Customising advanced options

Refer to the following guidelines to learn more about advanced customization options.

Configure events sources and log types

Use this option to extend the amount of event data processed by GFI EventsManager. This enables you to:

Configure events processing rules

Use this option to customize the default set of events processing rules which ship with GFI EventsManager. This enables you to:
  • Thoroughly investigate incidents through the isolation of specific events
  • Take proactive action through the automated response to events on event generation.
For more information refer to About events processing rules.

Configure database operations

Use this option to manage the database backend. This enables you to:
  • Save space by deleting old or unnecessary data
  • Safeguard and consolidate data by importing and exporting data to files
  • Reduce database load by moving data between different instances of GFI EventsManager.
For more information refer to Database Maintenance.

Configure alert recipients

Use this option to configure the user details of whoever needs to receive notification messages. This enables you to:
  • Facilitate user setup through the creation and assignment of users to groups
  • Send different notification messages to users depending on the notification type and whether the message is sent during user working hours or after working hours.
For more information refer to Managing user accounts.

Configure alert options

Use this option to customize alert generation of notification messages. This enables you to:
  • Customize the alert notification message text which will be relayed to the users
  • Configure notification message settings for email, network message and SMS message connections. This includes setting up the SMS gateway and the email server details.
For more information refer to Configuring Alerting Options.

Configure active monitoring

Use this option to scan your network for failures or irregularities. This enables you to:
  • Identify and proactively fix unexpected problems before they occur
  • Inspect network activity in granular detail by using a combination of active monitoring checks, events processing rules and alerts.
For more information refer to Active Monitoring.