Forum Discussion

yaquaholic's avatar
yaquaholic
Icon for Contributor III rankContributor III
26 days ago

Windows SNMP is slipping away

As you may have noticed Microsoft have stopped including the SNMP service by default on server builds and only supports SNMP v2 natively. In this ever increasing world of security exploits, SNMP v2 is seen as insecure and a liability to run on all but air gapped networks, so why is the ScienceLogic preferred way of monitoring Windows Services still using SNMP?

The SNMP Service monitoring allows you to monitor just the services of choice, unlike the blunderbuss PowerShell approach (where if the service is set to Automatic start-up and not running, it alerts). 
A 2am called out for a clipboard service outage and some grumpy emails in my inbox, and I'm inclined to agree with the very grumpy DBA that it is not ideal.

Can we get some motion on sorting out the PowerShell monitoring, so that regardless of how we collect the service statuses we can alert consistently? 

1 Reply

  • Hi yaquaholic​, The Microsoft: Windows Server PowerPack provides 2 options for Service monitoring.

    1. The option you describe as the blunderbuss approach is handled by the "Microsoft: Windows Server Service Configuration" Dynamic App. It alerts when a service set to Automatic Start-up, but not set to Trigger and not in the exclude database table.
    2. The other follows the SNMP Internal Collection approach.  The only alerts are for Service Policy monitors set for that device.  This one is handled by the following Dynamic Apps.
      "Microsoft: Windows Server IC Process Service Cache"
      "Microsoft: Windows Server IC Service Performance"
      "Microsoft: Windows Server IC Service Inventory"

    The second option is available in Microsoft: Windows Server PowerPack version 112 or greater.

    Regards,

    Erick