Argent for XenApp
Argent for XenApp is more than just a monitoring solution — like all Argent products, Argent for XenApp is a complete automation solution, automating all the essential but labor-intensive chores that all customers must perform to ensure XenApp runs smoothly.
With all the layoffs, there are fewer people to do more work – this is why Argent’s unique Instant Best Practices is essential – who has the time to read White Papers?
The most significant aspect of Argent for XenApp is the use of a number of different approaches to monitoring XenApp, unifying a centralized monitoring platform for XenApp running on all Windows or Linux/Unix systems. Think of Argent for XenApp as four or five discrete products all integrated into one super-product.
The most significant aspect of Argent for XenApp is the use of a number of different approaches to monitoring XenApp, unifying a centralized monitoring platform for XenApp running on all Windows or Linux/Unix systems. Think of Argent for XenApp as four or five discrete products all integrated into one super-product.
Details
Argent for XenApp monitors and reports on XenApp baselines, such as availability, access rules, authentication, licensing and ICA session rules.
Argent for XenApp integrates with pre-defined Argent Reports that can be automatically emailed every morning to show the actual health and performance of XenApp.
The following is a partial list of installed Rules. Out-of-the-box, Argent handles over 95% of your day-to-day needs.
Argent solves all your day-to-day problems — automatically.
XenApp Application Monitoring Rules
- Anonymous Connection Rules
- Application Availability Rules
- Application User Count Rules
- Disabled Application Rules
- Process CPU Usage Rules
- Session Usage Time Rules
XenApp Availability Rules
- AppController Rules
- Citrix License Server Rules
- Common Citrix Communication Port Rules
- EdgeSight Rules
- Password Manager Rules
- StageManager Rules
- XenApp Rules
- XenClient Rules
Accessibility Monitoring Rules
- Desktop Access Rules
- Directory Access Rules
- RADIUS Rules
Agent Monitoring Rules
- Citrix Safeword Rules
- RSA Rules
- User-Agent HTTP Header Rules
Authentication Monitoring Rules
- Access Gateway Authentication Rules
- Anonymous Logon Rules
- Context Look-up Failure Rules
- Invalid Authentication Rules
- Novell Directory Services[NDS] Rules
- Two-factor Authentication Rules
- Web Interface Authentication Rules
- Workspace Control Rules
Miscellaneous
- Citrix Online Plugin Monitoring Rules
- Citrix Streaming Service Monitoring Rules
- Citrix XML Service Monitoring Rules
- Client Detection Monitoring Rules
- Event ID File Monitoring Rules
- ICA File Signing Monitoring Rules
- Password Manager Monitoring Rules
- SSL Connection Monitoring Rules
- Secure Ticket Authority Monitoring Rules
Configuration Monitoring Rules
- Protocol Transition Service Rules
- Site Configuration Rules
- Web Interface Configuration Rules
Permission Monitoring Rules
- Client For Java Rules
- Client Installer Rules
- Language Pack File Rules
- Server Monitoring Rules
Server Error Rules
- Server Farm Rules
- Server License Rules
Citrix CPU Utilization Management User Rules
- CPU Entitlement Rules
- CPU Shares Rules
- CPU Usage Rules
- Long-term CPU Usage Rules
Citrix IMA Networking Rules
- Bytes Received Per Second Rules
- Bytes Sent Per Second Rules
- Network Connections Rules
Citrix Licensing Rules
- Average License Check-In Response Time Rules
- Average License Check-Out Response Time Rules
- Last Recorded License Check-In Response Time Rules
- Last Recorded License Check-Out Response Time Rules
- License Server Connection Failure Rules
- Maximum License Check-In Response Time Rules
- Maximum License Check-Out Response Time Rules
Citrix MetaFrame Presentation Server Rules
- Application Resolution Time Rules
- Application Resolutions Per Second Rules
- Cumulative Server Load Rules
- Data Store Connection Failure Rules
- Data Store Bytes Read Rules
- Data Store Bytes Read Per Second Rules
- Data Store Bytes Written Per Second Rules
- Data Store Reads Rules
- Data Store Reads Per Second Rules
ICA Session Rules
- Input Audio Bandwidth Rules
- Input Clipboard Bandwidth Rules
- Input COM Bandwidth Rules
- Input Control Channel Bandwidth Rules
- Input Drive Bandwidth Rules
- Input Font Data Bandwidth Rules
- Input Licensing Bandwidth Rules
- Input Printer Bandwidth Rules
- Input Seamless Bandwidth Rules
- Input Session Bandwidth Rules
- Input Session Compression Rules
- Input Session Line Speed Rules
- Latency – Last Recorded Rules
- Latency – Session Average Rules
- Latency – Session Deviation Rules
- Output Audio Bandwidth Rules
- Output Clipboard Bandwidth Rules
- Output COM Bandwidth Rules
- Output Control Channel Bandwidth Rules
- Output Drive Bandwidth Rules
- Output Font Data Bandwidth Rules
- Output Printer Bandwidth Rules
- Output Seamless Bandwidth Rules
- Output Session Bandwidth Rules
- Output Session Compression Rules
- Output Session Line Speed Rules
- Output ThinWire Bandwidth Rules
Secure Ticket Authority Rules
- STA Count of Active Tickets Rules
- STA Good Data Request Count Rules
- STA Good Ticket Request Count Rules
- STA Peak All Request Rate Rules
- STA Peak Ticket Request Rate Rules
- STA Ticket Timeout Count Rules
XenApp Server Monitoring Rules
- XenApp Server Load Rules
XenApp Service Status Monitoring Rules
- CPU Rebalancer Service Rules
- Resource Management Service Rules
- Citrix Independent Management Architecture Service Rules
- Citrix Licensing Service Rules
- Citrix Licensing WMI Service Rules
- Citrix MFCOM Service Rules
- Citrix Print Manager Service Rules
- Citrix Streaming Service
- Citrix Virtual Memory Optimization Service Rules
- Citrix WMI Service Rules
- Citrix XML Service Rules
- Citrix XTE Server Service Rules
- Remote Desktop Service Rules
XenApp Session Monitoring Rules
- Active Session Count Rules
- Connected Session Count Rules
- Disconnected Session Count Rules
- Listening Session Count Rules
- User Specific Session Count Rules