Greyware Automation Products, Inc.
Greyware Automation Products, Inc.   
     Home    Products    Store    Downloads    Customer Service    Site Search    
Log in  or   Create an account now -- FREE!        
Domain Time II > v5 > Configuration > Manager > Monitor > Setup

Pricing   Buy Now

30-Day Trial Version
Domain Time II Monitor Service
Version 5.2
Setup  Setup
Use the Setup page to configure important Domain Time II Monitor Service settings.


Monitor should check the network

Send email summaries
       Include all detail records
       Include only error details
       No detail records



The Schedule section controls which functions Monitor performs on a regular basis, as well as notification email configuration.

    The Monitor should check the network   drop-down list sets how often the service will run a network scan.* Choose a schedule that gives you the level of surveillance of your Domain Time machines you desire.

      When a scan is run, Monitor sends a discovery packet to the network (see the Discovery section below). Any Domain Time Server or Client that hears the discovery packet responds to the Monitor machine with its current sync information.

      Each time the scan is run, the results are analyzed to be sure all of the responding machines meet your alert criteria (see the Alerts tab page to set your alert definitions).

      Note: Only machines that are running at the time of the scan will be included in the Monitor scan results. In addition, transient network issues may prevent UDP packet responses from being received reliably.

      Domain Time Audit Server is a much more robust solution, and offers many additional monitoring and alerting functions than does Monitor Service. This includes persistent contact lists (status of both on- and off-line machines), monitoring of NTP daemons, real-time alarms, more complete historical record keeping, etc. You should only use Monitor for quick snapshots and "heads-up" alerting. Use Audit Server for more critical tasks.

      * You may run a scan manually by clicking the Rescan Now button on the Status tab page.

    Send email summaries 
           Include all detail records
           Include only error details
           No detail records

    Use these controls to determine whether and how often to receive summary email reports of the Monitor Service scan activity. You can also select which level of detail you want included in the email. See the sample report below for an example of what's included in the summary section and in the optional detail records.

      Domain Time II Monitor Summary Report

        Report Date:     Sun 18 Oct 2009 00:00:39
        Scan machine:    FLEEGMAN
        Email Alerts:    Enabled
        Event Viewer:    Enabled
        First Scan:      Sat 17 Oct 2009 02:22:20
        Last Scan:       Sat 17 Oct 2009 20:20:17
        Period Covered:  17 hours, 57 minutes
        Detail Records:  All (see below)
        Total Scans:     1
        Scan Errors:     0
        Tests Passed:    9 of 9
        Tests Failed:    0 of 9
       Average Delta:    - 00 000 00:00:00.071
      Detail Record 1 of 1
      Scan Status: Passed Scan Time: Sat 17 Oct 2009 07:22:20 UTC Sat 17 Oct 2009 02:22:20 (local) Reference Clock Type: This machine's sources (averaged) Reference Clock Time: Sat Oct 17 2009 02:22:19 Reference Source: server protocol DT2-UDP samples 3 Reference Offset: -0.2964544 seconds Type and average delta yy ddd hh:mm:ss.mss ----------------------- -- --- ------------ Clients: 3 - 00 000 00:00:00.119 Total: 3 - 00 000 00:00:00.119 Slowest Clock: Sat Oct 17 2009 07:22:19.972 UTC (OMEGA13) Fastest Clock: Sat Oct 17 2009 07:22:19.972 UTC (Grabthar) Worst Client: + 00 000 00:00:00.371 (OMEGA13) Master/Slave Test: Limit: 500 ms Slave Var: + 00 000 00:00:00.000 Test Passed Single Machine Test: Limit: 1000 ms Worst Var: + 00 000 00:00:00.371 Test Passed Avg Variance Test: Limit: 750 ms Total Var: - 00 000 00:00:00.119 Test Passed INDIVIDUAL VARIANCES (sorted by variance) - 00 000 00:00:00.371 Full Client (OMEGA13) + 00 000 00:00:00.000 Full Client (HV-2003-R2-X64) + 00 000 00:00:00.013 Full Client (Grabthar)
      End of Summary Report
      Sample Monitor Summary Report Email (reduced size)

    Use to configure SMTP servers, delivery addresses, and manage the notification email queue.

    You must configure these email settings before Monitor Service can send notification emails.

      Set the From address

      Email Setup From and Format Selection
      Email Setup From and Format Selection   [Click for larger size]

      Specify the From: email address that will appear on the notification emails. You can also specify the format and MIME part order of the emails:

      • Plain Text
      • Text part followed by HTML part
      • HTML part followed by Text part

        Choose the format that provides the best compatibility with your email system.

      Set the TO/CC/BCC distribution lists

      Email Recipients List
      Email Recipients List   [Click for larger size]

      Use the To, CC, and BCC tabs to add the email addresses of your desired recipients.

