Ensure persistent availability and presence of all servers, workstations, and network devices.

Sentry II is your tool for monitoring, alerting, and reporting on the status of your Windows servers and workstations, Linux/Unix servers, and network devices.

Sentry II for (click for details):

1.        Server management and configuration


2.        Event correlation over multiple servers and network devices


3.        Monitor network device and server performance


4.        Conduct an analysis of your servers for capacity planning


5.        Meet your specific compliance needs


6.        Application tracking


7.        Manage the content of your logs


8.        Archive your logs to a centralized location


9.        Use the viewer to investigate critical events


10.     Generate compelling reports based on the status of your servers


11.     Real-time notifications when critical server failure events occur


12.   Server status dashboard

Technical information

Sentry II can actively monitor:

  • Windows 95, 98, NT, 2000, Server 2003, XP, Server 2008, Vista, and 64-bit operating systems

  • Unix and Linux servers via SNMP trap and syslog messages, and open ports

  • Network devices: firewalls, routers, hubs, switches, print servers and more via SNMP trap and syslog messages, and open ports

Sentry II Server runs on:

  • Windows NT, 2000, 2003, or 2008 Server

Sentry II uses an ODBC database to store server information:

  • Choose between Microsoft SQL or Access for your database

  • The database enables you to easily search for your critical information

  • Pre-configured reports are available within Sentry II to enable you access to your data without technical database knowledge

  • The database is configured intuitively to make reporting easy


1.     How Sentry II manages server configuration:

a.     Track port uptime (HTTP, Telnet, FTP and more!)

b.     Track service uptime on all Windows platforms (all services)

c.     Prevent specific services from running

d.     Track running processes

e.     Prevent specific processes from running

f.      Track file content and discover “who touched what file”

g.     Current installed hardware listing

2.     Event correlation with Sentry II:

a.      Query of event logs, SNMP traps, or syslog messages over multiple servers

b.      Set watch conditions to alert you in real-time when specific events occur 

3.     Monitor network device and server performance with Sentry II:

a.     Collect Windows and SNMP counters from your servers and network devices

b.     Store the information in the Sentry II database to perform analysis over time

c.     Use the watch feature to alert you when specific thresholds are breached (i.e. free space on drive C:\ below 20% or Processor Utilization above 70%)

4.     Capacity planning with Sentry II:

a.     Monitor your individual processes to ensure they are not “hogging” your server resources

b.     Collect Windows and SNMP counter data over time to perform trending and discover when upgrades and new equipment are necessary

5.     Compliance with Sentry II:

a.    Sarbanes-Oxley (SOX)

b.    Health Insurance Portability and Accountability Act (HIPAA)


d.  NIST

6.     Managing your critical applications with Sentry II:

a.    Monitor your applications at the service, process, or port level

b.    Use our watch feature to send alerts when your application is not functioning properly

c.    Use our watch feature to restart the application’s process or service automatically whenever it stops

d.    Use our watch feature to schedule an application to run and alert you if it fails

7.     Managing the content of your logs with Sentry II:

a.     Archive your event log and syslog messages in an unmodified state and search them quickly and easily from the Sentry II viewer

b.     Report on and export your current, monitored, or archived event logs

c.     Use the watch feature to monitor event log and syslogs and maintain awareness of critical events

8.     Archiving your logs with Sentry II:

a.     Archive event log and syslog messages in an unmodified state

b.     Search over 2 million archived records in under 20 minutes!

9.     Searching for critical events with the Sentry II viewer:

a.     Search events based on log type, event id, user, source, description, and more

b.     Export, email, or print your search results

10.  Generating compelling reports with Sentry II:

a.     Intuitively designed graphical reports with just a few clicks!

b.     Export your reports to: PDF, HTML, Excel, Word, and many other formats

11.   Real-time notification with Sentry II:

a.    Receive real-time notifications when failure or security events occur via: email, pop-up, program executable, text message, pager, SNMP trap, syslog message and more!

       12.  Sentry II's server status dashboard:

               a.   Dashboard display of server status


FileAudit® - To manage and correlate Files and Folders, click here.

UserLock® - To enforce concurrent Logon and Generate Logon Reporting, click here. 


Download Sentry II


Release Notes

User Manual
Event IDs
Agentless User Logon/Logoff Feature
Evaluating Automated Security Tools
Sarbanes-Oxley Compliance
Why you should monitor your event logs

White Paper

Event Log Management Cost Justification


Customer Endorsements

© 2002-2011 Engagent