection to VMware and XenServers.
  • HTTP: Use an unencrypted connection to VMware and XenServers.

Session Pool

Define if you want to use session pooling for VMware sensors. Choose between:

  • Reuse session for for multiple scans (recommended): Select this option to use session pooling. With session pooling, a VMware sensor uses the same session as created in advance to query data and needs not to log in and out for each sensor scan. We recommend that you choose this option because it reduces network load and log entries on the target device, resulting in better performance.
  • Create a new session for each scan: If you select this option and disable session pooling, a VMware sensor has to log in and out for each sensor scan. We recommend that you use the session pooling option above for better performance.

Credentials for SNMP Devices

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

SNMP Version

Select the SNMP version for the device connection. Choose between:

  • v1: Use the simple v1 protocol for SNMP connections. This protocol only offers clear-text data transmission, but it is usually supported by all devices.
    icon-i-round-redSNMP v1 does not support 64-bit counters.
    This may result in invalid data when monitoring traffic via SNMP.
  • v2c (recommended): Use the more advanced v2c protocol for SNMP connections. This is the most common SNMP version. Data is still transferred as clear-text, but it supports 64-bit counters.
  • v3: Use the v3 protocol for SNMP connections. It provides secure authentication and data encryption.

icon-i-round-redWhen using SNMP v3 you can only monitor a limited number of sensors per second due to internal limitations. The limit is somewhere between 1 and 50 sensors per second (depending on the SNMP latency of your network). This means that using an interval of 60 seconds limits you to between 60 and 3000 SNMP v3 sensors for each probe. If you experience an increased Interval Delay or Open Requests with the Probe Health Sensor, distribute the load over multiple probes. SNMP v1 and v2 do not have this limitation.

Community String

This setting is only visible if you select SNMP version v1 or v2c above. Enter the community string of your devices. This is a kind of "clear-text password" for simple authentication. We recommend that you use the default value.

Authentication Type

This setting is only visible if you select SNMP version v3 above. Choose between:

  • MD5: Use Message-Digest Algorithm 5 (MD5) for authentication.
  • SHA: Use Secure Hash Algorithm (SHA) for authentication.

The type you choose must match the authentication type of your device.

icon-i-roundIf you do not want to use authentication, but you need SNMP v3, for example, because your device requires context, you can leave the field Password empty. In this case, SNMP_SEC_LEVEL_NOAUTH is used and authentication deactivated entirely.

User

This setting is only visible if you select SNMP version v3 above. Enter a username for secure authentication. This value must match the username of your device.

Password

This setting is only visible if you select SNMP version v3 above. Enter a password for secure authentication. This value must match the password of your device.

Encryption Type

This setting is only visible if you select SNMP version v3 above. Select an encryption type. Choose between:

  • DES: Use Data Encryption Standard (DES) as encryption algorithm.
  • AES: Use Advanced Encryption Standard (AES) as encryption algorithm.

icon-i-roundAES 192 and AES 256 are not supported by Net-SNMP.
They lack RFC specification.

icon-i-round-redThe type that you choose must match the encryption type of your device.

Data Encryption Key

This setting is only visible if you select SNMP version v3 above. Enter an encryption key here. If you provide a key in this field, SNMP data packets are encrypted using the encryption algorithm selected above, which provides increased security. The key that you enter here must match the encryption key of your device.

icon-i-round-redIf the key you enter in this field does not match the key configured on the target SNMP device, you will not get an error message about this! Please enter a string or leave the field empty.

Context Name

This setting is only visible if you select SNMP version v3 above. Enter a context name only if it is required by the configuration of the device. Context is a collection of management information accessible by an SNMP device. Please enter a string.

SNMP Port

Enter the port for the SNMP communication. We recommend that you use the default value.

SNMP Timeout (Sec.)

Enter a timeout in seconds for the request. If the reply takes longer than the value you enter here, the request is aborted and an error message triggered.

