The Process Used
Identified business critical applications
Understand the way the application is architected, its function and its tolerances
Develop a matrix detailing each network element the application touches
Trace the expected path of the application in the network
Place and configure probes and/or agents for support
Monitor, analyze, and report on the environment
Author | Title | Tracks | Home