Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

AD health monitoring

Posted on 2016-08-15
2
Medium Priority
?
106 Views
Last Modified: 2016-09-22
Management of our AD environment, is now the responsibility of a 3rd party. We need from an independent assurance point of view, to ensure they have effective management and monitoring operations in place to identify and resolve any issues with AD in a timely manner. I know for example a general server admin would like alerts on free space, CPU usage, memory usage, to alert on any dangerous thresholds reached. But for AD, is there a list anywhere on the types of events/metrics they should be monitoring for, so we can check whether they are or are not doing so? If you use an automated tool for monitoring AD health, it would be useful to know the priority alerts it checks for/alerts on.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 20

Accepted Solution

by:
Russ Suter earned 1000 total points
ID: 41756532
For some time I've used ADManager Plus from ManageEngine to monitor and manage AD stuff. It's relatively inexpensive and very full-featured.
https://www.manageengine.com/products/ad-manager/
Honestly, with this tool you could probably eliminate the 3rd party.
0
 
LVL 20

Assisted Solution

by:compdigit44
compdigit44 earned 1000 total points
ID: 41758604
I work in a very larger environment with 10K+ end user and 800 server and we use SCOM 2012 R2 to manage our environment
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

664 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question