Introduction to PRTG

PRTG

It is an agentless network monitoring software from Paessler AG. It can monitor and classify system conditions like bandwidth usage or uptime and collect statistics from miscellaneous hosts as switches, routers, servers, and other devices and applications.

PRTG Features

PRTG has a wide variety of features that make you stay ahead of IT infrastructure issues by monitoring anything, and everything in your network.


Multiple user interfaces

  • Full-featured web interface: based on AJAX with high-security standards, highly performant thanks to Single Page Application (SPA) technology, and optimally adjusting to your systems by its responsive design.
  • PRTG Desktop app: native application for PRTG, especially for several PRTG installations.

  • App for iOS and Android.

  • All user interfaces allow SSL-secured local and remote access and can be used simultaneously. 

 

 


Maps and dashboards

Visualize your network using real-time maps with live status information.

Create dashboards with the PRTG map designer and integrate all your network components with more than 300 different map objects – from device and status icons to traffic charts and top lists. Individualize your map using custom HTML.

Share your map providing its unique URL on a dashboard within your company LAN only, or even outside your company.

 

 

 

PRTG Technical Monitoring Scope

What can PRTG monitor?

  • Monitoring and alerting you about uptimes and downtimes or slow servers
  • System health monitoring of your various hardware devices
  • Network device monitoring and bandwidth accounting
  • Application monitoring
  • Monitoring virtual servers
  • Service level agreement (SLA) monitoring
  • System usage monitoring (for example, CPU load, free memory, or free disk space)
  • Database performance and table values monitoring
  • Email server monitoring and reviewing various backup solutions
  • Monitoring your network’s physical environment
  • Classifying network traffic by source or destination, as well as content
  • Discovering unusual, suspicious, or malicious activity with devices or users
  • Measuring Quality of Service (QoS) and Voice over IP (VoIP) parameters
  • Cloud monitoring services
  • Discovering and evaluating network devices
  • Collecting system information for various hardware types
  • Finding unexpected relationships between your network components to detect potential security issues and assessing the real usage of your network and hardware
  • Fail-safe monitoring using a cluster

 

PRTG Technical Requirements

For more details, you can also check the Reference Book.