      Set the Outgoing Server

      Outgoing SMTP Server Settings
      Outgoing SMTP Server Settings   [Click for larger size]

      Enter the server address and account login information required for Monitor Service to send outgoing mail through your SMTP server.


      Send Test Email
      Once you have entered all of the above information, click the Send Test Email button to generate a test email.

      If your test email encounters any errors, you'll receive a pop-up window showing the entire SMTP conversation so you can easily troubleshoot the problem:

      Send Test Email, Showing SMTP Error
      Send Test Email, Showing SMTP Error   [Click for larger size]

      Check the email queue to troubleshoot delivery issues

      Email Queue Settings and Email Logs
      Email Queue Settings and Email Logs   [Click for larger size]

      This page contains the settings for the email queue and email logs.

        The Queue Folder: specifies the location of the folder where outgoing emails are queued. The email.log trace file is also kept in this folder.

      Note: In most cases, you will not need to adjust this location. If you do decide to change the folder location, you must pick a location on a local disk (not a networked share) with sufficient permissions (Change) granted to the Monitor Service service account so that it is able to manage the queues.

      Use the SMTP Trace:  drop-down list to select the level of detail you want to keep in the email.log trace file. In general, you should only enable the trace file if you are troubleshooting an email delivery issue. Otherwise, your email.log file may grow to an unmanageable size over time.

      Use the Open or Browse buttons to open the queue folder and locate the email.log file, which is a plain text file you can open in any editor, such as Notepad.


      Advanced Configuration: Email-related registry settings
      Depending on your email server configuration, you may also need to adjust these additional settings in the Windows registry.

      Email registry settings are located in the HKEY_CLASSES_ROOT\Gap\GWServiceSMTP key.

        TLSIgnoreCertErrors (REG_DWORD)
        Introduced in v5.2.b.20140922 with default=0 (ignore no errors). As of v5.2.b.20160711, the default changed to 0x311 (accept certs that are self-signed, expired, or have the wrong CN)

          If this value is zero, the server cert must pass all tests. If the value is non-zero, it is a bitmask specifying which particular types of errors may be ignored. See Microsoft's documentation for a list of certificate errors that may be ignored. Use a logical OR to combine multiple values.

          • 0x00000080 - Ignore errors associated with certificate revocation
          • 0x00000100 - Ignore errors associated with an unknown (or self-signed) certificate authority
          • 0x00000200 - Ignore errors associated with wrong use of a certificate
          • 0x00001000 - Ignore errors associated with an invalid/mismatched common name
          • 0x00002000 - Ignore errors associated with an expired certificate

          You may set the value to 0x10000000 in order to regain strict certificate checking, 0x0000FFFF to disable certificate checking altogether, or any combination of the above values.

        TLSAcceptableProtocols (REG_DWORD)
        Introduced in v5.2.b.20160711. This is a bitmask of acceptable encryption protocols. The default value is 0x0AA0. Use a logical OR to combine multiple values.

          • 0x00000002 - PTC1 (not recommended)
          • 0x00000008 - SSL2 (not recommended)
          • 0x00000020 - SSL3 (not recommended, but included in default for backward compatibility)
          • 0x00000080 - TLS 1.0 (not recommended, but included in default for backward compatibility)
          • 0x00000200 - TLS 1.1
          • 0x00000800 - TLS 1.2
          • 0xFFFFFFFF - any available protocol (not recommended)

        FQDN (REG_SZ)
        Introduced in v5.2.b.20160711. This value contains the name to use during SMTP envelope negotiations; specifically, it is the name presented as the HELO or EHLO name immediately after receiving the server's greeting.

          In previous versions, the name used was the sending machine's fully-qualified host name. However, workgroup members or machines just starting may only have a bald hostname available. This new value is set the first time an email is sent, and used thereafter for all subsequent emails. If a fully-qualified name is not discoverable, then Domain Time will use either a dotted-quad IP enclosed in brackets, or the computer name followed by .smtp.local. RFC 2821 section requires one of these two forms. You may change the name if your particular email server requires an externally-verifiable DNS name to be presented.


 Network Settings 

Use Manager's network settings


The Network Settings section allows you to choose whether or not Monitor should use Manager's settings for Network Discovery and Reference Clock or to set these items independently.

Network Discovery
If you choose Customize, you can pull up Monitor's Network Discovery dialog by clicking the button.

    The Network Discovery Dialog
    The Network Discovery Dialog   [Click for larger size]

    This dialog controls how Monitor Service discovers currently running Domain Time components on the local subnet and beyond.

    When enabled, Monitor Service broadcasts and/or multicasts a special discovery packet to the network. Any machine that hears the discovery packet will then respond back via a unicast UDP packet containing its synchronization status and other data. Broadcasts/Multicasts are sent to the networks indicated on this dialog, using the protocol types selected.