Credentials for Database Management Systems

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

The settings you define in this section apply to the following sensor types:

Port for Databases

Define which ports PRTG will use for connections to the monitored databases. Choose between:

  • Set automatically (default port, recommended): PRTG automatically determines the type of the monitored database and uses the corresponding default port to connect. See below for a list of default ports.
  • Define one custom port valid for all database sensors: Choose this option if your database management systems do not use the default ports. Define the port for database connections manually below. If you choose this option, PRTG will use the custom port for all database sensors.

If you choose the automatic port selection, PRTG uses the following default ports:

  • Microsoft SQL: 1433
  • MySQL: 3306
  • Oracle SQL: 1521
  • PostgreSQL: 5432

Custom Database Port

Enter the number of the port that PRTG will use for database connections. Please enter an integer value.

icon-i-blueAll database sensors on this device will use this port to connect.

Authentication Mode

Select the authentication method for the connection to the SQL database. Choose between:

  • Windows authentication with impersonation: If you select this option, PRTG uses the Windows credentials as defined in the particular device settings for the database connection.
    icon-i-round-redThe user whose credentials are used needs to have permissions to log on to the system on which the PRTG probe with a database sensor runs. This is required for the impersonation.
  • SQL server authentication: Choose this option if you want to use explicit credentials for database connections.

User

This field is only visible if you select SQL server authentication above. Enter the username for the database connection.

Password

This field is only visible if you select SQL server authentication above. Enter the password for the database connection.

Timeout (Sec.)

Enter a timeout in seconds for the request. Please enter an integer value. If the reply takes longer than this value defines, the sensor cancels the request and triggers an error message. The maximum timeout value is 300 seconds (5 minutes).

Credentials for Amazon CloudWatch

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Access Key

Enter your Amazon Web Services (AWS) access key. Please see the corresponding Amazon CloudWatch sensor documentation to learn more about the rights that are required for querying AWS CloudWatch metrics.

Secret Key

Enter your Amazon Web Services (AWS) secret key. Please see the corresponding Amazon CloudWatch sensor documentation to learn more about the rights that are required for querying AWS CloudWatch metrics.

Windows Compatibility Options

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

When experiencing problems while monitoring via Windows sensors, you can set some compatibility options for trouble shooting.

Preferred Data Source

Define the method Windows sensors will use to query data. This setting is valid only for hybrid sensors offering performance counter and Windows Management Instrumentation (WMI) technology. The setting will be ignored for all other sensors! Choose between:

  • Performance Counters and fallback to WMI: Try to query data via performance counters. If this is not possible, establish a connection via WMI.
  • Performance Counters only: Query data via performance counters only. If this is not possible, a sensor will return no data.
  • WMI only (recommended): Query data via WMI only. If this is not possible, a sensor will return no data. In current PRTG versions, this is our recommendation to achieve best performance and stability.

Timeout Method

Specify the time the sensor will wait for the return of its WMI query before aborting it with an error message. Choose between:

  • Use 1.5x scanning interval (recommended): Use a default of one and a half times the scanning interval set for the sensor (see below in this settings).
  • Set manually: Enter a timeout value manually.

We recommend that you use the default value. Only if you experience ongoing timeout errors, try increasing the timeout value.

Timeout Value (Sec.)

This field is only visible if the manual timeout method is selected above. Enter the time the sensor will wait for the return of its WMI query before aborting with an error message. Please enter an integer value. The maximum value is 900 seconds (15 minutes).

SNMP Compatibility Options

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

When experiencing problems while monitoring via Simple Network Management Protocol (SNMP) sensors, you can set some compatibility options for trouble shooting.

SNMP Delay (ms)

Add a time in milliseconds that will be waited between two SNMP requests. This can help increase device compatibility. Please enter an integer value. We recommend that you use the default value. If you experience SNMP connection failures, please increase it. You can define a delay between 0 and 100, higher delays are not supported and will be discarded.

Failed Requests

Define if an SNMP sensor will try again after a request fails.

