Many aspects of agent monitoring are available in one or more of the Monitor Agent consoles. The table below summarizes agent monitoring features and where they are available.
Task |
|||
Yes |
Yes |
No |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes if not in groups |
|
Yes |
Yes |
Yes |
|
Yes |
No |
No |
|
Yes |
Yes |
Yes |
|
No |
No |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
No |
No |
|
Yes |
Yes |
Yes |
|
Configuring Authentication and Intruder Lockout for the Monitor Web Console |
Yes |
|
No |
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
Yes |
Yes |
Yes |
|
No |
Yes |
No |
|
Yes |
Yes |
No |
|
Yes |
Yes |
No |
|
Yes |
Yes |
No |
|
Yes |
Yes |
No |
|
Yes |
Yes |
No |
|
No |
Yes |
No |
|
No |
Yes |
No |
|
No |
Yes |
No |
|
No |
Yes |
No |