    This method only discovers machines that are online and that respond to the discovery packet.

    Note: Although NTP broadcast/multicast addresses are listed on this dialog, the Monitor Service only uses the DT2 protocol settings and only discovers Domain Time machines.

      IPv4/IPv6 Multicast Discovery
      Domain Time can use multicast to discover Domain Time machines currently online over IPv4 and/or IPv6, both on the local subnet and on remote subnets. This method is preferred over the older IPv4 Broadcast Discovery method described below.

        In order to use this method, your network must be enabled for multicast. You must have multicast-enabled routers/switches configured to allow multicasts sent to port 9909 UDP to reach all of your subnets. This may also require enabling PIM (Protocol-Independent Multicasts) on all relevant interfaces. Consult your network equipment vendor(s) for configuration details necessary for your environment.

         IPv4 Multicast Discovery 

              All local subnets (more thorough)
              Primary subnet only (faster)

           DT2 multicast address:   
        NTP multicast address:
        IPv4 TTL:

         IPv6 Multicast Discovery 

              All local subnets (more thorough)
              Primary subnet only (faster)

           DT2 multicast address:   
        NTP multicast address:
        IPv6 Hops:

        All local subnets (more thorough)
        Primary subnet only (faster)

        These options select whether the multicast discovery packet is sent out only over the interface the operating system has designated as the primary interface or through all network interfaces, or whether it is sent to specified remote subnets.

          Sending through multiple interfaces also results in longer timeouts and processing overhead to send traffic and listen for responses on each interface. In general, you will want to send only through the primary interface unless you have machines that cannot be discovered otherwise. Also, If you have multi-homed machines visible to the Monitor Service on multiple interfaces, sending discovery packets through all interfaces may result in duplicate responses from those machines.

        The DT2 and NTP multicast address boxes indicate the multicast address(es) Monitor Service will send the discovery packet to. Only change these addresses if you have a compelling reason to do so. Changing these values is usually an error.

        The IPv4 TTL: and IPV6 Hops: entries set how many router hops a multicast packet must cross when propagating through your network. Choose a value that allows multicasts to reach all of your subnets.

      IPv4 Broadcast Discovery
      By default, Monitor Service only broadcasts to the local segment. This is an efficient way to discover machines local on local subnets, and you probably do not want to disable this function entirely. However, using IPv4 Broadcasts to discover machines on remote subnets is recommended only if multicast discovery is not possible or reliable on your network.

         IPv4 Broadcast Discovery 

              List of custom addresses
              All local subnets (more thorough)
              Primary subnet only (faster)

           Custom Broadcast Addresses  

        List of custom addresses
        All local subnets (more thorough)
        Primary subnet only (faster)

        These options select whether the broadcast discovery packet is sent out only over the interface the operating system has designated as the primary interface, through all local network interfaces, or whether it is sent to specified subnets.

          Sending through multiple interfaces also results in longer timeouts and processing overhead to send traffic and listen for responses on each interface. In general, you will want to send only through the primary interface unless you have machines that cannot be discovered otherwise. Also, If you have multi-homed machines visible to the Monitor Service on multiple interfaces, sending discovery packets through all interfaces may result in duplicate responses from those machines.

          The address is used to broadcast to the primary segment. Only change this address if you have a compelling reason to do so. Changing this value is usually an error.

          Custom Broadcast Addresses
          To discover machines on remote subnets, your routers/switches must be configured to allow broadcast traffic using port 9909 UDP to reach each subnet. You must also select the List of custom addresses radio button and specify the broadcast address for each subnet. Monitor Service will then send directed broadcasts to the broadcast addresses specified.

          This option is provided primarily for backwards-compatibility with versions prior to version 5.1. This method does not scale well and is unreliable due to firewall/router issues with passing broadcasts between subnets. We recommend you use multicasts to reach remote subnets instead, if possible (see above).

          If you do choose to use this option, the entry is used to broadcast to the primary segment. You should leave this entry in the list unless you have a specific reason to remove it. Then, enter the broadcast address for any other remote subnets you want to scan via IPv4 broadcast. For example, you would enter as the broadcast address for the 192.168.1.x subnet.

        Note about Broadcast Traffic across firewalls
        Broadcast traffic typically originates from an ephemeral source port sent to the broadcast address of designated subnets intended for destination port 9909. Domain Time II components that receive the broadcast then respond via unicast from source port 9909 back to the sending IP address's ephemeral port. This broadcast discovery process is substantially the same as the process used by DHCP, TFTP, and other standard broadcast discovery methods.