  • Retry (recommended): Try again if an SNMP request fails. This can help prevent false error messages due to temporary timeout failures.
  • Do not retry: Do not retry if an SNMP request fails. With this setting enabled an SNMP sensor will be set to error status earlier.

Overflow Values

Define how PRTG will handle overflow values. Some devices do not handle internal buffer overflows correctly. This can cause false peaks.

  • Ignore overflow values: Ignore overflow values and do not include them in the monitoring data.
  • Handle overflow values as valid results: Regard all overflow values as regular data and include them in the monitoring data.

We recommend that you use the default value.

icon-i-blueIf you experience problems because of strange peaks in your data graphs, change this option. Peaks might indicate that the monitored device resets counters without an overflow. PRTG interprets such a behavior as overflow that results in data peaks. Choose the option Ignore overflow values in this case. For more details, see this Knowledge Base article: What is the Overflow Values setting in the SNMP Compatibility Options?

Zero Values

Define how PRTG will handle zero values. Some devices send incorrect zero values. This can cause false peaks.

  • Ignore zero values for delta sensors (recommended): Ignore zero values and do not include them in the monitoring data.
  • Handle zero values as valid results for delta sensors: Regard all zero values as regular data and include them in the monitoring data.

We recommend that you use the default value. If you experience problems, change this option.

32-bit/64-bit Counters

Define which kind of traffic counters PRTG will search for on a device.

  • Use 64-bit counters if available (recommended): The interface scan will use 64-bit traffic counters, if available. This can avoid buffer overflows in the devices.
  • Use 32-bit counters only: The interface scan will always use 32-bit traffic counters, even if 64-bit counters are available. This can lead to more reliable monitoring for some devices.

We recommend that you use the default value. If you experience problems, change this option.

Request Mode

Define which kind of request method PRTG uses for SNMP sensors.

  • Use multi get (recommended): Bundle multiple SNMP requests into one request.
  • Use single get: Use one request for each SNMP value. This can increase compatibility with older devices.

We recommend that you use the default value. If you experience problems, change this option.

icon-i-roundPRTG uses paging for SNMP requests. This means that if a sensor has to query more than 20 OIDs, it will automatically poll the OIDs in packages of 20 OIDs each per request.

Port Name Template

Define how the name of SNMP sensors created on a device will be put together. Enter a template using several variables. When adding new sensors, PRTG scans the interface for available counters at certain OIDs. At each OID usually several fields are available with interface descriptions. They are different for every device and OID. PRTG will use the information in these fields to name the sensors. If a field is empty or not available, an empty string is added to the name. As default, ([port]) [ifalias] is set as port name template, which will create a name such as (001) Ethernet1, for example. You can use any field names available at a certain OID of your device, among which are:

  • [port]: The port number of the monitored interface.
  • [ifalias]: The 'alias' name for the monitored interface as specified by a network manager, providing a non-volatile handling.
  • [ifname]: The textual name of the monitored interface as assigned by the local device.
  • [ifdescr]: A textual string containing information about the monitored device or interface, for example, manufacturer, product name, version.
  • [ifspeed]: An estimate of the monitored interface's current bandwidth (KBit/s).
  • [ifsensor]: The type of the sensor, this is SNMP Traffic or SNMP RMON. This is useful to differentiate between your SNMP Traffic and SNMP RMON sensors.

Combine them as you like to obtain suitable sensor names.

icon-book-bulbFor more information about SNMP sensor names, see this Knowledge Base article: How can I change the defaults for names automatically generated for new SNMP sensors?

Port Name Update

Define how PRTG will react if you change port names in your physical device (for example, a switch or router). Choose between:

  • Keep port names (use this if you edit the names in PRTG): Do not automatically adjust sensor names. This is the best option if you want to change names in PRTG manually.
  • Automatic sensor name update if name changes in device: If PRTG detects changes of port names in your physical device, it will try to automatically adjust sensor names accordingly.

icon-book-bulbFor more information about automatic updates of names, see this Knowledge Base article: Automatically update port name and number for SNMP Traffic sensors when the device changes them

Port Identification

Define which field will be used for SNMP interface identification. Choose between:

  • Automatic (recommended): Tries the ifAlias field first to identify an SNMP interface and then ifDescr.
    icon-i-roundifName will not be tried automatically.
     
