You are here

What does the Myrtec agent monitor

The Myrtec agent is used to manage and monitor computers, servers and networks. The Myrtec agent can be identified by a M icon in the task tray (near the clock icon in Windows). Some of the functions that the Myrtec agent monitors includes (including associated auto-remediation tasks):

  • Blacklisted event log entries (group policy failure, application errors)
  • Blacklisted running processes (i.e malware, unwanted applications)
  • Software installed (i.e malware, toolbars, illegal applications as well as application reporting)
  • Service status (i.e are any automatic services not running)
  • Free disk space (as total free as well as a percentage free)
  • Hardware failures (i.e SMART disk monitoring to detect bad sectors)
  • Performance monitors (i.e CPU usage, memory usage, disk queue)
  • Open network ports (i.e an IIS server should respond to port 80)
  • Microsoft security patches (patches installed and needed, service pack status)
  • Backup status (i.e confirming successful symantec, veeam or windows backups)
  • Application specific monitors (i.e Exchange queues or backpressure)
  • Antivirus application and definitions (i.e confirm AV is active with up to date definitions)
  • Unscheduled events (i.e unexpected reboots or BSODs)
  • Network status (i.e servers or networks offline, SNMP traps, syslogs, network probes)


Equally important the following items are not monitored or conducted by the Myrtec agent:

  • End user behavior (i.e how long certain application are run for)
  • Websites that are visited
  • Capturing of tracking of screen sessions
  • Remote control of users sessions without permission
  • Inspection of network traffic

It is important to note that the items that the Myrtec agent does not monitor may be tracked or managed by other applications or systems such as antivirus applications or proxy servers and that all users should operate any business equipment in accordance to their organisations acceptable use of IT systems policy.