Already a NinjaOne customer? Log in to view more guides and the latest updates.

NinjaOne NMS: Policy Management

reviewed by Ian Crego

Topic

This article discusses policy management for NinjaOne NMS.

Environment

  • Network monitoring services
  • NinjaOne policies

Description

Devices discovered by the NMS agent can be assigned a device role that dictates the policy through which they are managed. The NMS agent must be installed on the device for policy management to take effect. For instructions on setting up NMS, refer to NMS: Setup Installation and Configuration.

Index

Prerequisites

You must set up monitoring for configuration backup, SNMP traps, Syslog, and/or NetFlow locally on your devices. Configuration steps differ depending on your device's vendor and model, so we recommend referring to your manufacturer's documentation for assistance with setup.

  • NinjaOne supports configuration backup monitoring on Hewlett-Packard and Cisco devices.
  • NinjaOne supports NetFlow/jFlow/sFlow/IPFIX monitoring.
  • SonicWall requires App Visualization licensing to utilize flow reporting.

Create a Custom Role for a Policy

You can create NMS policies from custom device roles. When you create the new policy, the configuration modal allows you to select the custom role. For more information, refer to custom device roles. To learn more about creating and managing device roles, refer to the Device Roles guide.

Add a new role

To add a new role from any of the NMS roles displayed on the page, place your cursor over the row and click Add. 

admin_devices_roles_nms.png
Figure 1: NMS options (click to enlarge)

Create New NMS Policies

  1. Navigate to AdministrationPoliciesNMS Policies, then click Create New Policy in the top right corner of the window.

admin_policies_nms_new.png
Figure 2: Create New Policy (click to enlarge)

  1. Assign the new policy a name and an optional description, then click the Role drop-down menu and select NMS. A new drop-down labeled NMS Role will appear. Here, you can select the device role

admin_policies_nms_new_modal.png
Figure 3: "Create a policy" modal for NMS role (click to enlarge)

At this time, the Parent policy field is not configurable for NMS policies. We are working to enable this in a future release. 
  1. Click Save to complete the new policy creation and assign policy settings.

Copy an Existing Policy 

  1. To make a copy of an existing policy, place your cursor over the policy you wish to copy and click the ellipsis button on the right side. Select Copy. 
  2. Name the policy and click Save, then make any changes to the configured settings that you require.

NMS Policy Settings and Configuration

This section goes over each tab in the NMS policy and the settings that are available for configuration.

nms policy_sections.png
Figure 4: Policy configuration page sections (click to enlarge)

Select a section below to learn more:

Network Performance

All monitors are run from the NMS agent on the same LAN.

These settings allow you to monitor network performance using any of the following methods:

Tab NameDescription
DNSMonitors the Domain Name System (DNS) at a specified interval and timeout (in milliseconds) as well as DNS NetBIOS Name, LMHost, Host, or Forward DNS resolution. These policy settings are hard-coded in the NMS delegate and cannot be changed. 
PingMonitors ping at a specified interval and timeout (in seconds). You can also monitor the packet TTL, pings per node, and the delay between pings (in milliseconds).
Port Monitors selected ports at a specified interval and timeout (in milliseconds).
HTTP Monitors HTTP (Hypertext Transfer Protocol) or HTTPS (secure) for selected port at a specified interval and timeout (in seconds).

nms policy_network performance_tabs.png
Figure 5: Network Performance Tabs (click to enlarge)

Configuration Backup

These settings let you manage the configuration backup for HP or Cisco devices. You can perform the configuration backup at a specified interval and timeout (in seconds), specify a file transfer timeout to monitor for (in seconds), and choose whether to monitor the running config or the startup config. 

For configuration backup to work, you must ensure the Telnet/SSH credentials are set up properly. You can do this by going to any organization configuration page and adding or editing the data under Credentials. The Edit and Delete options only display when you move your cursor over the row. 

org_credentials_add or edit.png
Figure 6: Add, edit, or delete credentials (click to enlarge)

Syslog 

These settings allow you to choose different monitoring facilities and severities within the syslog on the device. The system will not take into account any facilities and severities you uncheck in the conditions.

NinjaOne discards the following syslog activities by default: 

  • Facility: User
  • Severity: Debug, Info, Notice 

To obtain messages or alerts for the above, you must configure the alert manually from the Conditions section of the NMS policy. Select the "Syslog" condition and then select which messages you want to receive from the Facilities and/or Severities fields. 