        Stateful firewalls/routers will often require additional configuration to ensure broadcast discovery operates correctly, since unlike normal unicast UDP communication, the originating traffic is not sent to the same IP address from which the reply will come. Broadcast traffic is sent to the address, but the unicast replies from that subnet may come from any (or all) addresses in the range

        Normal stateful firewall rules typically only open the firewall for replies from the same IP address to which the originating traffic was sent, so even if unicast port 9909 UDP traffic is enabled and working, broadcast traffic may still fail. Therefore, most firewalls have special rules that can be applied to allow broadcasts to function correctly, (such as ip helper-address, ip directed-broadcast and ip forward-port functions on Cisco equipment, for example). Check with your firewall manufacturer for the correct broadcast address configuration instructions for your particular systems.

      UDP & ICMP Timeouts
      UDP packets are subject to numerous possible delays, particularly on busy networks or across slower links. This can cause some machines to not respond to scans reliably. You may be able to compensate for some of these issues by increasing the UDP/ICMP Send and Receive values.

         UDP and ICMP Timeouts 


          ms (1 to 5000)

          ms (1 to 10000)


        If you have configured broadcasts and multicasts correctly, and you know for certain that your routers, firewalls, and switches are configured correctly to pass the traffic, and yet you are not seeing all of your remote machines, you may need to increase your timeout settings.

        The Presets: drop-down list allows you to quickly pick recommended values for various network configurations. You can use these values as suggested starting points to adjust your timeouts.

        For troubleshooting, you may want to temporarily pick the longest timeout preset (Satellite Link) to eliminate timeouts as a connection issue. However, in production, set timeouts only long enough to receive responses from all of your systems. Setting too large of a timeout will result in scans taking an excessively long time to complete.

        If, after adjusting the broadcast/multicast addresses and timeouts, you still encounter issues with seeing all of your remote systems, you should consider using Audit Server instead. Audit Server uses a persistent list of machines with more robust unicast communication to be sure remote machines are reachable.

Reference Clock
Specify the reference time that Monitor will use to compare against all sampled machines by clicking the button. All variances and alert thresholds will be calculated from this time.

Important: Stable reference time is critical to obtaining trustworthy variance data from your network. Choose sources that are known to be reliable and available over low-latency connections.

    Reference Time Source Selection
    Reference Time Source Selection   [Click for larger size]

    The Reference Clock Type:  list gives you multiple options for obtaining reference time:

    • Use this machine's clock
      The local machine's clock is used as the reference. Use this setting if you have the Domain Time Server running on this machine set to synchronize using PTP. Otherwise, only use this setting if the local time on your machine is being well-corrected by a reliable process, either by Domain Time or another source, such as an internal GPS clock card.

    • Use this machine's sources
      When selected, Monitor Service will use the same time sources used by the Domain Time Server or Client installed on the local machine. This is an excellent option if you have already configured the local Server or Client to obtain time from reliable sources using the NTP or DT2 protocols.

    • Specify a list of servers
      Use this option to specify the exact machines you want to use for your reference time.

    • Discover DT2 server(s)
    • Discover NTP server(s)
    • Discover any available server(s)
      The auto-discovery options allows Monitor Service to locate available servers of the selected type on the network. Discovery will use all discovered servers if the Analyze all listed servers and choose the best... checkbox is checked, otherwise it will use the first discovered server.

      Note: To avoid the possibility of inadvertently using a free-running local clock, the discovery process will not use the local machine, even if the local machine is a time server.

    Analyze time samples and choose the best, or average equally good samples (recommended)
    This controls whether Monitor Service applies advanced analysis algorithms to the collected time samples.

      When this box is checked, Monitor Service contacts all of the listed servers to collect a group of time samples. It then performs statistical analysis on the collected samples to determine the reliability and uses the most reliable samples to derives the correct time.

      See the About Time Samples sidebar for more information and rule-of-thumb suggestions on acquiring time samples.

      If you are collecting multiple samples, checking this box will almost always improve your reference time's accuracy and reliability.

      If this box is unchecked, no comparative analysis among samples is performed. In addition, the list of time servers to query becomes a fallback-only list. In other words, Monitor Service will only contact first listed time server. This server will always be used unless it is unavailable, at which point the next listed server will be used. If that server is unavailable, the next server in the list will be tried, etc. When the first listed server becomes available again, the Server will revert to using it exclusively.


 Saved Histories 

Sort by IP address
Sort by variance

      Save up to  histories
      for up to  days

The Saved Histories settings control how saved scan results are displayed on the History tab page, and how many scan results to keep at any one time.

    The amount of disk space used by your stored scan results varies significantly based on how many machines are scanned and how often scans are run. Monitor keeps a maximum of 999 scans, but you can reduce this amount if you have disk constraints.


Next Proceed to the Alerts page
Back Back to the History page

My Account  |   Contact Us  |   Privacy Policy  |   Printer-Friendly Version
Copyright © 1995-2023 Greyware Automation Products, Inc.  All Rights Reserved
All Trademarks mentioned are the properties of their respective owners.