  • Use ifAlias: For most devices ifAlias is the best field to get unique interface names.
  • Use ifDescr: Use this option if the port order of your device changes after a reboot, and there is no ifAlias field available. For example, this is the best option for Cisco ASA devices.
    icon-i-roundWhen using this option it is important that your device returns unique interface names in the ifDescr field.
     
  • Use ifName: You can also use this option if there is no unique ifAlias available.
    icon-i-roundWhen using this option it is important that your device returns unique interface names in the ifName field.
     
  • No Port Update: Use this option to disable automatic port identification.

Start Interface Index

For SNMP Traffic sensors, define at which index PRTG will start to query the interface range during sensor creation. Use 0 for automatic mode. We recommend that you use the default value.

End Interface Index

For SNMP Traffic sensors, define at which index PRTG will stop to query the interface range during sensor creation. Use 0 for automatic mode. We recommend that you use the default value.

Proxy Settings for HTTP Sensors

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

HTTP Proxy Settings

The proxy settings determine how a sensor connects to a given URL. You can enter data for an HTTP proxy server that sensors will use when connecting via HTTP or HTTPS.

icon-i-roundThis setting affects monitoring only and determines the behavior of HTTP sensors. To change proxy settings for the core server, see System Administration—Core & Probes.

icon-i-roundThe SSL Certificate Sensor and the SSL Security Check Sensor do not support HTTP proxies, but you can configure connections via SOCKS proxies in their sensor settings.

Name

Enter the IP address or DNS name of the proxy server to use. If you leave this field empty, no proxy will be used.

Port

Enter the port number of the proxy. Often, port 8080 is used. Please enter an integer value.

User

If the proxy requires authentication, enter the username for the proxy login.

icon-i-round-redOnly basic authentication is available! Please enter a string or leave the field empty.

Password

If the proxy requires authentication, enter the password for the proxy login.

icon-i-round-redOnly basic authentication is available! Please enter a string or leave the field empty.

Scanning Interval

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Scanning Interval

Select a scanning interval (seconds, minutes, or hours) from the list. The scanning interval determines the time the sensor waits between two scans. You can change the available intervals in the system administration on PRTG on premises installations.

If a Sensor Query Fails

Define the number of scanning intervals that a sensor has time reach and check a device again in case a sensor query fails. The sensor can try to re-reach and check a device several times, depending on the option you select here, before it will be set to a Down status. This helps you avoid false alarms if the monitored device has only temporary issues. For previous scanning intervals with failed requests, the sensor will show a Warning status. Choose between:

  • Set sensor to "down" immediately: The sensor will show an error immediately after the first failed request.
  • Set sensor to "warning" for 1 interval, then set to "down" (recommended): After the first failed request, the sensor will show a yellow warning status. If the following request also fails, the sensor will show an error.
  • Set sensor to "warning" for 2 intervals, then set to "down": Show an error status only after three continuously failed requests.
  • Set sensor to "warning" for 3 intervals, then set to "down": Show an error status only after four continuously failed requests.
  • Set sensor to "warning" for 4 intervals, then set to "down": Show an error status only after five continuously failed requests.
  • Set sensor to "warning" for 5 intervals, then set to "down": Show an error status only after six continuously failed requests.

icon-i-roundSensors that monitor via Windows Management Instrumentation (WMI) always wait at least one scanning interval until they show an error. It is not possible to set a WMI sensor to "down" immediately, so the first option will not apply to these sensor types. All other options can apply.

icon-i-roundIf a sensor has defined error limits for channels, it will always show a Down status immediately, so no "wait" option will apply.
 

icon-i-roundIf a channel uses lookup values, it will always show a Down status immediately, so no "wait" options will apply.

