Articles
Sort by recent activity
Proxy Configuration in Redgate Monitor
If using a proxy, you will need to configure Redgate Monitor to use your proxy settings.
Go to the machine running the base monitor service.
Open file %PROGRAMDATA%\Red Gate\Redgate Monitor\RedGat...
Redgate Monitor alert tuning
Redgate Monitor provides alert types for each category of monitored object (machine, SQL Server instance, Azure SQL Database etc). It provides sensible factory defaults for each alert type so that ...
Redgate Monitor set up for optimal performance
When getting started with Redgate Monitor, this article lists the setup recommendations for optimal performance.
1. Ensure adequate hardware is provisioned for hosting Redgate Monitor components (B...
FIPS 140-2 Compliance in Redgate Monitor
FIPS 140-2 Compliance
The Federal Information Processing Standard (FIPS) publication 140-2 sets out security requirements for cryptographic modules, including a laboratory validation program to app...
Resetting your Redgate Monitor password
Note: This article only applies if using the built in Redgate Monitor accounts
Only administrators can reset Redgate Monitor passwords.
Resetting standard and read-only user passwords
If you're a ...
Adding Alerts to the alert suppression exclusion list in Redgate Monitor
By default, Monitor will only ignore certain alerts during maintenance windows. You can see the list here: List of alerts suspended during alert suppression.
You can obtain a list of the available ...
Redgate Monitor Base Monitor and Web Server versions are different
Redgate Monitor displays this error when you try to connect from a web server to a base monitor that is a different version.
To fix the problem, you will need to manually remove the base monitor wi...