Contents
1.
INTRODUCTION .............................................................................................................. 4
1.1
Active Monitoring ............................................................................................................... 4
1.2 Shutdown-Off-On feature ........................................................................................ 4
1.3 Log file ..................................................................................................................... 4
2 SOFTWARE USAGE ....................................................................................................... 6
2.2 Watchdog Options...................................................................................................... 7
2.2 Automated Watchdog Monitoring for Remote Computers ................................................. 8