Cluster Usage

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Scanning Distribution

This box is only visible if you run a PRTG cluster. Sometimes you want to exclude a certain node from monitoring the sensors running on this probe, group, or device, for example, if a device is not reachable from every node configured in your cluster. In the list of cluster nodes, please select the nodes that will not be included in sensor scans. By default, this setting is inherited to all objects underneath.

Schedules, Dependencies, and Maintenance WindoW

icon-i-roundInheritance for schedules, dependencies, and maintenance windows cannot be interrupted; the according settings from the parent objects will always be active. However, you can define additional settings here. They will be active in parallel to the parent objects' settings.

Schedule

Select a schedule from the list. Schedules can be used to pause monitoring for a certain time span (days, hours) throughout the week. You can create new schedules and edit existing ones in the account settings.

icon-i-roundSchedules are generally inherited. New schedules will be added to existing ones, so all schedules are active.

Maintenance Window

Specify if you want to set-up a one-time maintenance window. During a maintenance window this object and all child objects will not be monitored. They will enter a paused state then. Choose between:

  • Not set (monitor continuously): No maintenance window will be set.
  • Set up a one-time maintenance window: Pause monitoring within a maintenance window.

icon-i-roundTo terminate a current maintenance window before the defined end date, you can change the time in Maintenance Ends field to a date in the past.

Maintenance Begins

This field is only visible if maintenance window is enabled above. Use the date time picker to enter the start date and time of the maintenance window.

Maintenance Ends

This field is only visible if maintenance window is enabled above. Use the date time picker to enter the end date and time of the maintenance window.

Dependency Type

Define a dependency type. Dependencies can be used to pause monitoring for an object depending on the status of another. You can choose between:

  • Use parent: Pause the current object if its parent object is in a Down status, or if it is paused by another dependency.
  • Select object: Pause the current object if its parent object is in a Down status, or if it is paused by another dependency. Additionally, pause the current object if a specific other object in the device tree is in a Down status, or if it is paused by another dependency. Select below.

icon-i-roundYou do not trigger a status change by dependency if you manually pause a master object or if you pause it by schedule.
 

icon-i-roundTesting your dependencies is easy! Simply choose Simulate Error Status from the context menu of an object that other objects depend on. A few seconds later all dependent objects should be paused. You can check all dependencies in your PRTG installation by selecting Devices | Dependencies from the main menu bar.

Dependency

This field is only visible if the select object option is enabled above. Click on the reading-glass symbol and use the object selector to choose an object on which the current object will be dependent on.

Dependency Delay (Sec.)

This field is only visible if you select another object than the parent as dependency type. Define a time span in seconds for dependency delay.

After the master object for this dependency comes back to an Up status, monitoring of the depending objects will be additionally delayed by the defined time span. This can help avoid false alarms, for example, after a server restart, by giving systems more time for all services to start up. Please enter an integer value.

Access Rights

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

User Group Access

Define which user group(s) will have access to the object you're editing. A table with user groups and types of access rights is shown: It contains all user groups from your setup. For each user group you can choose from the following access rights:

  • Inherited: Use the access rights settings of the parent object.
  • None: Users in this group cannot see or edit the object. The object neither shows up in lists nor in the device tree. Exception: If a child object is visible to the user, the object is visible in the device tree, though not accessible.
  • Read: Users in this group can see the object and review its monitoring results.
  • Write: Users in this group can see the object, review its monitoring results, and edit the object's settings. They cannot edit access rights settings.
  • Full: Users in this group can see the object, review its monitoring results, edit the object's settings, and edit access rights settings.

You can create new user groups in the System Administration—User Groups settings. To automatically set all objects further down in the hierarchy to inherit this object's access rights, set a check mark for the Revert children's access rights to inherited option.

icon-book-arrowsFor more details on access rights, see the section User Access Rights.

