{"id":117983,"date":"2024-12-03T07:30:39","date_gmt":"2024-12-03T12:30:39","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=117983"},"modified":"2024-12-09T07:26:41","modified_gmt":"2024-12-09T12:26:41","slug":"understand-rule-templates-for-alerts","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/understand-rule-templates-for-alerts","title":{"rendered":"Understand Rule Templates for Alerts"},"content":{"rendered":"\n
You can use predefined rule templates to configure monitoring rules based on your needs. While the predefined rule templates are designed to help you save time by quickly configuring rules, they also allow you to customize the rule as per your requirements. You can add relevant descriptions, add precise conditions, and set a relevant priority for your alerts to best suit your needs.<\/p>\n\n\n\n
Customizing alert rules allows you to:<\/p>\n\n\n\n
You can use predefined rule templates to configure alert rules from the Rules dashboard in the Alerts console. See Configure Rules for Device Monitoring and Alerting<\/a> to learn more.<\/p>\n\n\n\n Details of all the predefined rule templates available in the Alerts console along with the steps to configure each rule are discussed in this article.<\/p>\n\n\n\n 黑料海角91入口\u2019s Battery Health Monitoring rule tracks the battery capacity. This can help prevent issues like overheating and unexpected downtime caused by capacity decline over time.<\/p>\n\n\n\n <\/p><\/div> The rule monitors battery capacity for all battery-powered devices such as laptops and tablets, but excludes servers and desktops, which lack batteries.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n To configure the rule:<\/strong><\/p>\n\n\n\n By monitoring 黑料海角91入口 Command execution, you can quickly detect and resolve underlying issues, ensuring proactive maintenance and optimization.<\/p>\n\n\n\n Ensure all required commands for monitoring are added in the Commands <\/strong>section of the 黑料海角91入口 admin portal. See Get Started: Commands<\/a> to learn more.<\/p>\n\n\n\n To configure the rule:<\/strong><\/p>\n\n\n\n <\/p><\/div> If multiple commands are included in the Conditions<\/strong> section, a separate alert is generated for the failure of each command.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n You can also attach custom command scripts in the Conditions<\/strong> section of the rule to monitor specific system attributes or conditions. This flexibility allows targeted monitoring of various system elements such as:<\/p>\n\n\n\n By defining a custom monitoring script, you can create highly specific alerting conditions tailored to your unique environment and security requirements.<\/p>\n\n\n\n Examples (PowerShell): <\/p>\n\n\n\n (Get-Service -Name “CriticalService”).Status -ne “Running” ? (exit 1) : (exit 0)<\/p>\n<\/div><\/div>\n\n\n\n (Get-ItemPropertyValue ‘HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System’ -Name ‘EnableLUA’) -ne 1 ? (exit 1) : (exit 0)<\/p>\n<\/div><\/div>\n\n\n\n Similar scripts can be crafted to monitor event logs, process existence, admin accounts, or any custom condition relevant to your monitoring needs.<\/p>\n\n\n\n If devices remain offline for long durations, they may miss essential updates, security patches, and policy configurations, creating potential vulnerabilities and compliance risks. Regular monitoring helps identify and address such devices to ensure they are updated and secure when reconnected.<\/p>\n\n\n\n To configure the rule:<\/strong><\/p>\n\n\n\n Monitor device uptime to ensure devices are running smoothly and critical patches are applied on time.<\/p>\n\n\n\n To configure the rule:<\/strong><\/p>\n\n\n\n The drive where the Operating System (OS) is installed must have adequate free space to allow the device to function smoothly. The OS requires free space for temporary files and updates. As disk space declines, the device may slow down and critical updates may be missed, creating vulnerabilities. Monitoring disk usage helps admins track space and prevent slowdowns or crashes due to full disks.<\/p>\n\n\n\n To configure the rule:<\/p>\n\n\n\n <\/p><\/div> This sets the threshold. If disk space drops below it, the rule will generate an alert.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n 黑料海角91入口 Managed Software refers to the apps that are configured, deployed and maintained by 黑料海角91入口. Monitor managed software installation failures to ensure critical apps and updates are properly deployed across your system. See Get Started: Software <\/a>Management<\/a> to learn more.<\/p>\n\n\n\n Ensure all 黑料海角91入口 Managed Software apps are added in the Software Management section before configuring the rule.<\/p>\n\n\n\n To configure the rule:<\/strong><\/p>\n\n\n\n <\/p><\/div> Alerts generated by this rule will be auto-resolved once the app is successfully installed on the device.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Monitoring new user additions is a critical part of securing an IT environment, ensuring only authorized users have access and mitigating risks associated with unauthorized account creation.<\/p>\n\n\n\n To configure the rule:<\/p>\n\n\n\n Monitoring policy application failures ensures all security measures, configurations, and compliance guidelines are properly enforced.<\/p>\n\n\n\n You need to add all the required policies in the Policy Management section. See Get Started: Policies<\/a> to learn more. <\/p>\n\n\n\n To configure the rule:<\/strong><\/p>\n\n\n\nConfiguring Battery Health Monitoring Rule<\/h2>\n\n\n\n
\n
\n
Configuring Command Execution Failure Rule<\/h2>\n\n\n\n
\n
\n
\n
\n
\n
\n
Custom Command Monitoring: Extending Alert Rule Capabilities<\/h3>\n\n\n\n
\n
\n
\n
Configuring Device Offline Monitoring Rule<\/h2>\n\n\n\n
\n
\n
\n
\n
\n
\n
\n
Configuring Device Uptime Monitoring Rule<\/h2>\n\n\n\n
\n
\n
Configuring Disk Use Monitoring Rule<\/h2>\n\n\n\n
\n
\n
\n
You can add multiple conditions using Add Condition<\/strong>.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n\n
Configuring Managed Software Installation Failure Rule<\/h2>\n\n\n\n
\n
\n
Configuring New Users in 黑料海角91入口 Directory Rule<\/h2>\n\n\n\n
\n
\n
Configuring Policy Application Failure Rule<\/h2>\n\n\n\n
\n
\n
\n