NetFlow/sFlow/JFlow Collector:

These settings govern the type of NetFlow traffic you'd like to monitor, any IP (Internet Protocol) addresses from which you'd like to discard data, and the flow noise configuration.

NinjaOne supports several different traffic protocols:

  • NetFlow (NetFlow 5, NetFlow 9)
    • See the following links for examples of NetFlow configuration documentation:
  • J-Flow
  • sFlow (sFlow 2, sFlow 5)
  • IPFIX (NetFlow 10)=

SNMP Monitoring

These settings allow you to monitor basic SNMP (Simple Network Management Protocol) data (like CPU, memory, Disk, or Network Adapter). When adding a monitor, NinjaOne presents the options pulled from the SNMP Library. Refer to NMS: Custom SNMP to learn more. 

snmp monitoring_add.png
Figure 7: Add monitor from Library (click to enlarge)

Conditions

Choose from any of the following available conditions to monitor with this policy:

Condition NameDescription
ProcessorThis triggers if the processor utilization is greater than, less than, or equal to a threshold percent defined in the condition dialog box. You can choose between hit count or duration for the type.
Memory This triggers if the memory utilization is greater than, less than, or equal to a threshold percent defined in the condition dialog box. You can choose between hit count or duration for the type.
Disk Usage(Firewall and VM Host policy only) This triggers if the processor utilization is greater than, less than, or equal to a threshold percent defined in the condition dialog box.
Network Adapter TrafficTriggers if the ingoing or outgoing network adapter traffic is greater than, less than, or equal to a threshold, which you can specify in numerous units. You can choose between hit count or duration for the type.
Network Adapter Traffic PercentTriggers if the ingoing or outgoing network adapter traffic is greater than, less than, or equal to a threshold percent. You can choose between hit count or duration for the type.
Network Adapter StatusMonitors whether a network adapter is in a specified status.
Network Adapter Status ChangeMonitors when a network adapter changes to or from a specified status.
Ping LatencyTriggers if the ping latency is greater than, less than, or equal to a certain threshold percent. You can choose between hit count or duration for the type.
Ping Packet LossTriggers if the ping packet loss is greater than, less than, or equal to a certain threshold percent for a specified duration of time.
Ping ResponseMonitors if a ping receives a response after a specified number of attempts.
Http Monitors for selected status codes, as well as the presence of specified content text.
Ports Monitors the status of specified ports.
Syslog Monitors the syslog for the specified logic type (and/or), message, facilities, and severities.
Important Note: The last three options under Severities could result in a large number of alerts. 
 
Device DownTriggers if the device goes down for the duration of time specified in the condition dialog box.
Configuration FileMonitors for changes to the configuration file. Specify whether you'd like to monitor for content being added or removed, specific text to monitor for, or specific text to ignore. 
Important Note: Under the Configuration Backup tab of the NMS policy, you can specify the type of configuration you want to monitor. You can choose between Startup-config and Running-config.
SNMP TrapMonitors if the system receives any trap, a trap containing a specific OID, or a trap value containing a specific target string.

 

NMS Condition Interval Dependency

The following conditions depend on the SNMP Monitoring Interval:

  • Custom SNMP condition
  • Device Down condition
  • Memory condition
  • All network adapter conditions
  • Processor condition
  • System Uptime condition

Other Notes about NMS Policy Conditions

Reset interval

When creating conditions in your NMS policies, you can specify a reset interval that dictates the amount of time that will pass until the condition automatically resets (the alert will be cleared from the device).
 

nms condition_reset interval.png
Figure 8: NMS condition Reset Interval (click to enlarge)
 

Notify Technicians

You will also have the option to enable notifications to be sent when a condition is triggered.

nms condition_notify techs.png
Figure 9: NMS condition → Notify Technicians (click to enlarge)

Assign Default NMS Policies for an Organization

  1. Navigate to the organization's editor (AdministrationOrganizations).
  2. Select Policies on the left side of the window, then open the NMS Policies tab at the top of the page.

org_policies_nms.png
Figure 10: NinjaOne organization-level NMS Policies (click to enlarge)

  1. Select the desired default policies from the drop-down menus, then click Save in the top right corner.

Once saved, policies are automatically assigned to NMS devices under this organization according to the role they are assigned.

FAQ

Next Steps