Channel Unit Configuration

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Channel Unit Types

For each type of sensor channel, define the unit in which data is displayed. If defined on probe, group, or device level, these settings can be inherited to all sensors underneath. You can set units for the following channel types (if available):

  • Bandwidth
  • Memory
  • Disk
  • File
  • Custom

icon-i-roundCustom channel types can be set on sensor level only.

Advanced Network Analysis

Click inherited_settings_button to disrupt the inheritance. See section Inheritance of Settings for more information.

Unusual Detection

Define if you want to benefit from unusual detection for sensors. You can configure the behavior of unusual detection (or disable it completely) in the system settings. Choose between:

  • Enabled: Activate unusual detection for this object and, by default, for all objects underneath in the hierarchy of the device tree. Sensors affected by this setting will turn to orange color (unusual sensor status) if PRTG detects unusual activity.
  • Disabled: Do not activate unusual detection. PRTG will ignore unusual values for sensors affected by this setting. These sensor will not show an unusual sensor status.

Similar Sensors Detection

Define if you want to activate Similar Sensors analysis. You can configure the depth of analysis of similar sensors detection (or disable it completely) in the system settings. Choose between:

  • Enabled: Activate similar sensors detection for this object and, by default, for all objects underneath in the hierarchy of the device tree. PRTG considers all sensors affected by this setting during similarity analysis.
  • Disabled: Do not activate similar sensors detection. PRTG will not consider sensors affected by this setting during similarity analysis.

System Information

Define if you want to retrieve and show System Information for your devices. Choose between:

  • Enabled: Activate the system information feature for this object and, by default, for all objects underneath in the hierarchy of the device tree.
  • Disabled: Do not activate system information.

icon-i-blueSystem Information is enabled by default. To retrieve the data, PRTG will automatically use Credentials for Windows Systems and Credentials for SNMP Devices as defined in the device settings or as inherited from a parent object like the Root group. Please consider this when you monitor devices outside the local network, especially when using SNMP v1 or v2c that do not provide encryption.

icon-prtg-on-demandThis setting is not available on the Cloud Probe of a PRTG in the cloud instance.

Number of Sensors Limitation

Sensor Limit

This setting allows the administrator to set a limit for the maximum number of sensors in this group. Subgroups are also included in this limitation. If the amount of sensors exceeds the limitation, surplus sensors will be paused. This is of special interest for a Managed Service Provider (MSP). Choose between:

  • Allow unlimited number of sensors: Do not limit the number of sensors for this group. Any number of sensors can be added to this group and its subgroups.
  • Limit number of sensors in this group: Enable a limitation for the number of sensors in this group. Only a defined number of sensors can monitor in this group and its subgroups.

Maximum Number of Sensors

This field is only visible if you enable limitation above. Define how many sensors are allowed in this group and its subgroups. Sensors that exceed this group sensor limit will be paused. Please enter an integer value.

icon-i-roundSensors in paused status count for this group limit as well (for example, manually paused sensors, sensors paused by dependency or schedule), but not for the number of available sensors in your license.

icon-i-roundManually paused sensors will override the sensor message "exceeds group sensor limit".

Click Save to save your settings. If you change tabs or use the main menu, all changes to the settings will be lost!

Notifications

The status or the data of a sensor can trigger notifications. Using this mechanism, you can configure external alerting tailored to your needs. In an object's detail page, click the Notifications tab to change sensor notification triggers. The defined triggers will be inherited down to sensor level. For detailed information, see Sensor Notifications Settings section.

Others

For more general information about settings, see Object Settings section.

More

Knowledge Base: How does PRTG compute CPU Index, Traffic Index and Response Time Index?

Knowledge Base: How can I add my own device icons for use in the PRTG web interface?

Knowledge Base: How can I change the defaults for names automatically generated for new SNMP sensors?

Knowledge Base: Automatically update port name and number for SNMP Traffic sensors when the device changes them

Knowledge Base: What is the Overflow Values setting in the SNMP Compatibility Options?

Ajax Web Interface—Device and Sensor Setup—Topics

Other Ajax Web Interface Sections

Related Topics