Created on 09-28-2016 02:26 AM Edited on 05-26-2022 11:24 AM By Anonymous
Description
This article will walk through on how to configure STM (Synthetic Transaction Monitoring)
There are two distinct operations that must happen when configuring synthetic transaction monitoring.
At the heart of these operations is ensuring that the correct protocols for each device are used. The setup can also be tested for correctness.
A user needs to define templates that describe the applications or services that they wish to monitor from an end-user perspective.
(Head to Setup Wizard --> Synthetic Transaction Monitoring)
Once a definition has been created, the host or IP address that it will monitor must be added. This can be a hostname, single IP address, a range of IP addresses, or set as any address that has been found to run the application being monitored.
After the user clicked the 'OK' button, the system will do a automatic test connectivity to device or host using the credentials. !stm-test-popup21.png|border=1!If the service monitoring test is successful, the entry will be added to the table.
A list of the rules that are being used to monitor devices can be found by clicking the 'Synthetic Transaction Monitoring Status' link to the right of the 'Step 2' section.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.